survey-analysis-3

I need help to summarize and analyze the survey about students engagements in campuse activites based on the given results.. for example: “More than half of the participate indicate that choosing the right day and time is an essential contributor to their attendance to campus activities. Thursday and Wednesday at afternoon seems to be the most appropriate time for them”

It should be in easy form, not doing each part separately.

The survey was taken by 24 people.. focus on analyzing the results and don’t get lost in the questions.

Please find attached the results

human-development-theories-and-research-designs-and-methods

Human Development Theories

In your discussions throughout the course, you will be evaluated on how well you can demonstrate that you understand the ideas presented throughout the unit, including assigned readings, discussions, media, and independent research. You will also be evaluated on the quality of your work—its academic rigor, how well it shows your ability to think critically, and how completely it covers the discussion topic. Refer to the Discussion Participation Scoring Guide to learn how your discussions will be evaluated.

In PSYC1000, you were introduced to the current major theories in psychology. In this course, we will dig deeper into the theories that are most relevant to the process of human development—or how people change in predictable ways over time.

To complete this discussion, respond to the following prompts:

  • What are the similarities and differences between a stage and a nonstage theory?
  • How do both types of developmental theories help us gain a deeper understanding of how people develop?
  • Do you think, from your experiences and observations, that people tend to develop in somewhat distinct stages, or gradually over time?

For this and all your course discussions, be sure to follow APA style rules for citing and referencing sources.

Guidelines for Responding to Peers

Please respond to at least two other learners. Questions to consider:

  • Did they see similarities or difference that you did not?
  • Do you see other ways that developmental theories help us gain a deeper understanding into how people develop?

Your responses should be substantive in nature and serve to advance the dialogue in a meaningful and thoughtful way. Be sure to keep the tone of your responses respectful and professional. Use APA-style citations and references.

Learning Components

This activity will help you achieve the following learning components:

  • Study human development theories.

Resources

Research Designs and Methods

In this unit, you reviewed the various research designs and methods employed by scientists who primarily study the field of lifespan development.

For this discussion:

  • Choose two lifespan development research designs, then compare and contrast their strengths and weaknesses.
  • Provide an example of a study in lifespan development that would be appropriate for the two types of designs you selected.
  • Discuss how these two types of designs help advance our knowledge about human development.

Guidelines for Responding to Peers

Please respond to at least two other learners. Questions to consider:

  • Do you have any suggestions for the strengths or weaknesses of the study designs being discussed?
  • Do you have additional thoughts on what design would be best for the example study?

Your responses should be substantive in nature and serve to advance the dialogue in a meaningful way. Be sure to keep the tone of your responses respectful and professional. Use APA-style citations and references.

Learning Components

This activity will help you achieve the following learning components:

  • Distinguish scholarly from popular sources of information.
  • Examine the research methods associated with a theory.

Resources

need-answers-for-data-science-and-big-data-analytics-questions-1

Required APA format in text citations and references.

  • 1) The text of the novel War and Peace can be downloaded from https://www.library.upenn.edu/ and used as the dataset for these exercises. However, other data sets can easily be substituted. Document all processing steps applied to the data.
    i) Use MapReduce in Hadoop to perform a word count on the specified dataset.
    ii) Use Pig to perform a word count on the specified dataset.
    iii) Use Hive to perform a word count on the specified dataset.
    2) Compare and contrast Hadoop, Pig, Hive, and HBase. List strengths and weaknesses of each tool set.
    3) Research and summarize three published use cases for each tool set.
    4) How does HBase differ from a traditional RDBMS with regards to file structure?
    5) Explain window function and how it is similar/different from the type of calculation that can be done with an aggregate function.
    6) Give regular expressions for the following:
    i) A regex that, given a URL, captures the domain name
    ii) A regex that captures PostgreSQL Dollar-quoted String literals
    7) Explain how you would use GROUPING SETS to produce the same results as the following GROUP BY CUBE.
    i) SELECT state, productID, SUM(volume) FROM sales GROUP BY CUBE (state, productID) ORDER BY state, productID
    8) Identify an “embarrassingly parallel” situation from your current work.
    9) Explain at least two benefits of YARN.


write-a-2-3-page-paper-2

Identify a company you want to work for upon graduation. Research the company and any job openings that company might have.

Write a 2-3 page paper that includes background information on the company, requirements of a job you want to apply for, and what you might need to do to meet those requirements prior to application.

You should use at least two sources (Wikipedia does not qualify as a viable source) and at least one should be a printed source. Use appropriate citations and include a title page and a reference page (not part of the 2-3 page requirement) in APA style.

Technical requirements:

1″ margins; left justification; 12 pt. Arial font; appropriate headings/subheadings

Submit the report as a word document.

unit-5-safe-assignment

MANDATORY: Use the following outline for your EACH of your numbered answers:

  1. Quote the Definition from the Textbook (with quotation marks and page reference);
  2. Put the same thing in your own words;
  3. Give an example (your own or from the textbook or another source you cite);
  4. Provide a website that supports your answer and explain how the website helps you understand the Term you are defining (provide the website address).

Persons who do not use this format risk earning a failing grade:

Assignment Questions:
(Definitions)

Define EACH of the following Terms:

  1. Legally enforceable
  2. Bilateral Contract
  3. Express Contract
  4. UCC
  5. Promissory Estoppel

cyber-security-project-3

its a Network Security Analysis for my Network security class. it has to be something simple and the instructions are attached in the pdf.

Write a one or two paragraph summary on your security analysis. Briefly explain who your customer is, what type of network they have, what some of your key concerns are.

Include FIVE or more questions that you want to ask the customer about their network. These should be questions that will give you information that will help you prepare for the analysis. If YOU are the customer, write down five questions that you want answered by the security analysis.

Using Microsoft Word (or in a Word-compatible .DOCX document), summarize the above information for the security analysis. Include the following information at the top of the page:

  • Class ID
  • Semester
  • Student Name
  • Customer description in one or two sentences

Example:

  • CMP 123
  • Spring 2019
  • John Doe
  • Four bedroom house, family of four, two adults and two teenage children with a variety of wired and wireless devices

Assignment Description: Network Security Analysis — Part 2 — Outline

Remember that this is just an outline for your security analysis. You are NOT performing these activities yet. This is creating your “To Do List” of items and issues you will analyze for the project.

Consider the following Security Analysis categories that were discussed in class and are contained in the security analysis template:

  • Network/Wireless Security
  • System (PC/Server) Security
  • Backups/Disaster Recovery
  • Physical Security
  • AAA (Authorization/Authentication/Accounting) User Education
  • Category: Wireless Network Security
  • Topic: Is the wireless network password protected?
  • Action: Use laptop to try and connect to wireless network.

For EACH of the above categories, create five to seven topics/questions in each category that you will analyze for your customer.

Then, for each topic/question, write a brief action item describing how you will approach that topic for your customer.

For example:

Your grade will be based on the quality of your questions and action items.

Using Microsoft Word (or in a Word-compatible .DOCX format), create an outline based on the categories that were discussed in class for the security analysis. Include the following information:

0 Class ID

Semester

Student Name

  • Customer description in one or two sentences
  • Family of four, two adults and two teenage children with a variety of wired and wireless devices

Example:

CMP 123

Fall 2015

John Doe

It is recommended that you try to write about at least one potential or actual vulnerability under each category for this rough draft. The more you have completed, the more useful my feedback will be.

outline-for-the-topic-of-change-in-organizations-following-the-sample-that-is-attached-in-the-requirements-cell

an outline similar style to the attached file but on the topic of change in organizations

help-please-168

Hello,

please look at the attached and write me 2 pages with all the requirements

thank you for help

read-a-couple-different-articles-and-answer-3-very-easy-questions-on-them-very-easy

Please have the answers at around 200 words all together.

Question 1: What were your reactions to Deborah Miranda’s article? What stood out to you, and why?

Article for Question 1: https://www.huffpost.com/entry/lying-to-children-about-t_b_6924346

Question 2: How does your K-12 education relate to the experiences mentioned in Lim’s article article? Why might this be problematic? How might this problem be resolved, or what does Lim advocate for in the article?

Article for Question 2: https://search-proquest-com.libproxy.sdsu.edu/docview/1655086010?pq-origsite=summon

Question 3: What stood out to you in the article “What the ‘California Dream’ Means to Indigenous Peoples”? What does the “California Dream” mean to Indigenous peoples, and what solution does Chilcote suggest?

Article for Question 3: https://theconversation.com/what-the-california-dream-means-to-indigenous-peoples-79889

write-both-1-amp-2-in-different-papers-need-references-and-citation-must

1)Chapter 13 discussed managing complex systems and chapter 15 introduced the advantages of visual decision support. Discuss how you would combine the two concepts to create visualizations for an ABM-Based Gaming simulation for policy making. First, describe what specific policy you’re trying to create. Let’s stick with the SmartCity scenario. Describe a specific policy (that you haven’t used before), and how you plan to use ABM-Based Gaming to build a model for simulate the effects of the policy. Then, describe what type of visualization technique you’ll use to make the model more accessible. Use figure 15.9 and describe what data a new column for your policy would contain.

2)Case: Locate NIST Special Publication inforamtion regarding IT strategic planning and provide how it can be applied to an organization.