[SOLVED] Data Visualization

Show us an example of data visualization and explain why you think it is great. It could be a static or interactive map, graphic, chart, or piece of data journalism. Why did you choose this example? How would you improve it? You can select from one of the examples below or you can choose your own example to write about in your response. If you choose your own example, please upload one document that includes your essay response as well as a URL link to the data visualization. Below are the link to access those examples. I personally prefer the The Birthday Paradox example The Gaps Between White and Black America, In Charts: https://www.nytimes.com/interactive/2020/06/19/opinion/politics/opportunity-gaps-race-inequality.html Analyzing the Gender Representation of 34,476 Comic Book Characters: https://pudding.cool/2017/07/comics/ The World’s Deadliest and Most Infectious Diseases, In One Chart: https://informationisbeautiful.net/visualizations/the-microbescope-infectious-diseases-in-context/ The Birthday Paradox Experiment: https://pudding.cool/2018/04/birthday-paradox/

Read more

[SOLVED] Assistive Technology

Research an assistive technology device that interests you and is relevant for use with individuals who have been diagnosed on the Autism Spectrum. Can be new or previously used technology. Include how the technology can be used, where the technology can be located and purchased, training availability, and sources of funding. APA should be used throughout the paper.

Read more

[SOLVED] Quality Control

Please refer to the course PPT slides and write the assignment.Title: Quality control for spatial big data and GIS modelingThis assignment addresses uncertainty modeling and quality control for spatial big data, such as Google Map, Open Street Map or other maps on internet, Twitter, Facebook and other social media data.• Assignment report should include, but not limited to:o Various errors and uncertainties in spatial big datao Sources which cause the errors and uncertaintieso Impact of these errors and uncertainties to the applications of the spatial big data.o Methods to measure the quantity of the errors and uncertainties.o Methods to control or reduce the errors in the data.o Future research trends on quality control for spatial big data.Amount: 1000 – 2000 wordsAttached are the PPT slides.

Read more

[SOLVED] IT Networking

1)Research and define a complex and realistic network setup, including specific devices that would make part of the network. 2) Research 2 vectors, that hackers could use to gain access to the network (or parts of it), as well as mitigation solutions to protect against such attacks. 3) Write a report to document the research carried out. REPORT STRUCTURE: A 5-page IEEE double column format report including all figures, tables and references. 1. Executive Summary • Brief description of the scope and objectives. • Brief description of the network and justification why you chose this network type. • Summary of key findings and recommendations. 2. Network Setup • Describe the process you followed to define the network setup (e.g., researched network types, researched specific devices, etc.). • Discuss the aspects that make this a realistic and complex network setup. Page 1 of 3   • Draw and include a diagram of your network setup. Note that if you choose a large network you should only draw its main components and devices (e.g., do not draw tens or hundreds of clients but draw a client device from different categories such as HR, IT, lecturer, student, etc.). • Describe the network characteristics, its type (e.g., LAN, WAN, etc.), its purpose (e.g., home network, SME network with only company devices or both company and BYOD devices, campus network, hospital network, etc.). • Include a summary table of the main devices making up the network (e.g., client devices, servers, routers, switches, appliance firewalls, IoT devices, etc.). For each specific device or device class include the main hardware (e.g., manufacturer, model), and software details (e.g., OS, main service application like Apache/IIS web server, main client application, etc.). Do not include too many details, but include details that are important for the attack vector (e.g., mention your network card chip and firmware if you will discuss some vulnerability with them, mention the vulnerable client application that can be exploited such as MS Word, Chrome, or Zoom, etc.). • Assumptions that you make related to your network setup (e.g., if client devices run older OS version like Windows 7 or Android 8, provide some market share statistics or estimates to show the percentage of devices using this version globally or in specific context, e.g., hospitals). Your main assumption is that the network and devices are quite secure, so focus on recent vulnerabilities and attacks (e.g., from the past 2-3 years). • The idea is not to just have a generic diagram but a personalised network. For example, if you choose to focus on a home network, personalise it with specific devices you personally have (e.g., smartphones, laptop/desktop PCs, gateway/router, TVs, game console, IP camera or other IoT devices, etc.), and if your network would be too basic expand it by adding some more specific devices that you would like to have. If you choose to focus on a company network, connect to your work experience (if you have any) and/or do some research and exemplify with specific routers/switches/firewalls that a company may use (e.g., by Cisco, Juniper, etc.), servers and/or client desktops/laptops that a company may use (e.g., by Dell, Apple, etc.), client devices that BYOD employees would potentially use (e.g., Windows / Mac OS / Linux laptops, iPhones, Android Smartphones, etc.). Note that you may also consider that many companies use cloud services, rather than buying and maintaining their own HW servers. • Make sure to cite all relevant sources you consult while defining your network setup. 3. Attack Vectors • Start the section with a paragraph summarising how the attack vectors are different (e.g., in terms of techniques, targeted technologies / devices, vulnerabilities, exploits, etc.). • It would also be good to include a table summarising the main characteristics of the attack vectors (e.g., type, techniques, vulnerability CVE and name, exploit, etc.). • Have a separate subsection with meaningful heading for each of the attack vectors. • In each subsection include a detailed description of the attack vector, interpretation and critical analysis of the findings. The details can include but may not be limited to: o Motives(e.g.,eavesdrop,monitoractivity,stealinformation,ransom,etc.). o Techniques(e.g.,physicalaccess,socialengineering,firewallbypassing,passwordattacks,DDoS, implanting malware, exploiting software vulnerabilities, etc.). o Targetdevices/technologies–whichspecificdevicesand/ortechnologiesfromyournetworkare being targeted (e.g., wireless technologies WiFi / 4G / Bluetooth, network devices like routers / switches / appliance firewalls, servers, client devices, IoT devices, etc.). o Vulnerabilities (e.g., in hardware, software, protocols). Include CVE numbers and details about specific vulnerabilities that could be exploited as part of the attack (e.g., you can search databases such as https://cve.mitre.org/ or https://nvd.nist.gov/). o Exploits – detail any known exploits for the vulnerabilities (e.g., you can search Google and/or exploit databases such as https://www.exploit-db.com/). o Impactoftheattackifsuccessful. o Reference and briefly describe real world security incidents that used this attack vector on individuals or companies to support your answers.    Page 2 of 3 4. Mitigation Solutions • Research and discuss mitigation solutions and provide recommendations on how individuals / organisations can protect themselves against these attacks (e.g., best practices, firewalls, IDS, anti-virus, network segregation, VLANs, etc.). • Reference and discuss specific patches/update numbers, new guidelines (e.g., NIST SP 800-63 B (2020) for password guidance), or legislation (e.g., California bans default passwords), new standards (e.g., WPA3), and discuss what would be the consequences for the users (e.g., using stronger passwords may be cheaper than buying WPA3 access points). 5. Conclusions • Include an overall discussion of the main findings, limitations and implications. • Detail next steps (i.e., what else would you do if you had more time).

Read more

[SOLVED] Computer Network

Read five articles and analyze them into a matrix that I have already made    I will send over five articles and readings for the assignment

Read more

[SOLVED] Cellular Architecture

All questions must answered with viable support and detail.  Your answer cannot simply be a cited source answering the question.  Please be sure to follow APA guidelines for citing and referencing source.This assignment is a summative1. Time division multiple access was used early in cell phone systems to carry how many voice channels on a single frequency derived channel?2. What code does CDMA use to encode individual cell phone conversations?3. Which cell phone transmission technology uses spread-spectrum transmission?4. Which of the following has a complex security system that is based on encryption: PCS, GMS, PSTN, or WAP?5. Through a web search contrast CDMA with PCS systems. Which major providers offer CDMA, and which PCS?6. Search for the keyword WAP on http://Scholar.Google.com. Are there any details on how to hack during a WTLS-to-SSL conversion? Write your findings in detail here, including proper citation and references.

Read more

[SOLUTION] Integration Frameworks

In Unit 4, as we enter the systems integration selection phase, we must select the technical integration framework, and describe and illustrate our systems integration architecture.For this Discussion Board assignment, share how you think integration frameworks typical to the systems integration selection phase are best used to represent an integration of your system components.

Read more

[SOLUTION] Locating Credible Databases and Research

Create a 1-2-page resource that will describe databases that are relevant to EBP around a diagnosis you chose and could be used to help a new hire nurse better engage in EBP.Evidence-based practice (EBP) integrates the best evidence available to guide optimal nursing care, with a goal to enhance safety and quality. EBP is crucial to nursing practice because it incorporates the best evidence from current literature, along with the expertise of the practicing nurse. The concern for quality care that flows from EBP generates a desired outcome. Without these factors, a nurse cannot be an effective leader. It is important to lead not only from this position but from knowledge and expertise. To gain the knowledge, you require a good understanding of how to search for scholarly resources, as well as identify which databases and websites are credible for the purposes of implementing evidence-based changes in practice.Demonstration of ProficiencyBy successfully completing this assessment, you will demonstrate your proficiency in the course competencies through the following assessment scoring guide criteria:Competency 1: Interpret findings from scholarly quantitative, qualitative, and outcomes research articles and studies.Explain why the sources selected should provide the bestevidence for the chosen diagnosis.Competency 2: Analyze the relevance and potential effectiveness of evidence when making a decision.Describe the best places to complete research and what types of resources one would want to access to find pertinent information for thediagnosiswithin the context of a specific health care setting.Competency 4: Plan care based on the best available evidence.Identify five sources of online information (medical journal databases, websites, hospital policy databases, et cetera) that could be used to locate evidence for a clinicaldiagnosis.Competency 5: Apply professional, scholarly communication strategies to lead practice changes based on evidence.Describe communication strategies to encourage nurses to research the diagnosis, as well as strategies to collaborate with the nurses to access resources.Communicate using writing that is clear, logical, and professional with correct grammar and spelling using current APA style.Professional ContextAs a baccalaureate-prepared nurse, you will be responsible for providing patient-centered, competent care based on current evidence-based best practices. You will be required to do research, analysis, and dissemination of best evidence to stay abreast of these best practices. Understanding where to go to find credible sources and locate evidence, as well as which search terms to use, is the foundation of incorporation of best practices.ScenarioYou are supervising three nurses working on the medical-surgical floor of a local teaching hospital. This hospital is nationally recognized as a leader in education and has a computer lab with an online library where staff has access to medical research databases (that is, CINAHL, PubMed, Medline, and Cochrane library) and online sources of all hospital policies, procedures, and guidelines, and computers at nurse workstations that also have access to these resources. (For this scenario, use the Capella University Library to simulate the hospital’s online library.) You have given the nurses their patient assignments and you have all participated in shift report. A new nurse who just completed orientation and training a week ago approaches you and tells you that one of the assigned patients has a diagnosis he or she is very unfamiliar with. Knowing that patient-centered care based on best practices is imperative to positive patient outcomes, you want to assist this nurse to find research that can be utilized to provide the best care for this patient. Describe how you would communicate with this nurse to encourage him or her to research the diagnosis. Assume you will assist in the quest to locate evidence, then describe where you would go within the facility and what resources you would look for. These resources may include websites, journals, facility policies or guidelines, or any other sources of online information.

Read more

[SOLUTION] Information and Computer Security

This research is on state computer use and abuse statutes. NYS Penal Law Article 156 covers how New York State deals with computer crime. Research state’s (Alaska) computer crimes penal law and compare it with NYS Penal Law Article 156.

Read more

[SOLUTION] Windows 10 Upgrade Planning

Discussion:In the future, you may be asked to develop a plan to upgrade more than 100 Windows 7 and Windows 8.1 computers.Describe how you would make the upgrade. Consider the following questions as you formulate your initial post:Would you preinstall printer drivers, network configs, applications, local policies, Windows update services, security configs, etc.? What risks are associated with your plan?What are your assumptions (e.g., user data, wipe and load, etc.)?What deployment method would you choose (e.g., single machine installs [SneakerNet], ghosting, SCCM OSD [Operating System Deployment])?Would you prebuild an image?You should review the course content, labs, and conduct internet research to determine important factors before starting a deployment of Windows 10.

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information