Ask the user to input the degree of the polynomial.
Based on the inputted degree, ask the user to input the different polynomial coefficients.
Generate a range X of values between 100 and 100.
Calculate polynomial P(x) for all values of range X. These results should be allocated in a vector P.
Plot the graph of P(x) in a figure titled Graph of Polynomial.
P(x) should be plotted in blue.
The title should be in blue, Font Size 16, Font Weight bold.
The x-axis should be labelled x-axis in red, Font Size 12, Font Weight bold.
The y-axis should be labelled y-axis in red, Font Size 12, Font Weight bold.
The figure should display major and minor grid lines.
x-axis limits should be set between the first and final roots 2.
&nb
The assignment is a python notebook with a problem to be solved.
The marking scheme is :
Depth of analysis: 25% of marks.
Analysis appropriate to questions: 25% of marks.
Quality, clarity and organization of analysis code: 25% of marks.
Answers based in analysis: 25% of marks.
FiftySeven Coffee 57C is a coffee retailer who is in a phase to further develop its current product portfolio (coffee). The current product offering has 13 attributes. 57C's board believes that consumers are not considering all attributes as important when they buy their coffee. Moreover, the board wants to know how each attribute is being perceived with respect to the market benchmark of importance. The board is ready to focus more onto the important attributes when they offer their coffee in the future. To do so, 57C has conducted a survey to understand the decision making buying behavior of its consumers when they buy their coffee. They asked their consumers about their perception regarding the 13 attributes and to rate their overall satisfaction towards the current product offering as well as their buying behavior in the future from 57C.
Research Report - Twitter Analysis and Presentation
The aim of this assignment is to collect Twitter data, summarise the data using a spreadsheet or other tool, and then write a report about that data. The purpose of the report is to investigate and discuss the use of twitter analysis by researchers, brands or journalists (depending on your major). The report is not meant to be written as a public facing report or feature, but rather an internal research report that might be used in a professional context or to inform your own practices.
You can choose to follow a group of people or a hashtag/hashtags over a period of time that will yield a reasonable sized data set ( a few thousand tweets at least up to a max of 250 thousand is about the right size for this task, much bigger as Excel will struggle to open the file). Suitable targets could be hashtags for a TV show or media event, a new or defective product, a group of journalists attending a conference or the conference
create a diagram for a better approach for compliance, based on one of the following frameworks: PCI, HIPAA, NIST, or any other accepted framework.
Ideally, the network will be an Enterprise class consisting of 1000+ clients for various corporate departments, with 50-100 servers providing typical network services. The network infrastructure will be using Layer 3 switches and layered routing to provide separation of subnets.
Your diagram, at a minimum, should include the following secure network design elements: Firewalls, IDS/IPS, DMZ, Vlans, Border and Gateway routers, private IP addressing, Isolated Server Subnets, Network Access Control, and VPN concentrator.
The file s81170-cipher.bin contains data encrypted using the ARIA-128-CBC method.
First decrypt data in the file s81170-cipheredkey.bin. They were encrypted with RSA and can be decrypted with the function RSA_private_decrypt (). Optimal asymmetric encryption padding was used. You must therefore specify RSA_PKCS1_OAEP_PADDING as a parameter. You can work with the function PEM_read_PrivateKey () from the file rsakey.pem.
Now decrypt the data in the file s81170-cipher.bin. The type of the ARIA-128-CBC procedure is returned by the EVP_aria_128_cbc () function in libcrypto. Using the key parameter (key, possibly initialization vector, in this sequence), you have decrypted in the last step. The length of the required parameters can be determined from the type with the functions EVP_CIPHER_key_length () and EVP_CIPHER_iv_length ().
Encrypt the plain text with the cipher CAST5-CFB, the type of which returns the function EVP_cast5_cfb64 (). Using the key parameters (key
This assignment will allow students to bring together everything they have learned about protein composition, folding, and function to analyze how a well-characterized enzyme, carbonic anhydrase, functions within the human body.
Write a 2,500- to 3,000-word essay analyzing the composition, folding, and mechanism of action of the enzyme carbonic anhydrase in the human body. Use current research literature (reference a minimum of 12-15 peer-reviewed journal articles) to examine this enzyme's functions, its genetics, and expression(s) of carbonic anhydrase in the human body, and explain how carbonic anhydrase helps the body to maintain homeostasis and how loss of this enzyme function can lead to disease in the body.
Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.
This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with