Information Entropy

   A family clinic contains a dataset as uploaded in the module for the final project. Identify how the following methods and techniques can be applied to the dataset to aid necessary decision support. 1. Description of the use of Information Entropy to identify the reduction in the possibility of the development of heart disease […]

Natural Language Analysis

Write a report (max 1,500 words) on the challenges the dataset presents, the solutions, and your findings, which will be assessed as follows: 1) Discuss the following feature extraction techniques and explain how they work and their advantages and disadvantages a) Term Frequency-Inverse Document Frequency (TF-IDF) [10%] b) BERT [10%] 2) Two step Classification: a) […]

Database

Instructions are attached. CMIS 320 Project 4 Examine the following relation and its attributes and answer the following questions. Assume these are the values for “all time”. Assume girls with the same name are the same person. GIRL GROUP AGE GAME CATEGORY PRICE Charlotte 5 year olds 5 Mirror Makeup 4.88 Susan 6 year olds […]

Computer Science Assignment

Operation excellence Operational Excellence Week 12 Assignment Information Systems for Business and Beyond Questions: · Chapter 12 – study questions 1-11, Exercise 1, 2 (Chapter 12 | 288) What does the term information systems ethics mean? 2. What is a code of ethics? What is one advantage and one disadvantage of a code of ethics? 3. […]

Financial Economics

See the instructions. This file is too large to display.View in new window

CYBER SECURITY

  This week’s discussion topic is Defensive Programming. Instructions: Research and discuss Defensive Programming and whether or not you would use it when developing procedures, processes, and architectures that guide work execution at the program and/or system level.

GRA 205 Module One Activity

Photoshop – See Attached for directions GRA 205 Module One Study of Design Elements PDF Template LINE STUDY [Label Here] [Label Here] [Label Here] SPACE TEXTURE SHAPE STUDY [Label Here] [Label Here] [Label Here] [Label Here] [Label Here] [Label Here] [Label Here]

Illustrator Color Palette

See attached SAVE THE TIGERS Credit: Tiger day vector created by pikisuperstar – www.freepik.com • Adapted by A. Brisbane

Photoshop Color Palette

Photoshop – See attached for directions Directions Begin by performing some basic Photoshop functions. Then, create and apply three color palettes for the poster provided in the Supporting Materials section. Part One: Basic Photoshop Functions Specifically, you must perform the basic functions of Photoshop by addressing the following rubric criteria: 1. Import the provided grayscale image […]

Role of IT Summary

Select one of the videos found at to an external site. that addresses technology used in the disaster recovery and business continuity plans. You may even find one related to your group’s disaster and industry.   You are tasked with selecting one of the videos at to an external site. and provide a brief summary of […]

CSIA 485

CSIA 485: Practical Applications in Cybersecurity Management & Policy Project #3: Presentation for Board of Directors Your Task: Padgett-Beale’s Chief Information Security Officer (CISO) has tasked you to continue supporting the Merger & Acquisition team’s efforts to bring Island Banking Services’ security program into compliance with U.S. laws and regulations. The M&A team has provisionally […]

milestone one

IT 212 Milestone One Guidelines and Rubric Overview In Milestone One, you will: Given the provided scenario, explain the key considerations (must-haves) and constraints of the networking project at the �rm’s new location. Then make a well-reasoned recommendation of local area network (LAN) topology. Scenario You work for an advertising �rm with of�ces in Albany, […]

soft skills

  Employers want their employees to have certain soft skills like communication skills, critical thinking, time management, etc. Please respond to the following in a substantive post (2-3 paragraphs): In one paragraph, describe some soft skills that are common. How are these skills gained? How might you recommend to others to improve these skills? In […]

operating systems

  Everything we do with a computer leaves a footprint. In a few sentences, explain any that are included in the Microsoft Windows operating system to review these digital marks. What is your favorite Linux-based tool (or tools) that allow us to monitor processes in a Linux System? How do you think the information collected […]

Week 3 – Descriptive Analysis

file attached.  Data Without Wait-Tracking System With Wait-Tracking System 24 31 67 11 17 14 20 18 31 12 44 37 12 9 23 13 16 12 37 15

CSIA 485

CSIA 485: Practical Applications in Cybersecurity Management & Policy Project #2: Cybersecurity Implementation Plan Your Task: The Acquisition of Island Banking Services has moved from the strategy development phase to the integration phase. In this phase, the M&A team will develop transition and implementation plans. Padgett-Beale’s Chief Information Security Officer (CISO) has recommended that a […]

Impact of AI on Education and Employment

This unit, you have 1 assignment to complete. Select the button below to access detailed instructions for this assignment and to submit your work. Research Paper Overview Write a research paper using evidence to support a thesis that addresses your research question examining a current issue or event in the news from the perspective of […]

Analysis lect

Analytics & Business Intelligence Brief summary of three bulleted items that you took away from the lecture 1. What strategy or approach would you use if you needed to create Excel charts for a finance or accounting department to show yearly ales and returns to customer who like your state current state? Consider what is […]

Job qualities

  In 1-2 paragraphs, describe the requirements for the job attached above and talk about the knowledge, skills, and abilities that are necessary for you to likely get hired. Also, what additional skills would be helpful in this job to have. Discuss the role certification plays in job profile attached. If your company closed or […]

Software on Internet

  When you download software from the Internet, why is it important to verify the MD5 hash value? Describe some first and important steps you would use to verify a MD5 checksum of downloaded software. Are there tools built into the operating system that will check the MD5 sum? Can you recommend a website with […]

Compliance efforts MW

  When looking at compliance issues, we might find that the actions of individuals can dictate the success or failure of compliance efforts throughout the organization. From the readings during this week (or your own research), identify a top concern with compliance. What area of an organization does it impact? What guidelines or regulations must […]

cyber question

  Topic: This week’s discussion topic is Cybersecurity Deductive Forensics. Instructions: Discuss Deductive Forensics in terms of anticipating attacks/pre-crime, machine learning forensics, scene of the crime, and searching for digital evidence.(4-5) paragraphs long 

Pelican stores

Attached excel file. Pelican Stores, a division of National Clothing, is a chain of women’s apparel stores operating throughout the country. The chain recently ran a promotion in which discount coupons were sent to customers of other National Clothing stores. Data collected for a sample of 100 in-store credit card transactions at Pelican Stores during […]

Computer Science Assignment

Operational Excellence  Operational Excellence Week 10 Assignment Information Systems for Business and Beyond Questions: · Chapter 10 – study questions 1-10, Exercise 1.  (Chapter 10 | 240) 1. What are the steps in the SDLC methodology? 2. What is RAD software development? 3. What makes the lean methodology unique? 4. What are the three differences between […]

Malware awareness

  You’ve recently taken a position as the Chief Security Officer (CSO) for a company that has been experiencing an increasing number of successful malware attacks. Educating and training your workforce on malware is one of the ways you intend to address the ongoing issues. Outline the major elements you would include in your program […]

digital crime scene

  Why do you think it is so important to document a digital crime scene? In a few sentences, describe the steps you would take and why you think you should take them, to ensure you have all of the needed evidence recorded. Are there any Internet resources that you could recommend that would help […]

Making a company

Please use the attached template to fill in.   For this activity, you will establish the fictional company, executives, and team members that you will refer to. Respond to each of the following: What is the name of this e-commerce company? (Do not choose a real company.) What is the fictional name of the CEO, […]

Impact of AI on Education and Employment

Assignment 2: Annotated Bibliography Hide Assignment Information Turnitin™ This assignment will be submitted to Turnitin™. Instruction s Overview Create an annotated bibliography of four sources that could be used for your research project, including at least two articles from scholarly journals. Grading This assignment is worth 210 points (21%) of your final course grade. Earning […]

Impact of AI on Education and Employment

Assignment 2: Annotated Bibliography Hide Assignment Information Turnitin™ This assignment will be submitted to Turnitin™. Instruction s Overview Create an annotated bibliography of four sources that could be used for your research project, including at least two articles from scholarly journals. Grading This assignment is worth 210 points (21%) of your final course grade. Earning […]

IT &PR ASSIGN

IT Innovations and Emerging Technologies 1. Assignment Content I (Unit III PowerPoint Presentation) Top of Form For this assignment, you will create a PowerPoint presentation that discusses the challenges and concerns of using mobile systems and services and virtual, augmented, and mixed reality. Include examples of privacy risks and security risks as part of your […]

IT&PR

IT Innovations and Emerging Technologies Note: Two response will be followed after the discussion Discussion-1 Part II: The Internet of Things (IoT) is all around us. Almost every technology we now use communicates with a form of the IoT. What is one example of how the IoT has been helpful or harmful to your daily […]

Introduction and conclusion for all topics

Top of Form Your OPENING (II) and CLOSING (V) PARAGRAPHS (W. 11) Please submit ONLY the opening and closing paragraphs  in color (not the rest of the paper), here  · with their proper headings · and with a title page and references page 1. Paste your written text into this FREE AI Text Detector: 1. Take […]

HW 7

PLEASE REVIEW THE INFO Homework 7 Upload your .cpp source code file to Ecampus. This program is a word/phrase guessing game similar to the classic hangman game.  You should put your own theme (not hangman) onto the game.  All screens should include ASCII art that matches your theme.  The game should include: 1. Introduction screen […]

Computer Science Assignment

Operational Excellence Week 9 Assignment Information Systems for Business and Beyond Questions: · Chapter 9 – study questions 1-10, Exercise 3 &4.  (Chapter 6 | 219) 01. Describe the role of a systems analyst. 02. What are some of the different roles for a computer engineer? 03. What are the duties of a computer operator? 04. […]

Q on Data Visualization Article Summary

Question attached.    Week 1 Data Visualization Article Summary Read the “ Data Visualization: A Comprehensive Overview ” research article and write a one-page summary about it. Focus on how data visualization is defined, the strengths and weaknesses of the human visual system, and the analytical process. The summary must present your understanding in your […]

Milestone Two: Recipe Class

In Milestone Two, you will focus your skills finalizing your final project code by submitting a class complete with accessor/mutator, constructor, and “custom” programmer-defined methods. Submit your assignment here. Make sure you’ve included all the required elements by reviewing the guidelines and rubric. 

Midterm Question.

Operational Excellence Week 8 Midterm Midterm Exam Please a topic from the below list and create a one-page essay answering the question noted below.     · Define the IT organizational structure and how the IT organizational structure impacts culture and change management practices.  Additionally, how does the organizational structure impact competitive advantage? · How do […]

CSIA 485

Project #1: Cybersecurity Strategy & Plan of Action Your Task: You have been assigned to support the Padgett-Beale Merger & Acquisition (M&A) team working under the direct supervision of Padgett-Beale’s Chief Information Security Officer (CISO). The M&A team is in the planning stages for how it will integrate a new acquisition, Island Banking Services, into […]

Computer Science Assignment 4

Directions: This exam consists of 21 free response questions that measure mastery of the learning objectives. This exam is worth 50 points (points will vary for each question) and you will have 210 minutes to complete this exam.  Note: For True or False questions (question#1 – #10), please first answer if the statement is true or […]

Computer Science homework 6

Please review the info below : Submit the .cpp and .h source code files on Ecampus. 1. Create a file named geometry.h that will contain the following functions: VolSphere() AreaSphere() VolCone() AreaCone() VolCylinder() AreaCylinder() VolDonut() Hint: Donut/Torus volume = 2 * pi * pi * R * r * r Food items will have these dimension: Apple […]

Connection

1- Practical connections with ‘Introduction to Artificial Intelligence’ Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times […]

DatabaseDesign

Instructions are posted. CMIS 320 Project 2 Introduction This assignment allows students to demonstrate their skills in designing relational databases to satisfy specific business rules and requirements. The deliverables for this assignment include an Entity Relationship Diagram (ERD) and the associated detailed documentation describing the database design and structure. In this assignment you will be […]

10/15pg

2 Outline Student’s Name Institutional Affiliation Course Name Instructor’s Name Date Outline I. Introduction A. Definition of digital signatures B. Importance and applications of digital signatures C. Thesis statement and overview of the paper II. Detailed Description of Digital Signatures A. Cryptographic principles behind digital signatures 1. Public key cryptography 2. Hash functions B. How […]

H6

Please answer the following questions. 1. Using Warshall’s algorithm, compute the reflexive-transitive closure of the relation below. Show the matrix after the reflexive closure and then after each pass of the outermost for loop that computes the transitive closure. [ 0 1 0 0 0 0 0 0 1 0 0 0 1 1 0 […]

what you bring

please describe how you can incorporate your newfound knowledge about at least two legal principles to your workplace, or if you are not currently working how your own personal life is affected by two.

research and critical analysis

Topics 1. The Risks of Poor Succession Planning Programs and ways to Mitigate – June 26 Your (3-paragraph) DISCUSSION SECTION (W. 10) 1. Top of Form THIS IS PART OF YOUR FINAL EXAM! · YOU MUST CHECK YOUR SIMILARITY prior to submission. Any academic dishonesty will result in a zero.  USE YOUR NOTES CREATED IN CLASS SESSIONS […]

Computer Science homework 5

please review the information below  Submit the .cpp source code file(s) and lotto.txt on Ecampus. At the top of each .cpp program, put your Name and class as a comment 1. Create a text file named lotto.txt that contains all numbers chosen for Lotto Texas since the contest began in 1992.  Write a program named […]

Computer Science Assignment 3 CC

Assignment#3 MSIT 630 Database Systems Total: 50 points 1. What are two advantages of encrypting data stored in the database? (2 points) 2. RAID systems typically allow you to replace failed disks without stopping access to the system. Thus, the data in the failed disk must be rebuilt and written to the replacement disk while […]

week7/8

Research Paper: This is a graduate course and students will be expected to research and write papers  summarizing in their own words what they have found on current topics from the weekly readings. Research is a theoretical review of relevant literature and application of findings in the literature to a topic related to a specific industry, field, […]

Question 3

Need help with a question Week 3 (Due ASAP) This week you will use information from the previous weeks to complete the BCC Information Security Budget. The chief information security officer (CISO) is tasked with developing a budget to reduce costs and security risks.   Part 1 Create a 4- to 5-page BCC Enterprise Information Security […]