Categories
Computer Science

develop a minimum one-page paper about what the article is saying, how you agree

develop a minimum one-page paper about what the article is saying, how you agree or disagree with the tone and facts presented in the article (it is okay to not agree), and your personal thoughts on the subject, including some predictions, if valid, to what this means for the future.
For Week 9, find an article that discusses physical security controls that would work for a small business, or find something that discusses firewalls and how they can fail, if they can.

Categories
Computer Science

TASK 1 EXERCISE 1 To do: 1.1 the introduction of two financial variables into

TASK 1
EXERCISE 1
To do:
1.1 the introduction of two financial variables into the R program
Studio (with at least 30 records per variable)
1.2 the calculation of mean value, through standard deviation of these variables
1.3 the graphical display of each variable separately and together
EXERCISE 2
2.1 Represent with artificial or real data the environmental Kuznets curve
2.2 Explain what this curve represents
EXERCISE 3
3.1 Find data related to Greece and examine whether the environmental Kuznets curve is valid in Greece
3.2 How do you explain the graph you constructed for the question above?
EXERCISE 4
4.1 Suppose that the willingness to pay depends on the respondents’ work experience in NGOs and on the level of education
·Wtp: 25,22,20,32,35,28,19,17,20,26,28,34,4 0,42,28,19
·exp: 2,1,2,5,7,3,2,1,2,2,5,5,7,6,3,1
·edu: 2,2,1,3,2,3,1,1,2,2,2,3,3,3,2,1
Estimate the multiple linear regression model.
4.2 Estimate the same model using the variable edu as a factor.
EXERCISE 5
5.1 For the attached data select the first 500 lines and make them the file you will work with.
5.2 Estimate WTP and 95% CI by fitting the single bounded dichotomous choice model
5.3 Estimate WTP and 95% CI by fitting the double bounded dichotomous choice model
5.4 Comment on differences
EXERCISE 6
Prepare and save the R Script file that includes all the commands from the above queries so that it can be played in a short presentation in class.
If you need to write some summary text, it will be in R’s R Script (preceding the text with ##)

Categories
Computer Science

Please do your best to write a research project proposal on operating systems in

Please do your best to write a research project proposal on operating systems including a specific title, your name, your proposal including existing research techniques on the relevant research subject, your feasible new idea, and a future research plan, and cited references.
example of topic idea: Impact of Operating Systems in our everyday life

Categories
Computer Science

The instructions are in the attached Assessment Descriptor file. Take note that

The instructions are in the attached
Assessment Descriptor file. Take note that one assessment is 4600 words while the presentation is 900 words.

Categories
Computer Science

refer to the attached files for instructions. please make sure you are not copy

refer to the attached files for instructions. please make sure you are not copy and pasting the codes from anywhere. and please write the codes as simple as possible. I was already caught cheating so please be careful ??. thank you so much

Categories
Computer Science

Steganography is the age-old practice of concealing a message within another med

Steganography is the age-old practice of concealing a message within another medium. Unlike cryptography, where it is clear that there is a message or file present, but it is difficult or impossible to interpret it, steganography is the art of ‘hiding in plain sight’. Cryptography conceals the contents of the message; steganography conceals the message’s existence.
Digital steganography is the concealment of information within computer files. These files could be pictures, movies, audio, or any other file that offers the size and space to add a hidden message. There are a variety of techniques to do this and readily available programs on the internet that can assist. The detection of steganography is called steganalysis.
Discuss: Provide one detailed example each of a historic use of steganography and a current use of digital steganography. In these examples, how would steganography be implemented? How could this steganography be detected? Comment on the ethics of using this technology.
Interaction: At the end of your original post, add an interesting question for your classmates to answer.
Instructions:
Read and understand the question and address it fully in all its aspects.
The best answers will cite 3+ supporting sources in APA format and contain a solid rationale and/or additional facts.
Use some sources outside of the textbook and course lectures. The quality of the source matters, so try to use reputable sources.
Critically examine your response for spelling and grammar prior to posting. Avoid responding in first person.
Use the Preview button in the top right to check formatting. (Note: if you are copy-and-pasting from Word or similar, use CTRL+Shift+V to strip formatting, since Blackboard butchers it.)
Please post your original post (as a reply to this post – “Create Thread” button) by Friday, February 3, 11:59 PM. There is a flat 10% penalty for being late.
Please respond to a peer (as a reply to their posts – GRAY button) by Friday, February 10, 11:59 PM. The discussion closes at that point and will not re-open.
Limit the size of your posts to approximately 500-600 words.
Review any previous feedback.

Categories
Computer Science

Technical debt is the concept of incurred costs in software development when a l

Technical debt is the concept of incurred costs in software development when a limited or inefficient solution is chosen over a better development approach. As a result, additional time and costs are involved to re-work and improve the software or system. This occurs in organizations for multiple reasons, including the need to rush to market. What type of impacts could this decision have on the organizations developing the software or the consumers using it?
What type of selection methods can be used in these organizations to prevent technical debt from occurring when making these software decisions in the future?

Categories
Computer Science

Same as the previous discussion in Week 5, select from the two topics below and

Same as the previous discussion in Week 5, select from the two topics below and answer the question in a detailed explanation.
(1) Based on the items below: What do think is most important when you design secure applications and architectures? How can it be implemented in the AWS cloud environment? Why is it important to be included?
Design secure access to AWS resources
Design secure application tiers
Select appropriate data secure options
(2) Based on the items below: What do think is most important when you design cost-optimized architectures? How can it be implemented in the AWS cloud environment? Why is it important to be included?
Identify elastic and scalable compute solutions for a workload
Select high-performing and scalable storage solutions for a workload
Select high-performing networking solutions for a workload
Choose high-performing database solutions for a workload

Categories
Computer Science

1. How does the use of database improve or enhance an organization’s data coll

1. How does the use of database improve or enhance an organization’s data collection process?
2. Do you think an organization could function without the use of databases?
3. Provide details and examples to support your answer.
The retail organization that I choose is Amazon

Categories
Computer Science

Please revise and submit your Methodology and Design – Chapter 3. If you have no

Please revise and submit your Methodology and Design – Chapter 3. If you have not already done so, insert it into the current version of the DSP template available under the Forms & Templates tab of the DBA Doctoral Resources guide.
Remember, your Method and Design chapter should demonstrate your mastery of the required components of your DSP study and include the following key items:
Chapter Introduction
Briefly introduce the major components of the research study design.
Method and Design
Introduce and provide rationale for the key decisions in the methodology and design choices made for your DSP study. This should also explain why your choice was made over other available options.
Population
Provide a description of the population (as appropriate), estimated population size and relevant characteristics with appropriate support. Depending on the study design, populations may reflect a group of people, a set of organizations, a set of documents, archived data, etc. Describe why the population is appropriate to respond to the study problem and purpose.
Sample
Identify the sampling method and explain selection of participants or relevant sample, including known population characteristics and recruitment or selection strategy. Describe and justify the sampling method (convenient, purposive, random, etc.) and minimum sample size (include sample size in total and as a breakdown between the sources of data that utilize participants; minimum sample size should be at least 15 participants total, combined from all sources.
Instruments
Note: The instruments do not need to be created prior to the Prospectus Presentation. All instruments must be created prior to the Proposal Defense in DOC700.
A minimum of three data sources is required for the DSP; two sources must be primary sources (interview protocol, questionnaire, focus group protocol, observation protocol, etc.). Place the description of instruments in the sequential order that data will be collected. This section is an explanation of the physical instruments and how they were created. This section should NOT provide any explanation about the process of data collection with the instruments.
Data Collection
Note: This section will only need to briefly explain the three processes prior to the Prospectus Presentation. All details must be provided prior to the Proposal Defense in DOC700.
Describe the collection procedure in a sequential step-by-step explanation. Provide specific details relative to the execution of the design. The collection process should also explain how participants will be recruited and how the informed consent form was completed by the participants prior to collecting data. It is recommended to use a subheading for each instrument/source of data to ensure the collection of each is adequately defined. Readers must be able to replicate the study based on this description. This includes the procedure for accessing and retrieving secondary data if used as a source in your study.
Data Processing
Describe how data will be processed following the collection procedures. This should include steps for transcription of audio files, either through a professional, available software, or manual transcribing (which is very time consuming). This section must also explain the procedures for storing and protecting the raw data, both physical and electronic, until and throughout data analysis and final reporting.
Data Analysis
Note: This section will only need to briefly explain the process prior to the Prospectus Presentation. All details must be provided prior to the Proposal Defense in DOC700.
Describe the data analysis procedures in enough detail so that it could be replicated. Describe the steps that will be taken to carry out the analysis. Describe the method for storing and categorizing data. This may include the use of electronic software used for analysis. Each source of data may have a different analysis process (if so, use separate subheadings for each source of data). Analysis procedures should follow a procedure found in the literature and be cited. Explain how the author of the published analysis procedure explains each step and then explain how you will implement each step.
Assumptions, Limitations, and Delimitations
These three sections will examine the areas within the study that may provide overall boundaries to your study. Most details in these sections may not be known until the full proposal has been prepared in
DOC700.
Ethical Assurances
Note: This section will only need to briefly explain each concept prior to the Prospectus Presentation. All details must be provided prior to the Proposal Defense in DOC700.
Discuss compliance with the standards for conducting research as appropriate to the proposed research design. For most studies, this should include an explanation of: Letter of Intent or Site Approvals, IRB Approval requirements, Informed Consent process, Participant Protections, Data Protections, and Bias Mitigation.
Chapter Summary
Provide a recap of the major concepts and theories used as the foundation of your literature review. Summary should briefly transition the reader to the next chapter of the DSP.