+1(316)4441378

+44-141-628-6690

Archive for the ‘Graduate’ Category

Correlation

Part 1: Interpreting Correlations
A meta-analysis (Anderson & Bushman, 2001) reported that the average correlation between time spent playing video games (X) and engaging in aggressive behavior (Y) in a set of 21 well-controlled experimental studies was r+ = .19. This correlation was judged to be statistically significant. In your own words, what can you say about the nature of the relationship? Write a one-page response to this question.

Part 2: Correlations
You will use the following resources for this assessment. They are linked in the Resources.

Complete this part of the assessment using the DAA Template.
Read the SPSS Data Analysis Report Guidelines for a more complete understanding of the DAA Template and how to format and organize your assessment.
Refer to IBM SPSS Step-By-Step Instructions: Correlations for additional information on using SPSS for this assessment.
If necessary, review the Copy/Export Output Instructions to refresh your memory on

C Program

write a simple C program. (No headings or screen captures are required.) You will submit a single .c file.

Here are the requirements of the program:

1. Ask the user for their age in years.

2. Ask them for their height in inches.

3. Ask them for their weight.

4. Calculate and show their age in months.

5. Calculate and show them their height in feet (this will be a decimal number).

6. Calculate and show their BMI.

Glycolysis, Gluconeogenesis, and the Role of Aldolase Gene Expression: Presentation

Regulation of glycolysis and gluconeogenesis is a critical concept in biochemistry and often difficult for students to learn. This assignment allows the student to formulate a presentation on the topic and link this to the regulation of aldolase expression in various tissues of the body.

Give a 25-minute lesson teaching with a PowerPoint presentation. Each of the following topics should be covered (review the rubric for context):

-An overview of the glycolysis and gluconeogenesis pathways
-How aldolase is involved in both glycolysis and gluconeogenesis
-The different isoforms of aldolase and their different expression patterns
-An examination of how Aldolase B expression can be regulated by transcription factors HNF-1, HNF-3, C/EPB, and DBP

The lesson presentation should include a title and reference slide and have between 10-15 content slides. At least four references should be cited (only one can be the textbook).

Nelson, D. L., & Cox, M. M. (

Network Defense System

It is essential to have a basic understanding of network defense topologies in order to properly comprehend the defensive strategies deployed by companies to protect their information assets.
Use the Cisco Packet Tracer application to create a network diagram that makes use of the following devices listed below, which belong to Company X. The diagram should illustrate your knowledge of network defense by placing network assets in their proper location, so as to ensure their protection. Include, within the diagram, any small office/home office (SOHO) solutions that will be used to protect either the infrastructure or end-user devices.
Within the diagram make sure to include at a minimum:
10 mobile devices (phones/laptops/tablets)
Five desktop/stationary computers
Two servers (file/email)
One printer
One router/firewall
One WAN/gateway connection
One switch
One corresponding backup/replication asset for disaster recovery (local or remote storage/server)
N

Microservices Architecture Project

Please see attached document with specifications. Not sure what the effort would be in doing this whole project so any feedback on Design timeline is welcome. Interested in a  Book ordering system with multiple Customers and their details would be a starting point for discussion. Some fields would be :
Customer Name
Customer Phone Number
Customer Email address
Transaction history
Number of Books purchased, what they were.
Orders Paid for and shipped
Customers Wish List
Has Customer Made any complaints or returned items- details of.
Any feedback would be welcome. I'm not sure re cost,  apologies if you feel its too low. I am flexible re price. thx

Microservices Architecture Project

Please see attached document with specifications. Not sure what the effort would be in doing this whole project so any feedback on Design timeline is welcome. Interested in a  Book ordering system with multiple Customers and their details would be a starting point for discussion. Some fields would be :
Customer Name
Customer Phone Number
Customer Email address
Transaction history
Number of Books purchased, what they were.
Orders Paid for and shipped
Customers Wish List
Has Customer Made any complaints or returned items- details of.
Any feedback would be welcome. I'm not sure re cost,  apologies if you feel its too low. I am flexible re price. thx

Office Supply Store Data Analysis

An office supply store tests a telemarketing campaign to its existing business customers. The company targeted approximately 16,000 customers for the campaign. Assume you are a consultant brought on board to help the company leverage and use the findings from the tests to its advantage. Refer to the accompanying spreadsheet, which contain the results of the tests.
The detailed requirements and expected deliverables are mentioned in Capstone Assignment.docx.
Three sample presentations are attached for reference. Data to be used are in excel file.

Understanding Cyber Conflict: 14 Analogies – Discussion Forum #4

Understanding Cyber Conflict: 14 Analogies - Discussion Forum #4

In Stephen Blank's discussion of Russian Information Warfare, Cyber Warfare, and "Political Warfare" what are the 3 key takeaways do you make from his discussion? In your opinion, is Russian actions in cyberspace "cyber terrorism" in the traditional understanding? In what areas can the United States evolve and learn from the Russian example and philosophical differences in their view of cyber warfare

Your initial post should be at least 500 words.

Use the following for reference

https://carnegieendowment.org/files/GUP_Perkovich_Levite_UnderstandingCyberConflict_FullText.pdf

Understanding Cyber Conflict: 14 Analogies - Chapter 5

Semantic Caching Demo on SparkSQL and HDFS

Overview: A caching system management used in SparkSQL/Apache Spark and HDFS

Requirements: SparkSQL, ApacheSpark, HDFS, Data caching algorithm and English skills.

Motivation: We are now using the HDFS to store and manage the data. And we do also the data analytics using SparkSQL in Apache Spark.

Normally, the Application Driver of Apache Spark will load the distributed data in HDFS into memory and do the processing. Finally, Spark will return the results to the HDFS. Sometime, the results we got from previous queries could be used again once or more time by next queries. Then, we want to cache these result in our memory long enough by using a mechanism of caching, it called semantic caching.

What we want is: an implementation of semantic caching program in Apache Spark. The program should be done by Scala/Java language but Scala is preferable.

Browser Extension

I need a simple browser extension for chrome. It must do the following things:

1) have a user sign-in with username and password and verify user info against a SQL database. keep the user signed in even after closing the browser. Have a logout button once signed in.

2) when the extension detects you are on a specific site have it overwrite & autofill info into a sign-in form using database information only if the user hasn't exceeded the maximum number of active sessions allowed by the database.

3) display users active sessions for that site in the extension.

4) once user signs into site track users active sessions on the site and report back to the SQL database and close sessions once the user leaves the site or clicks to sign out on the site

5) when a user deletes the extension open up a specific page