Name Lengths

Introduction

Do people with long last names also tend to have long first names? In this assignment, you will analyze data to investigate this question, construct and analyze a linear regression model based on the relationship between the length of the first and last names in the dataset that you collected, and draw insights into the phenomenon within the limitations of the model. You will count the alphabet letters used to write the name of 100 individuals from this dataset   arabic_first_last_name _1_.csv

e  .

Part I: Exploratory Analysis

a) Download the arabic_first_last_name.csv file which contains Arabic first and last name columns.

b) Construct a dot plot of the last name lengths and comment on any interesting features of this plot.

c) Construct a dot plot of the first name lengths and comment on any interesting features. Describe how the distribution of first name lengths compares to that of last name lengths.

Part II: Regression Model

a) Construct a scatterplot of x and y.

b) Explain if this is the plot consistent with the theory that people with long last names tend to also have long first names?

c) What is the value of the correlation coefficient for this data set?

Part III: Reporting

a) Discuss if your first and last name are included in the context of the model.

b) Discuss the limitations of the data, the model, and the analysis.

c) Write a 100-200 words meaningful paragraph summarizing the findings from the analysis.

Once you have developed responses to the task prompts, you will organize them in a professional 3-5-page report, not including the title and reference pages, that summarizes your actions, calculations, and findings. You will upload a zipped file that includes your response and all supporting files.

Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references in support of your work, in addition to your text and assigned readings.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.

wk 14

Prepare a 4 page paper on the implications for voting, lotteries, certificate issuance, security auditing and enterprise. Discuss the impact on blockchain finance and how these functions will accelerate basic functions.

Your paper should be 4 pages long (excluding the title and reference pages) and formatted according to APA.

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 4 page essay, you must include an APA-style title page and reference page.

Contracting & Service Level Agreements

 

Discuss in 400 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

frameworks

 

Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help Achieve GDPR Compliance. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6.  https://ieeexplore.ieee.org/document/8760937?arnumber=8760937 

Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43.

 The required article readings of above articles give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches. For research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Presentation power point.

Hide Folder InformationTurnitin®Turnitin® enabledThis assignment will be submitted to Turnitin®.Instructions

Pick one of the below operating systems and present information on the operating systems, and your thoughts comparing the selected operating system with other systems.

  • Windows 
  • Linux 
  • Unix
  • Android
  • iOS

Due DateOct 22.

Only seroious bidder.
Must be Computer Science Major to do this task.

Discussion-6 ME

 

For this Discussion Question, complete the following.

1. Review the two articles about bank failures and bank diversification that are found below this. Economic history assures us that the health of the banking industry is directly related to the health of the economy. Moreover, recessions, when combined with banking crisis, will result in longer and deeper recessions versus recessions that do occur with a healthy banking industry. 

https://www.frbsf.org/economic-research/publications/economic-letter/2006/may/bank-diversification-economic-diversification/

https://www.richmondfed.org/~/media/richmondfedorg/publications/research/economic_quarterly/2005/winter/pdf/walter.pdf

2. Locate two JOURNAL articles which discuss this topic further. You need to focus on the Abstract, Introduction, Results, and Conclusion. For our purposes, you are not expected to fully understand the Data and Methodology.  

3. Summarize these journal articles. Please use your own words. No copy-and-paste. Cite your sources.

5s week 11 assignment BS

In 300 words

Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration testing.

Include References, do not copy paste strictly.

Information systems infrastructure Research Paper

 Summary:

Select a topic from the following list on which you would like to conduct an in-depth investigation:

  • Information systems infrastructure: evolution and trends 
  • Strategic importance of cloud computing in business organizations 
  • Big data and its business impacts 
  • Managerial issues of a networked organization 
  • Emerging enterprise network applications 
  • Mobile computing and its business implications 

Note: The above topics are also the basis of the discussion questions. You may use up to three resources found by yourself or your peers as peers as resources for the paper. 

Research paper basics: 

  • 8-10 pages in length 
  • APA formatted 
  • Minimum six (6) sources – at least two (2) from peer reviewed journals 
  • Include an abstract, introduction, and conclusion 
  • See rubric for more detailed grading criteria 

Some good questions to ask yourself before turning in your research paper: 

  • Is the paper of optimal length? 
  • Is the paper well organized? 
  • Is the paper clear and concise? 
  • Is the title appropriate? 
  • Does the abstract summarize well? 
  • Are individual ideas assimilated well? 
  • Are wording, punctuation, etc. correct? 
  • Is the paper well motivated? 
  • Is interesting problem/issue addressed? 
  • Is knowledge of the area demonstrated? 
  • Have all key reference been cited? 
  • Are conclusions valid and appropriate?

bharg discussion

 

here is a relationship between policy evaluation and production identification, policy evaluation and policy implement, and policy evaluation and policy formulation.  Can you explain this relationship and why they are important?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.