Please do a correct solution without mistakes, without similarities, without pla

Please
do a correct solution without mistakes, without similarities, without
pla

Please
do a correct solution without mistakes, without similarities, without
plagiarism. Put the answer in the file and make sure to solve all the
paragraphs. If you do a good job, I have many assignments that I will
ask you to do. Check yourself and do your best.

1- Question one: Explain using your own words the following sentence: “Project

1- Question one:
Explain using your own words the following sentence: “Project

1- Question one:
Explain using your own words the following sentence: “Project
managers play a key role in helping projects and organizations succeed”.
2- Question Two:
Explain why it is much more expensive to make major changes to a project during later phases of the project life cycle.
3- Question Three:
Perform a financial analysis for a project using the format table provided in Module 4. Assume the projected costs and benefits for this project are spread over four years as follows: Estimated costs are $150,000 in Year 1 and $35,000 each year in Years 2, 3, and 4. Estimated benefits are $0 in Year 1 and $85,000 each year in Years 2, 3, and 4. Use a 12 percent discount rate, and round the discount factors to two decimal places. Create a table to calculate and clearly display the NPV, ROI, and year in which payback occurs. In addition, write a paragraph explaining whether you would recommend investing in this project, based on your financial analysis.
4- Question Four:
Project monitoring and controlling is done throughout the life of a project and involves all 10 project management knowledge areas.
Why monitoring and controlling is important?
Discuss at least two ways to monitor and control a project.
_______________________________________________________________________
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template (attached)
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.

Please read “An overview of the Measuring Geographic Distributions toolset”. Mak

Please read “An overview of the Measuring Geographic Distributions toolset”.
Mak

Please read “An overview of the Measuring Geographic Distributions toolset”.
Make sure to read “Measuring Geographic Distributions toolset concepts” in that section as well.
http://help.arcgis.com/en/arcgisdesktop/10.0/help/index.html#/An_overview_of_the_Measuring_Geographic_Distributions_toolset/005p00000014000000/ (Links to an external site.) (Links to an external site.)
For the discussion questions, please use Brown’s article titled “Spatial Segregation, Segregation Indices and the Geographical Perspective”
Summary of the article 150-200 words

Over 2,500 words and uses a minimum of 5 unique scholarly peer reviewed journal

Over 2,500 words and uses a minimum of 5 unique scholarly peer reviewed journal

Over 2,500 words and uses a minimum of 5 unique scholarly peer reviewed journal articles from well-respected IT journals that directly relate to and sufficiently support the research. Cannot be AI Generated

Your discussion question response should be at least 200 Words, Malicious Code,

Your discussion question response should be at least 200 Words,
Malicious Code,

Your discussion question response should be at least 200 Words,
Malicious Code, or Malware, attacks all three information security properties: Confidentiality, Integrity, and Availability. It is a threat to any Internet-connected device.
What are the types of Malware being used today (Name two), and explain in your own words what they do.

For the coding part I need screen shots in the document. Not files. Last time I

For the coding part I need screen shots in the document. Not files. Last time I

For the coding part I need screen shots in the document. Not files. Last time I got files and not a PDF with the pictures and the report. That is what I need
It says “please proceed according to the instructions in the attached file. Ensure you capture a screen shot after executing each line of code and provide an example of what each line does.”
Instructions attatched

Phase 1 Network Design Trine University looking for Consultation Company to des

Phase 1 Network Design
Trine University looking for Consultation Company to des

Phase 1 Network Design
Trine University looking for Consultation Company to design the network for Indiana Campus.
The Campus has Internet connection with one ISP.
You have four programs’ departments; Engineering, Nursing, IT, and Finance; in additional to the staffing and the management departments.

Your design should include:
Network Diagram.
IP address distribution.
VLAN names and related IP subnets.
Network devices required for your design (with their models, pricing and specifications if possible) …. (such as: Firewalls, Routers, Switches, WAP, IP Phone, …).
Network Servers and Applications required for your design.
In Phase 1, student need to submit draft for the whole project requirements, then finalize the project with presentation on Next Week. Student need to take into consideration the instructor feedback on the submitted draft when completing the final version.
Notes:
This assignment must be formatted in APA Style 7th edition.
the explanation should be added to each step

Phase 1 Network Design Trine University looking for Consultation Company to des

Phase 1 Network Design
Trine University looking for Consultation Company to des

Phase 1 Network Design
Trine University looking for Consultation Company to design the network for Indiana Campus.
The Campus has Internet connection with one ISP.
You have four programs’ departments; Engineering, Nursing, IT, and Finance; in additional to the staffing and the management departments.

Your design should include:
Network Diagram.
IP address distribution.
VLAN names and related IP subnets.
Network devices required for your design (with their models, pricing and specifications if possible) …. (such as: Firewalls, Routers, Switches, WAP, IP Phone, …).
Network Servers and Applications required for your design.
In Phase 1, student need to submit draft for the whole project requirements, then finalize the project with presentation on Week 8. Student need to take into consideration the instructor feedback on the submitted draft when completing the final version.
Notes:
This assignment must be formatted in APA Style 7th edition.
Please refer to the Written Assignment rubric on the start here tab for this paper
explanation should be added for each design stage

Assignment 3 – Text mining This is an individual assignment. Please be sure to w

Assignment 3 – Text mining
This is an individual assignment. Please be sure to w

Assignment 3 – Text mining
This is an individual assignment. Please be sure to watch the recorded “Assignment Lectures” for Assignment 3 (two parts) before you start. Lecture videos are under Content and contain step-by-step demos. You have to submit the Excel Graph activity before you progress to this assignment.
Purpose: Some of the most important data that we have are large quantities of text data. Text data includes books, articles, blog posts, social media posts, emails, reports, journals and diaries, shopping lists, etc. etc. etc. This data is unstructured and can be massive. We have software tools available to help us make sense out of large quantities of text data. When we use software to analyze and try to make sense out of text data, we call this text mining. A practical example of this is chat bots. Chat bots utilize algorithms to try to make sense out of what the user types so it can select an appropriate response. In this assignment we will explore the text mining strategies of looking at word frequency and occurrences. Other methods beyond the scope of this class include part of speech tagging and machine learning.
Tasks:
In this assignment you will need files or web links (URLS) with text data. Please watch the How-To video before you start the assignment. You will use two free browser-based text mining tools to analyze your text.
Task 1. Visualizing Word Frequency. Looking at the frequency of occurrence of each word can give you an overall sense of a document. You will use your first file to create a word cloud to visualize frequency and understand how stop words affect word frequency analysis. We will use WordClouds for this.
Task 2. Taking a deeper look at word frequency and occurrence. For the second text document we will use Voyant Tools to explore other visualization methods as well as look at word correlations.
Download the attached Word document Template add your screen shot for Task 2 and answer the questions for each task. This website can show you how to take a screenshot on whatever device you are using.
Steps for Task 1:
1. Open the following website: Word Clouds
2. Watch this HowTo video. To create a Word Cloud, you can upload a file or paste text or submit a URL.
3. Personalize your Word Cloud by using different Theme, Shape, Gap, Font or other options. Observe that Stop Words can be included or excluded. They are excluded by default, so you have to create two Word Clouds from the same text: one with and one without the stop words. The website has the common English stop words already.
4. Save your Word Clouds as two images, called “WordCloud with Stop Words” and “WordCloud without Stop Words”. Use the PNG file format. Submit these images to the Assignment 3 drop box.
5. Answer the questions in the Word document for Task 1.
Steps for Task 2:
1. Open the following website: https://voyant-tools.org/
2. Paste in some URLS or paste the text from your Task 1 text file or from a different text file.
3. You will see data in five different windows and each window has a tab.
a. In the upper left window click ‘Links’
b. In the upper middle window click ‘TermsBerry’
c. In the upper right window, leave it on ‘Trends’ (or click it if it’s not there)
d. In the bottom left window, leave it on ‘Summary’ (or click it if not there)
e. In the bottom right window, click ‘Correlations’
4. Take a screen shot of the entire screen and add it to your Word document.
5. Answer the questions in the Word document for Task 2.
P.S. Other tools that can also be used for this task:
LINCS Project mirror
Huma-Num mirror
Upload the following:
1. Two Word cloud images, and Word document with screenshots and answers to the questions for Tasks 1 and 2
2. Your text files that you used in Tasks 1 and 2, or the URLS you used.