I need help to summarize and analyze the survey about students engagements in campuse activites based on the given results.. for example: “More than half of the participate indicate that choosing the right day and time is an essential contributor to their attendance to campus activities. Thursday and Wednesday at afternoon seems to be the most appropriate time for them”
It should be in easy form, not doing each part separately.
The survey was taken by 24 people.. focus on analyzing the results and don’t get lost in the questions.
In your discussions throughout the course, you will be evaluated on how well you can demonstrate that you understand the ideas presented throughout the unit, including assigned readings, discussions, media, and independent research. You will also be evaluated on the quality of your work—its academic rigor, how well it shows your ability to think critically, and how completely it covers the discussion topic. Refer to the Discussion Participation Scoring Guide to learn how your discussions will be evaluated.
In PSYC1000, you were introduced to the current major theories in psychology. In this course, we will dig deeper into the theories that are most relevant to the process of human development—or how people change in predictable ways over time.
To complete this discussion, respond to the following prompts:
What are the similarities and differences between a stage and a nonstage theory?
How do both types of developmental theories help us gain a deeper understanding of how people develop?
Do you think, from your experiences and observations, that people tend to develop in somewhat distinct stages, or gradually over time?
For this and all your course discussions, be sure to follow APA style rules for citing and referencing sources.
Guidelines for Responding to Peers
Please respond to at least two other learners. Questions to consider:
Did they see similarities or difference that you did not?
Do you see other ways that developmental theories help us gain a deeper understanding into how people develop?
Your responses should be substantive in nature and serve to advance the dialogue in a meaningful and thoughtful way. Be sure to keep the tone of your responses respectful and professional. Use APA-style citations and references.
Learning Components
This activity will help you achieve the following learning components:
In this unit, you reviewed the various research designs and methods employed by scientists who primarily study the field of lifespan development.
For this discussion:
Choose two lifespan development research designs, then compare and contrast their strengths and weaknesses.
Provide an example of a study in lifespan development that would be appropriate for the two types of designs you selected.
Discuss how these two types of designs help advance our knowledge about human development.
Guidelines for Responding to Peers
Please respond to at least two other learners. Questions to consider:
Do you have any suggestions for the strengths or weaknesses of the study designs being discussed?
Do you have additional thoughts on what design would be best for the example study?
Your responses should be substantive in nature and serve to advance the dialogue in a meaningful way. Be sure to keep the tone of your responses respectful and professional. Use APA-style citations and references.
Learning Components
This activity will help you achieve the following learning components:
Distinguish scholarly from popular sources of information.
Examine the research methods associated with a theory.
Required APA format in text citations and references.
1) The text of the novel War and Peace can be downloaded from https://www.library.upenn.edu/ and used as the dataset for these exercises. However, other data sets can easily be substituted. Document all processing steps applied to the data. i) Use MapReduce in Hadoop to perform a word count on the specified dataset. ii) Use Pig to perform a word count on the specified dataset. iii) Use Hive to perform a word count on the specified dataset. 2) Compare and contrast Hadoop, Pig, Hive, and HBase. List strengths and weaknesses of each tool set. 3) Research and summarize three published use cases for each tool set. 4) How does HBase differ from a traditional RDBMS with regards to file structure? 5) Explain window function and how it is similar/different from the type of calculation that can be done with an aggregate function. 6) Give regular expressions for the following: i) A regex that, given a URL, captures the domain name ii) A regex that captures PostgreSQL Dollar-quoted String literals 7) Explain how you would use GROUPING SETS to produce the same results as the following GROUP BY CUBE. i) SELECT state, productID, SUM(volume) FROM sales GROUP BY CUBE (state, productID) ORDER BY state, productID 8) Identify an “embarrassingly parallel” situation from your current work. 9) Explain at least two benefits of YARN.
Identify a company you want to work for upon graduation. Research the company and any job openings that company might have.
Write a 2-3 page paper that includes background information on the company, requirements of a job you want to apply for, and what you might need to do to meet those requirements prior to application.
You should use at least two sources (Wikipedia does not qualify as a viable source) and at least one should be a printed source. Use appropriate citations and include a title page and a reference page (not part of the 2-3 page requirement) in APA style.
Technical requirements:
1″ margins; left justification; 12 pt. Arial font; appropriate headings/subheadings
its a Network Security Analysis for my Network security class. it has to be something simple and the instructions are attached in the pdf.
Write a one or two paragraph summary on your security analysis. Briefly explain who your customer is, what type of network they have, what some of your key concerns are.
Include FIVE or more questions that you want to ask the customer about their network. These should be questions that will give you information that will help you prepare for the analysis. If YOU are the customer, write down five questions that you want answered by the security analysis.
Using Microsoft Word (or in a Word-compatible .DOCX document), summarize the above information for the security analysis. Include the following information at the top of the page:
Class ID
Semester
Student Name
Customer description in one or two sentences
Example:
CMP 123
Spring 2019
John Doe
Four bedroom house, family of four, two adults and two teenage children with a variety of wired and wireless devices
Assignment Description: Network Security Analysis — Part 2 — Outline
Remember that this is just an outline for your security analysis. You are NOT performing these activities yet. This is creating your “To Do List” of items and issues you will analyze for the project.
Consider the following Security Analysis categories that were discussed in class and are contained in the security analysis template:
Network/Wireless Security
System (PC/Server) Security
Backups/Disaster Recovery
Physical Security
AAA (Authorization/Authentication/Accounting) User Education
Category: Wireless Network Security
Topic: Is the wireless network password protected?
Action: Use laptop to try and connect to wireless network.
For EACH of the above categories, create five to seven topics/questions in each category that you will analyze for your customer.
Then, for each topic/question, write a brief action item describing how you will approach that topic for your customer.
For example:
Your grade will be based on the quality of your questions and action items.
Using Microsoft Word (or in a Word-compatible .DOCX format), create an outline based on the categories that were discussed in class for the security analysis. Include the following information:
0 Class ID
Semester
Student Name
Customer description in one or two sentences
Family of four, two adults and two teenage children with a variety of wired and wireless devices
Example:
CMP 123
Fall 2015
John Doe
It is recommended that you try to write about at least one potential or actual vulnerability under each category for this rough draft. The more you have completed, the more useful my feedback will be.
Question 2: How does your K-12 education relate to the experiences mentioned in Lim’s article article? Why might this be problematic? How might this problem be resolved, or what does Lim advocate for in the article?
Question 3: What stood out to you in the article “What the ‘California Dream’ Means to Indigenous Peoples”? What does the “California Dream” mean to Indigenous peoples, and what solution does Chilcote suggest?
1)Chapter 13 discussed managing complex systems and chapter 15 introduced the advantages of visual decision support. Discuss how you would combine the two concepts to create visualizations for an ABM-Based Gaming simulation for policy making. First, describe what specific policy you’re trying to create. Let’s stick with the SmartCity scenario. Describe a specific policy (that you haven’t used before), and how you plan to use ABM-Based Gaming to build a model for simulate the effects of the policy. Then, describe what type of visualization technique you’ll use to make the model more accessible. Use figure 15.9 and describe what data a new column for your policy would contain.
2)Case: Locate NIST Special Publication inforamtion regarding IT strategic planning and provide how it can be applied to an organization.