R language Assignment and discussion

 

Assignment:

Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For this assignment, you are exposed to just 4 features of R: Arithmetic Operations; Operations on vectors; the Recycle Rule for adding/subtracting vectors; and Creating a S3 Class Object. A separate screen shot is required for execution of each feature. Open R (either command line or RStudio). Enter code that will handle the following (show all code, comment for each code line and the computed results in your screen shots). These are instructions; do NOT just write the instructions – actually show this within R and capture a readable screen shot to show that it works properly!!

Screen shot 1: Arithmetic Operations

assign a value of 144 to x

assign a value of 6 to y

add x and y

subtract y from x

multiply x times y

divide x by y

find the square root of x

Screen shot 2: Operations on vectors

create a vector (afc) and assign values 2,6,3

create a vector (nfc) and assign values 6,4,2

add afc and nfc

Screen shot 3: Recycle Rule for adding and subtracting vectors

assign values 2,1,8,3 to vector x

assign values 9,4 to vector y

add x to y

notice the warning message – use the Recycle Rule for adding vectors; then

add x to y and show results

subtract 1 from x – apply the Recycle Rule for subtracting vectors; then

subtract y from x and show results

Screen shot 4: Create an S3 Class Object

create a list – with components: name = Your name, date = today’s date, and score = score you desire on Assignment 2.

name the class as “graduate student”

Save the screen shots as a MS Word document (*.docx).

Discussion:

Why are statistical programming languages important to data scientists? What are some advantages and disadvantages the R programming language has over the other main statistical

programming languages (i.e. Python, SAS, SQL)?

When replying to a classmate, offer your opinion on what they posted comparing the R programming language to the other statistical programming languages. Using at least 3 – 5 sentences,

explain why you agreed or disagreed with their evaluation of the different statistical programming languages.

Requirements: as per question

Payroll(casestudy)

  

Case Study:

You work for a large multinational technology organization. The company has determined they need to create a disaster recovery plan.

As a team, pick one of the following department in your organization: 

· Computer Operations 

· Accounting 

· Marketing 

· Payroll 

· Sales 

· Distribution

· Human Resources

· Purchasing 

· Service (i.e., Vehicle Maintenance)

· Administration (i.e., Executive Branch)

Requirements: 

Describe the services that your department provides to the organization, the types of disasters will most affect your department, and what you and your department can do to prepare for a disaster situation. Perform a limited risk analysis for your department (because any given department in an organization can be considered an organization on its own) for the types of disasters that will most affect your department.

After you conducted your limited risk analysis for your department, the company decided to make you the captain for your company’s disaster recovery team. You know that working as a team is important and therefore you’re trying to figure out how to build both the team and friendships within the new team. As a team, you should discuss why you need to create a contingency policy and plan. You should describe what you need to start the contingency planning process and finally, define business impact analysis and describe each of its components.

Now that you know what goes into making up your plan, you should discuss the relationships between the overall use of contingency planning and the subordinate elements of incident response, business resumption, disaster recovery, and business continuity planning. Additionally, you will describe the techniques used for data and application backup and recovery.

To conclude the project, you are going to describe the process you will use to organize the incident response planning process, explain the techniques that can be employed when formatting a security incident response team, and describe the processes used in making decisions about incident detection and escalation.

Deliverables:

Prepare a report to address all aspects of the case study. This report should be no less than 20 pages of content and no more than 25 pages of content. You need to include outside sources and properly cite and reference your sources. You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. The 20 pages of content, includes title page and a reference sheet. This report needs to be in proper APA format.

java





/**

* COSC 1436

* EL Centro

* Week 15

* Cell Phone Class

*

* This CLASS does not need to change

*

*/

import java.util.ArrayList;

import java.util.Arrays;



public class CellPhone {

// Attributes

private final ArrayList AVAILABLE_BATTERY_TYPES = new ArrayList<>(

Arrays.asList("NiCd", "NiMH", "Lo-ion", "Li-pol"));

private ArrayList favoritePhoneNumbers = new ArrayList();



private String cellProvider = "AT&T";

private String batteryType = null;

private boolean isFlipPhone = false;

private boolean hasInternational = false;



// Methods

public ArrayList getFavoritePhoneNumbers() {

return favoritePhoneNumbers;

}



public void addAFavoritePhoneNumber(Long phoneNumber) {

this.favoritePhoneNumbers.add(phoneNumber);

}



public void deleteAFavoritePhoneNumber(int phoneNumber) {

this.favoritePhoneNumbers.remove(phoneNumber);

}



public String getCellProvider() {

return cellProvider;

}



public void setCellProvider(String cellProvider) {

this.cellProvider = cellProvider;

}



public String getBatteryType() {

return batteryType;

}



/**

* Validates battery type

* @param batteryType

* @return

*/

public boolean setBatteryType(String batteryType) {

if (AVAILABLE_BATTERY_TYPES.contains(batteryType)) {

this.batteryType = batteryType;

return true;

}

return false;

}



public boolean isFlipPhone() {

return isFlipPhone;

}



public void setFlipPhone(boolean isFlipPhone) {

this.isFlipPhone = isFlipPhone;

}



public boolean isHasInternational() {

return hasInternational;

}



public void setHasInternational(boolean hasInternational) {

this.hasInternational = hasInternational;

}



public ArrayList getAVAILABLE_BATTERY_TYPES() {

return AVAILABLE_BATTERY_TYPES;

}



public boolean isValidBatteryType() {

return batteryType != null;

}



@Override

public String toString() {

StringBuilder builder = new StringBuilder();

builder.append("CellPhone [favoritePhoneNumbers=");

builder.append(favoritePhoneNumbers);

builder.append(", cellProvider=");

builder.append(cellProvider);

builder.append(", batteryType=");

builder.append(batteryType);

builder.append(", isFlipPhone=");

builder.append(isFlipPhone);

builder.append(", hasInternational=");

builder.append(hasInternational);

builder.append(", valid battery type=");

builder.append(isValidBatteryType());

builder.append("]");

return builder.toString();

}



}

Create a new Java Project for this assignment.

       Copy the provided class CellPhone into your default package area.

  1. Create a new class called SmartPhone that extends CellPhone. Add the following attributes:

    1. boolean – hasGPS. 
    2. boolean – hasWIFI. 
    3. String OSVersion.   Default to “Windows 10 Mobile”;
    4. long internalMemoryStorageCapacity – Default to 16_000_000_000L;
    5. Generate the setters and getters and toString() method.
  2. Create a new class called TestPhone that includes a main() method.
  3. Inside the main() method of TestPhone, do the following: 
    1. Create an instance of CellPhone. Set all the following attributes to values of your choosing: (Call all the setters with values) 
      1. cell provider
      2. isFlipPhone
      3. hasInternational
      4. batteryType
      5. Add 2 favorite phone numbers
    2. Display the CellPhone toString results.
    3. Create an instance of SmartPhone. Set the following attributes to values of your choosing: 
      1. hasGPS
      2. hasWIFI
      3. OSVersion 
      4. cell Provider
      5. isFlipPhone
      6. hasInternational
      7. batteryType
      8. Add 1 favorite phone number
    4. Display the SmartPhone toString results.

Deliverables include the SmartPhone.java and TestPhone.java files.

There is no defined constructors in the CellPhone class so the super() method does not need to be addressed.

Question

Paper Requirements:   Review the section on the definitions of maturity stages and dimension variables in the CEO Technology Best Practices Arc.  Define each of the maturity stages and performance dimensions.  What are the key concepts from each section?  2pages APA format with reference 

Week 6 Discussion Data Visualization

Initial Post

Data representation is the act displaying the visual form of your data. The process of identifying the most effective and appropriate solution for representing our data is unquestionably the most important feature of our visualization design. Working on this layer involves making decisions that cut across the artistic and scientific foundations of the field.

Here we find ourselves face-to-face with the demands of achieving that ideal harmony of form and function that was outlined in Chapter 6Data Representation. We need to achieve the elegance of a design that aesthetically suits our intent and the functional behavior required to fulfill the effective imparting of information.

According to Kirk 2016, in order to dissect the importance of data representation, we are going to “look at it from both theoretical and pragmatic perspectives.” Choose three of the storytelling techniques (Pages 161 – 209) in which data is presented and stories are being interpreted. Discuss the importance and the advantages of using these techniques. Provide an example of each technique.

Reference

Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design. Thousand Oaks, CA: Sage Publications, Ltd.

Reply Post

When replying to a classmate, offer your opinion on what they posted as the important advantage of each technique. Also, are the examples, in your opinion, relevant and usable? 

Enterprise Risk Management

Description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)

Hardware, Software, and Network Requirements

 

Assignment Content

  1. Conduct an internet search using the phrase “small office local area network” for network diagram examples to help you complete this assignment.

    As you continue to work on Great Day Fitness Tracking’s website, you now need to gather business requirements and user requirements to identify the hardware, software, and network requirements to support the online business.

    Write a 2- to 3-page proposal in Microsoft® Word. Your proposal should:

    • Describe how you would select appropriate hardware and software to develop the internal business infrastructure.
    • Explain at least two possible approaches to managing the data for easy access and security.
    • Describe possible networks that might be used to support business needs.
    • Create a logical system diagram with a software of your choice showing possible internal connections as well as those between the site and the potential customers. 
    • Format your assignment according to APA guidelines.

      Submit your assignment.

Discussion 7

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?

A substantive post will do at least two of the following:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. 

Reference article:

Mackita, M., Shin, S.-Y., & Choe, T.-Y. (2019). ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing. Future Internet, 11(195), 1-21. Retrieved from https://doi.org/10.3390/fi11090195

https://www.forbes.com/sites/kalevleetaru/2018/04/03/the-cloud-is-rising-to-the-cybersecurity-challenge/#347c5a1967ba

INSTRUCTIONS.

1. No Plagiarism at any cost .

2. The submission date is Thursday (10/08/20).

3. Atleast 3 references in APA format

4. Min of 250 words (2-3 paragraphs)

assign-2

 Search the Internet for companies that supply utility computing. Select 2 or 3 companies and compare them to Amazon. What services do these companies provide? What promises do they make about availability?  Grammatical and mechanical errors will be checked. 

2 pages with apa format and no plagiarism