dv wk 1

Therefore, after reviewing all of the content this week, answer all of the following questions 

  1. What is your definition of data visualization?
  2. What are the key components of data visualization?
  3. What techniques do you hope to learn from this course?

Malware Variant

Using a Web browser, perform some research on a newer malware variant that has been reported by a major malware containment vendor. Using a search engine, go to the vendor’s Web site; this could be Symantec, McAfee, or any of their competitors. Visit one malware prevention software vendor. Search for the newest malware variants and pick one. Note its name and tryto understand how it works. Now look for information about that same malware from at least one other vendor. Were you able to see this malware at both vendors? If so, are there any differences in how they are reported between the two vendors?

Your submission should be between 1000-1200 words with references and following APA writing standards. 

Exp19_Excel_Ch06_ML2_Deck_Builders

Exp19_Excel_Ch06_ML2_Deck_Builders

  

Exp19_Excel_Ch06_ML2_Deck_Builders

Project Description:

You are the business manager for Indy Deck Builders, a local construction company that specializes in new deck installation. Your company offers three deck models. Model A which costs $2,000, model B costs $3,500, and model C costs $5,000. You currently have 45 contracts to build model A, 55 for model B, and 75 for model C. Once the contracts have been completed, you will have a surplus of materials (wood, hard-ware, and paint) remaining in inventory. After expenses your company’s net profit is $492,031.25. You would like to use Solver to forecast how many additional contracts you can accept to maximize profit while not exceeding the raw materials in inventory.

     

Start   Excel. Download and open the file named EXP19_Excel_Ch06_ML2_HW_DeckBuilders.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

Calculate total building   expensive for model A in cell C16. Total expense is calculated by multiplying   manufacturing cost (C4) and total contracts (C8). Then use the fill handle to   copy the formula into cells D16 and E16.

 

Calculate total profit for model   A in cell C17. Total profit is calculated by multiplying profit marging (C6)   and total contracts (C8). Then use the fill handle to copy the formula into   cells D17 and E17.

 

Create range names based on the   values in the range C19:C20 based on the values in the range B19:B20.

 

In cell C19 use the SUM function   to calculate total building expenses. The total building expenses are the sum   of the range C16:E16.

 

In cell C20 use the SUM function   to calculate total profits. The total profit is the sum of the range C17:E17.

 

If not loaded, load the Solver   add-in. Set the objective cell to Max Net Profit (cell C21).

 

Assign Total Contracts (range   C8:E8) as the Changing Variables Cells.

 

Set a constraint to ensure   contracts are whole numbers.

 

Set a constraint to ensure the   raw material used do not exceed inventory.

 

Set a constraint to ensure that   the Total Contracts are greater or equal to the existing contracts.

 

Create an Answer Report to   outline your findings.

 

Create a footer with your name   on the left side, the sheet name code in the center, and the file name code   on the right side of both worksheets.

 

Save and close Exp19_Excel_Ch06_ML2_HW_DeckBuilders.xlsx.   Exit Excel. Submit the file as directed.

CSE 461 Project I

CSE 461 Project I

The first part of this project requires that you implement a class that will be used to simulate a disk drive. The disk drive will have numberofblocks many blocks where each block has blocksize many bytes. The interface for the class Sdisk should include :

Class Sdisk

{

public :

Sdisk(string diskname, int numberofblocks, int blocksize);

int getblock(int blocknumber, string& buffer);

int putblock(int blocknumber, string buffer);

int getnumberofblocks(); // accessor function

int getblocksize(); // accessor function

private :

string diskname;        // file name of software-disk

int numberofblocks;     // number of blocks on disk

int blocksize;          // block size in bytes

};


An explanation of the member functions follows :

  • Sdisk(diskname, numberofblocks, blocksize) This constructor incorporates the creation of the disk with the “formatting” of the device. It accepts the integer values numberofblocks, blocksize, a string diskname and creates a Sdisk (software-disk). The Sdisk is a file of characters which we will manipulate as a raw hard disk drive. The function will check if the file diskname exists. If the file exists, it is opened and treated as a Sdisk with numberofblocks many blocks of size blocksize. If the file does not exist, the function will create a file called diskname which contains numberofblocks*blocksize many characters. This file is logically divided up into numberofblocks many blocks where each block has blocksize many characters. The text file will have the following structure : Bytes 0 – blocksize-1Block 0Bytes blocksize – 2*blocksize-1Block 1Bytes 2*blocksize – 3*blocksize-1Block 2……Bytes ?-?Block numberofblocks-1
  • getblock(blocknumber,buffer) retrieves block blocknumber from the disk and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • putblock(blocknumber,buffer) writes the string buffer to block blocknumber. It returns an error code of 1 if successful and 0 otherwise.

IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the Sdisk. NOTE that you must also write drivers to test and demonstrate your program.

Assignment 600 words

Since even the best supervisors can only watch a few employees at a time, companies like Drishti are creating AI surveillance systems that track and time employee movements and gather data. This data is intended to allow managers to understand where employees can improve and then help them do so. Although AI and robotics aren’t advanced enough to do a lot of the processes workers currently do themselves, the data collected will allow them to learn the best ways to do these things in the future.Key Points

  • AI systems are being designed to track, measure and time employee movements and actions
  • This can lead to improvements in training and employee performance
  • These systems tend to cause employees to fear for their jobs or performance

Case study questions

  1. What do you believe are the pros and cons of an AI system like this?
  2. How can these systems change how we work in different industries?
  3. Should managers use AI systems to monitor employee email and Internet usage? Why or why not?
    Rubric_ExportFile_40297202204_1657573612540.zip

Cloudcomputing

Select three topics of interest in cloud computing and note: What you learned about the topic Why you selected the topic How you will utilize the topic in the future Also, write a reflection of the material you’ve learned in the course.  What did you like?  What could be improved? 

Discussion board

 

  • What are the implications of vehicle hacking for autonomous vehicles? Today’s vehicles have complex computer code and autonomous vehicles will have even more complex code. Do you think we will ever have widespread use of safe autonomous vehicles? Why or why not?
  • One of the suggestions to improve vehicle security is for car manufacturers to release their code open source to allow for public scrutiny. Do you think this would help improve vehicle security? Why or why not? 

Using Appcelerator Titanium and Figma to simulate a Derby App

 For our assignment this week ( Assignment 8), my aim is for you to understand how Appcelerator Titanium would be used to build a Derby app – a Derby menu. Like last week, we will use a design/modeling tool (Figma) https://www.figma.com to design an app interface that looks like the one in Figure 10-10, p. 295. This can be an interface for iOS, Android, or Windows phone (your choice). Although we can only see a top view from the figure, several UI elements are needed to make the app functional. Our authors provide both a description and the associated JavaScript code for each UI element that can be used to create the Derby app (pp.292-307). In addition to modeling, your goal is to choose at least six (6) UI elements which you would use. Explain what and how these UI elements contribute to your app functionality as you modeled. If possible, draw a line on the interface to the UI functionality and explain. Remember that although you are using Titanium Studio, you are actually developing an iOS, Android, or Windows app. Therefore, discuss use of particulars for that platform. For example: a VIEW  is a basic UI element for either iOS or Android – Android apps always need “accelerator”  and “GPS” UI functionality; whereas these are native (built-in) for the iOS platform, etc. Discuss “JSON is your friend” (p. 302), regardless of which app platform you are building.

  • First download and install Figma (can use comparable SW of your choice) on your computer. This is same as last week.

Make one screen shot here that shows you have install the Figma wireframing tool (or a comparable tool of your choice )* You are ready to start adding UI elements for (to model) your app matching the layout shown in Figure 10-10, p. 295

  • Use Figma widgets/icons and create a mock interface (add at least six appropriate UI elements) that follow and match the Figure 10-10 example 

* Your app is using JavaScript coding, but you ARE NOT required to do/show any coding for this assignment.  Make a second screen shot showing the final placement of the UI elements on your model. Except for coding, this is a simulated app as it would appear if you used Titanium Studio. Lastly, review the coding that our authors provide (pp. 292-307); based on that coding:Write a brief explanation of each UI element you used – try to explain what specific function/method each UI provides that make your app functional.These two screen shots and UI explanations is the deliverable for Assignment. If you used supporting literature/videos other than your own, remember to properly cite and then include an APA style reference list.  

Network Design Paper

  

Network Design Paper:
 

Building dimensions:
Length: 240 Feet
Width: 95 Feet
Height: 30 Feet
 

The 40-year-old two-story building has the following existing layout:
 

There will be six computer labs that will be used for instruction. Each of these labs will have 21 computers (20 student computers and 1 instructor computer). Each of these labs will also have a server in the closet located inside the lab.
 

In addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework. There will be 30 computers in this lab and a server in the closet.
 

The library will also have some computers to allow students access to the library resources. There will be 10 computers for student’s use in the library, and 5 computers for Library staff.
 

There are five lecture classrooms in the building. Each of this room will have a computer for instructor’s use.
 

Finally, there are various offices in the building. Each of these offices will have one computer for the staff use, with the exception of the Admission office that will have 5 computers for staff use.
 

Two server rooms have been allocated, one on the first floor and one on the second floor.
 

Your task is to design the network for this new building with the following criteria:
• Student-accessed computers should be on separate network from the staff-accessed computers. There should be at least 3 separate networks: Administrative, Instructional, and Public. All staff-accessed computers will be on the Administrative network. The computers in the instructional computer labs that will be used for classes should be on the Instructional network. The wifi and the computers in the student lobby should be in the Public network.
• The whole building will share one Internet access connection (T-1 link from Verizon). This connection will come into the Server Room on the first floor. The Public IP address for the router here is 191.1.15.1
• • The network has been assigned the 10.15.0.0 network address for all computers and devices.
• The network should use physical cable (not wireless), but do provide wireless access in the Student Lobby area.
 

Submission should include (in no more than three pages, excluding diagrams and references):
 

Network Addressing:
1. Define the subnet (based on: rooms, floor, department, or other criteria).
2. For each subnet, explain which devices/groups/users/rooms will be on this subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices.
 

Physical Network Design:
1. Define the topology that will be used.
2. Select the appropriate network media to use.
3. Select the appropriate network connecting devices to use.
4. Physical layout of the computers on the floor plan.
5. List of additional servers or network devices needed to implement the network.
6. Justifications for your network design (number 1 – 5 above)
 

You will be evaluated on your ability to
 

o Implement appropriate IP addressing scheme
o select and justify appropriate cable media that includes the length of each cable segment and number of nodes on each segment
o select and justify appropriate topology such as star, bus, or ring for your network
o select and justify of your selected network equipments
o select and justify appropriate network services to meet network requirements
o select and justify security implementation for the network
o use proper grammar, formatting, network terminology, and reference citations