The purpose of this assignment is to give you the opportunity to develop and pra

The purpose of this assignment is to give you the opportunity to develop and practice the
type of 21st century skills that are critically important for IT professionals in the workplace.
These skills include critical thinking, problem solving, communication, teamwork, and
lifelong learning.
Comments from Customer
Discipline: IT in Global/Local Cultures

This assignment is to demonstrate your capability to write Python Program by cal

This assignment is to demonstrate your capability to write Python Program by calculating
Grading for the class.
Hi, Class,
This is our Term Project – Signature Assignment
Data file is in Class Content Area
This assignment is to ask you to write a Python program conduct Grading for the class -1.
Input Read the input score data from an external file given by Dr. Liu
This data file is arranged as following format (colon as delimeter)
Name. : ID : (Test1-Score) : (Test2- Score) : (HW- Score) : (Project-Score)
The percentage for semester is as following:
Test1 – 20%
Test2 – 20%
HW – 40%
Project – 20%
Processing: Computation
The total semester score = 20% * Test1 + 20% * Test2 + 40% * HW + 20% * Project
Once the total semester score is computed, use this number to determine the
Semester Grade by the following Rubric:
Total_Score > = 90. The Grade will be A
90 > Total_Score > = 80. The Grade will be B
80> Total_Score > = 70. The Grade will be C
70> Total_Score > = 60. The Grade will be D
60> Total_Score The Grade will be F
Output:
After all these steps, your program will print out the output into an External File – the Format will be like the following:
For example:
Name. ID. (Test1) (Test2) (HW) (Project) TotalScore Grade
Peter Pan. 01 80 80 80 80 80 B
Then repeat for another student until all data in the given data file is done.
Comments from Customer
Discipline: Programming of All

I need to write about Cognitive Walkthroughs evaluation methods in HCI as it is

I need to write about Cognitive Walkthroughs evaluation methods in HCI as it is one of the analytical inspection method of usability . 1 paragraph as introduction, 1 paragraph as background, and 5 literature review and specify the gaps and then steps of how to apply it to evaluate software system in general. I will attach one publication to clarify my need
Comments from Customer
Discipline: Software Engineering

I need to write about Cognitive Walkthroughs evaluation methods in HCI as it is

I need to write about Cognitive Walkthroughs evaluation methods in HCI as it is one of the analytical inspection method of usability . 1 paragraph as introduction, 1 paragraph as background, and 5 literature review and specify the gaps and then steps of how to apply it to evaluate software system in general. I will attach one publication to clarify my need
Comments from Customer
Discipline: Software Engineering

1. Download the LinkedIn Worksheet Download LinkedIn Worksheet. 2. Save file wit

1. Download the LinkedIn Worksheet Download LinkedIn Worksheet.
2. Save file with the following naming protocol: LinkedIn_Worksheet_YourName.docx.
3. Complete all sections with as much detail and personal reflection as possible. This is meant to be a tool and resource to help you conduct a meaningful and effective job search. The more effort you put in, the more you can clarify your goals and expectations.
I also attach mt resume below.

Need attached documents to be turned into 1 complete document. Overview Most or

Need attached documents to be turned into 1 complete document.
Overview
Most organizations have incident response plans to assist with decision making during times of crisis. “When an incident occurs” is not the right time to focus on preventative measures or high-level strategic planning. The security practitioner needs to quickly assess, act, and improvise to stop adversaries that are already inside their organization’s network. Limiting damage and regaining operational control of the computing environment are key goals.
Above all, the plans and artifacts associated with incident response serve as a bridge from analysis to action. Good understanding of adversary tradecraft, reasonable predictions about likely avenues of attack, and clear, concise tactical response procedures help practitioners limit the negative impacts of cyberattacks. To seize the initiative, incident responders must limit their adversary’s mobility, disrupt their patterns of attack, and work to restore critical
services so that an organizations can continue to function. A practitioner must take a balanced, structured approach to developing both operational and tactical incident detection and response capabilities.
Assess how legislation, policies, and regulations shape incident detection and response practices
Employ incident detection and response tools and techniques necessary for successfully detecting, managing, and resolving incidents
Develop security countermeasures that reduce the negative impacts of incidents on organizational systems, operations, and personnel
Communicate the results of incident response activities to technical and nontechnical audiences for enhancing the security posture of an organization
Scenario
Review the full Final Project Scenario for this project. You have been tasked with providing an executive summary and plan (see below) to address the situation in the scenario.
Prompt
Your executive summary and plan must be submitted together and include the following critical elements. Most of the critical elements align with a particular course outcome (shown in brackets).
Executive Summary: Executives often rely on the executive summary of long or technical reports to give them the information they need. Your executive summary will contain an overview and a brief section on the legal, regulatory, and policy compliance issues that are of specific interest to the stakeholders.
Overview: The purpose of this summary is to highlight the main points of the report, and any findings or recommendations. Logically, you will write the overview portion of this report last. However, your final artifact will position this piece first for the audience.
Describe how the overall plan will enhance the security posture of the organization, using consumable language (i.e., no overly technical jargon or slang terms).
Discuss key takeaways (response procedures) based on the scenario, using consumable language.
Articulate how your team plans to operationalize this approach for better response to the executive stakeholders.
Legal, Regulatory, and Policy Compliance: In this section, you will discuss considerations related to the legal, regulatory, and policy compliance issues identified in the scenario. Consider some of the topics and issues you engaged with in Module One as you address this portion of your final project.
Explain how the legal and regulatory issues influence the organization’s approach to detection. Provide examples based on the scenario.
Explain how the legal and regulatory issues identified in the scenario influence the organization’s approach to response. Provide examples based on the scenario.
Explain your method for resolving gaps in resources or the processes that are necessary to address legal, regulatory, and policy compliance issues. Provide examples. For example, what specific policies are currently in place to address these elements, based on what you were provided for this project and your activities during the course?
Operational Plan and Analysis: The purpose of this section is for you to put together a plan that your team can operationalize if an incident such as the one in the scenario should occur again.
Incident Response Process With Key Roles and Responsibilities Assignments: You were provided with a diagram and table in the Milestone One document to use as the basis of this part of your project. If the table provided is too cumbersome, you may make your own. However, your completed table must contain and build on the provided information, addressing the steps within the full flow of a potential attack, as well as the key roles and responsibilities necessary for detecting and responding to the provided incident types.
Identify a logical sequence of steps stakeholders should take for addressing the scenario. For example, who should do what within the process?
Articulate the rationale behind the assignment of the roles and responsibilities for these steps. Ensure you address implementation concerns in your rationale.
Courses of Action Table: You were provided with a Courses of Action table template to use as the basis of this part of your project. Your completed courses of action table must address the full flow of a potential attack, specifically the one in your provided scenario.
Attack Methods and Features: Describe logical steps to model a potential attack from start to finish.
Detection Location and Methods: Describe potential detection location and methods for different steps in an attack pattern.
Response Objective: Identify the effects you want to achieve in countering the attack and how you want to achieve them.
Response Method: Identify response methods that are logical and feasible in addressing the nature of the attack.
Countermeasures Analysis: You have been exposed to several attack types and created your courses of action table. This section of your plan will contain a brief narrative around your thinking in creating that table and how your security countermeasures will address the nature of those attacks.
Explain how your security countermeasures will reduce the negative impacts from the attack methods on organizational systems.
Explain how your security countermeasures will reduce the negative impacts from the attack methods on organizational operations.
Explain how your security countermeasures will reduce the negative impacts from these types of attacks on your personnel (roles and resources).
Milestones
Milestone One: Incident Response Process Diagram With Key Roles and Responsibilities Annotations
In Module Three, you will submit section II.A (incident response process with key roles and responsibilities assignments) of the final project. This milestone will be graded with the Milestone One Rubric.
Milestone Two: Courses of Action Table
In Module Six, you will submit section II.B of the final project: the courses of action table. This milestone will be graded with the Milestone Two Rubric.
Milestone Three: Countermeasures Analysis
In Module Seven, you will submit section II.C of the final project: the countermeasures analysis. This milestone will be graded with the Milestone Three Rubric.
Final Submission: Executive Summary and Plan
In Module Nine, you will submit your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Project Rubric.
Your submission should be approximately 3 pages in length, not including the completed templates (plus a cover page and references), and should be written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins. Include at least three references, which should be cited according to APA style.

3. Writing a Project Report • The project report should be about 2,000 words and

3. Writing a Project Report
• The project report should be about 2,000 words and follow the approved style guide.
• The abstract should be between 150-250 words
• The project should be in “A4” size. You should follow Times New Roman font “12” for text, “10” for footnotes, provide double spacing and a larger font for the section headings, keep the orientation of the page as portrait, and specify a margin of 1 inch on all sides.
• The pages should have consecutive numbering.
• The project must contain:

The research problem statement needs to be very focused because everything else

The research problem statement needs to be very focused because everything else from the applied doctoral project or dissertation-in-practice logically flows from the problem. If the problem is too big or too vague, it will be difficult to scope out a purpose that is manageable, given the time to execute and finish the project. The problem should be the result of a practical need or an opportunity to further an applicational study or project. The research problem statement should do four things:
Specify and describe the problem (with appropriate citations).
Provide evidence of the problem’s existence.
Explain the consequences of NOT solving the problem.
Identify what is not known about the problem that should be known.
Instructions
For this assignment, review the peer-reviewed and/or case study articles investigated from Lesson 4. Create a problem statement based on your domain identified in Lesson 4. Provide a position statement pertaining to the framework that appropriately addresses your interest area identified in Lesson 3. In a paper, report your answers to the following questions:
What is the research problem? Identify the issue/concern that needs to be investigated from a strategic perspective.
What is the purpose of the study? Pinpoint what the study hopes to accomplish. Provide evidence of the problem’s existence. Explain the consequences of NOT solving the problem. Identify what is not known about the problem that should be known.
What is the research methodology/approach? Identified in Lesson 3. Explain the gap in the research, or the part of the program or procedure that is not efficient.
What are the research questions? The research questions guide how the study will be completed and determine how data collection and analysis will be completed.

Other than the fact that the title of the course contains both Business Intellig

Other than the fact that the title of the course contains both Business Intelligence AND Data Analytics, these two concepts seem like separate things, right?
Well that’s what this week’s discussion is going to find out.
While we won’t address data visualization in depth in this course, data visualization is never very far from any discussion of data analytics, so I’d like everyone (ALL students, not just the initial post group) to get acquainted with Google’s Ngram Viewer: Books Google.
Basically the Ngram Viewer allows you to see a graph of the occurrence of a given word or phrase over a specified period of years in the entire corpus of books contained in the Google Books collection. You can also enter several words or phrases to compare the evolution of usage over time. The default (sample) ngram on the day I visited was a comparison of Albert Einstein,Sherlock Holmes,Frankenstein which resulted in
Your tasks and the discussion topic(s) this week: 1. All students should use Ngram and try various combinations of
business intelligence,
data analytics, and
data science.
You might try allied terms such as
data analysis and
big data.
Be sure to change the years. You’ll definitely want to include the current year, and I think you’ll quickly find that years before 1900 (sometimes later) don’t show much. Think about what the graph is showing you regarding the usage of these various terms. Be aware that even if you enter the current year, Ngram may change that year depending on the data available (currently, it seems to default to 2008 as the most recent year available).
2. Initial post group: In addition to the Ngram exercise, members of the initial post group should also conduct a web search for definitions of at least business intelligence and data analytics. I’m sure you’ll find more than a few sites willing to compare the two. The topic this week is as follows:
Compare and contrast the terms business intelligencejavascript:; and data analytics. That is, how are they similar? How are they different? You should include in your initial post a brief discussion of the Ngram findings and a brief discussion of your search for definitions.
3. Reply group: In addition to the Ngram exercise, members of the reply group should also conduct a web search for definitions. Your role is to build on an initial post with additional insights and information that will further the discussion.
You may want to include a snip image, particularly of any Ngram that you create. Information about creating a snip of an image from your screen is given below in Additional Info. Note: LEO does not allow you to directly cut and paste an image into a discussion. You will need to save the file as an image and then click the small camera icon to insert the image. This is tedious but a good skill to learn.
Additional info:
If you want to delve deeper into Ngram (not required), you may have a look at wildcards and other advanced options.
If you’re not sure how to ‘snip’ an image from your screen or browser, here’s a tutorial from Microsoft and another from Apple. Please take care to take snip only of the image you want to share, NOT your entire screen.

PROJECT 1: INTERACTIVE SCRIPTING PONG GAME PROJECT DESCRIPTION For your first as

PROJECT 1: INTERACTIVE SCRIPTING PONG GAME
PROJECT DESCRIPTION
For your first assignment, you are required to modify an existing interactive JavaScript (JS) program. This project requires you to modify a remake of the famous Pong game invented by Nolan Bushnell in 1972 using JavaScript. Nolan Bushnell founded Atari two years later.
About the Game
The game of Pong resembles real-life Table Tennis or Ping Pong. The object of the game is to make your opponent miss the ball, thus earning a point. Paddles are used to bounce the ball in your opponent’s direction. This is a one-player version. The user controls the left paddle. The computer artificial intelligence (AI) controls the paddle on the right. The remakes of both versions of the game are incomplete but functional as an instructional guide.
PROJECT REQUIREMENTS
The JavaScript code for this assignment is embedded into an HTML file. Modify the HTML file to complete the assignment.
Please follow the steps below:
1. Download the JavaScript project file (project1JS.html.txt) attached to this project description.
2. Rename the file from project1JS.html.txt to project1JS.html (Remove the .txt file extension)
3. Place the downloaded project file into a folder you create on your computer. All of the files for your project should be placed in the same folder.
4. Open the project1JS.html file in a browser (e.g. Internet Explorer, Safari, Firefox).
5. Make sure the script works as it is intended.
5. Open the project1JS.html file in a text editor or web editor.
6. Modify the JavaScript code in the HTML file.
7. IMPORTANT! Rename the file back from project1JS.html to project1JS.html.txt (Re-add the .txt file extension). If you do not do this, your file will not be able to be downloaded and graded from LEO.
8. Upload your modified txt file to your Assignments Folder.
9. Verify that your submission was successful.
10. Complete and submit a Project Reflection.
WHAT DO YOU NEED TO COMPLETE THIS ASSIGNMENT?
To complete this assignment, you will need to edit the HTML project file. You can accomplish this by using:
1. a Text Editor such as Notepad++ for Windows or TextWrangler for Mac computers (both are free to download and use).
2. an online JavaScript compiler such as w3schools’ Try It Editor v3.0
Just replace the existing code in the column on the left with the contents of the HTML project file, modify it and test it by clicking the green Run button. The output appears in the right column..
PROJECT RESOURCES
The following resources may be helpful.
1. W3Schools.com JavaScript Tutorial
2. Project 1: Pong Game (instructional video)
Submission Requirements
Please complete the following changes:
1. Modify the speed of the ball.
2. Modify the size of the ball.
3. Modify the height of the canvas.
4. Modify the width of the canvas.
5. Modify the speed of the player’s paddle. (Note: The player’s paddle is located on the left side of the canvas)
6. Modify the speed of the AI’s (computer’s) paddle. (Note: the AI’s paddle is located on the right side of the canvas)
Note: Your modifications must alter the game but not in a way that makes the game unplayable. Experiment with different values to find ones that are not too extreme.
GRADING
Completing 6 out of 6 modifications in accordance with the assignment instructions will earn you 100% (A) on this project.
PROJECT REFLECTION
Answer the following questions when you submit your assignment files:
1. What modifications did you make to the script? Include details on what you changed in the code in order to achieve these modifications.
2. Did you make any advanced modifications? If yes, include details on what you changed in the code in order to achieve these modifications.
3. What issues and/or challenges did you face completing this project? How did you resolve them? If you did not face any issues and/or challenges in completing this project, what do you think are some issues and/or challenges someone new to scripting might face in completing a project like this? Note: Your reflection should describe issues and/or challenges related to completing the project itself and not to setting up the project, such as downloading/opening the files needed for the project, or issues in the online classroom. If you did not face any issues and/or challenges in completing this project, what do you think are some issues and/or challenges someone new to completing this kind of project might face in completing a project like this? How could they resolve them? Note: Your reflection must be a total of at least 200 words.