Computer Science Homework Help

Computer Science Homework Help. Simple problem using python, google colab, tensorflow, and keras. Small programming part, and some questions

 

Complete and step by step solution is required. Inline comments are required. All parts are required, including the parts that says (OPTINAL). THE PARTS THAT SAYS (OPTIONAL) ARE REQUIRED!!

The answer to the questions, and any other info required by the instructions can be placed in the Conclusions sections in the code in the form of a report. Correct, and appropriate answer are required, including good grammar and spelling.

What I need to get back is a link to the google colab with the complete code, the answer to the questions, the modifications, (Including the parts that says (Optional)), and any other info required in the instructions.

PLEASE MAKE SURE THAT THE LINK I’M RECEIVING CAN BE OPENNED BY ANYONE.

In the following link is the book (in case is needed) -> https://drive.google.com/file/d/17TkO2F3l2nAnEW5np…
In the following link are the instructions -> https://drive.google.com/file/d/1fUhd_87cATBeEm-iN…
In the following link is the starter code -> https://colab.research.google.com/drive/1ZHNs3tDCq…


Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. SJSU Data Management Systems Microsoft SQL Server Discussion

 

Textbook Chapter 4 

This week our discussion focus is data.

Discuss a system that you work with frequently and that has a major data component. 

Note the system, type of data, how the data is managed and maintained, and any other important factors.

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. San Jose State University ?algorithms of Cluster Analysis Questions

 

This week we also discuss the concepts in chapter seven, which deals with the basic concepts and algorithms of cluster analysis.  After reading chapter seven answer the following questions:

  1. What is K-means from a basic standpoint?
  2. Is a binary variable the same as a dichotomous variable? Provide scholarly justification 

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. San Jose State University Continuous and Categorical Attributes Discussion

 

This week we discuss association analysis and the advanced concepts (in Chapter six).  After reviewing the material answer the following questions:

  1. Discuss four  (2) techniques in handling categorical attributes?
  2. Discuss two (2)  ways in which continuous attributes differ from categorical attributes?

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. Beauty Academy of South Florida Computer Security and Public WiFi Networks Scenario Analysis

 

In this assignment you will be responding to a series of different scenarios. There is one set of questions that you will use for all scenarios given. The questions will be answered and given in a document that you will be uploading. This is an exercise to get you to think and there are no exact right and wrong answers. You still may need to research some things to answer the questions to the best of your ability so make sure to use APA citations for all sources used if you research anything.

Questions to answer:

1. Who should you notify internally in your organization?

2. Who should you notify external to your organization if any?

3. What resources would you use to resolve the incident?

4. What would be your course of action? How would you recover? (give this in the form of a narrative timeline)

5. How would you prevent (or mitigate) incidents like these in the future?

Scenario #1

An employee casually remarks about how generous it is of state officials to provide the handful of USB drives on the conference room table, embossed with the State logo. After making some inquiries you find there is no state program to provide USB drives to employees. Further investigation subsequently found an unspecified password-stealing keylogger. The spyware was designed to upload stolen usernames and passwords to a server under the control of hackers.

Scenario #2

An employee calls to ask for the password for the Wi-Fi network, indicating they would like to use it on their personal cell phone so they can check Facebook on their lunch break. You don’t have a Wi-Fi network. A scan of the building indicates there are 4 Wi-Fi networks, clearly originating from within government space and broadcasting a variety of names that suggest people are using them for work purposes. In the course of follow-up to this report it is found that all 4 devices are plugged into your hard wired network. Two have logging enabled and show that they are being used by employees for official work purposes

Scenario #3

Upon review of your logs, several of your organization’s internet facing assets are being scanned. After investigation, the scans are originating from what seems to be a legitimate private cyber security company. The private company acknowledges the scans but refuses to disclose any information such as who ordered the scans due to a non-disclosure agreement (NDA). The scans from the same source continue to scan other external facing assets and the private company still refuses to disclose any information.

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. Week 7 Ethics and Professional Code of Conduct Discussion

 

Case Study

A country with a history of corruption and bribery has made great efforts via education and prosecution to conduct government business in an open and fair way. The country has made considerable progress. As part of its reform, the country overhauled its visa procedures for foreigners wanting to live in the country. In the previous corrupt environment, people with money would secretly pay off a government employee to have their visa application approved quickly, while other visa applications took much longer. Now the government has made the application procedure transparent and established a new procedure in law. The new procedure offers two visa tracks, the “Regular Track”, which does not require any payment, and the “Premium Track”, which requires a US $10,000 payment. The Regular Track takes just as long to process a visa application as an application without a bribe took before the reforms. The Premium Track moves along just as quickly as a visa application with a bribe took before the reforms. Most people wanting to immigrate to the country cannot afford the Premium Track.

Q1. What are the issues of integrity, ethics and law posed in the case study? (150 -200 words).

Q2. What options does the country have, and what should it do and why? (100 -150 Words).

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. BSA 425 University of Phoenix XYZ Internet Bank Project Report

 

  1. Conducting research and creating a supporting research report serves two important purposes with respect to your project:
    • It explains your technological choices in terms of business benefits and risks. This explanation is critical for executive approval.
    • It either reinforces or improves your plan—but only if you apply the results of your research to a new draft of your plan. In the industry, project managers develop their plans iteratively by changing them as they conduct more research and identify better or cheaper alternatives. This iterative approach is especially relevant to IT projects because new technologies are being developed and retired at a very quick pace.
    • For this assignment, you will compile research and create a supporting research report. Then, based on your research, you will identify and explain the rationale for three improvements to the project plan you submitted last week.
      Compile additional research on your project’s industry, recommended technology vendors, and the categories presented in the supporting research report. You may want to include the Gartner Group and Forrester Research in your list of organizations to research.
      Complete the Supporting Research Report template.
      Create a second draft of your project plan. Highlight in yellow at least three changes you made to the network, database, and/or cloud solutions within the second draft based on the in-depth research you conducted this week and explain why you made the changes.
      Submit your Supporting Research Report and second draft.

      Resources
      https://www.gartner.com/en

      https://go.forrester.com/

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. BSA 425 UP Wk 3 Unbiased Sources of Information when Researching Trends Discussion

 

I’m working on a cyber security question and need guidance to help me study.

  1. Constructing a rationale requires research, and research requires identifying unbiased sources of information. Clearly, you cannot rely on a company’s own marketing materials to be unbiased in its evaluation of its own products.Write a 150-word response about how you approached locating and vetting high-quality, unbiased sources of information when researching trends, vendors, and other easily hyped topics. How satisfied are you with your ability to identify unbiased recommendations for a specific project type? Why?

Computer Science Homework Help