The instructor will have activities in the classroom discussing the topics for t

The instructor will have activities in the classroom discussing the topics for t

The instructor will have activities in the classroom discussing the topics for the session, including, but not limited to:
Discuss Skewness of a Distribution
Consider the four examples for histograms with different levels of skewness shown in Figure5.12 (page 186.) Using your common sense and general knowledge, try to guess the expected skewness (either left, symmetric, or right) for the following nine examples. Explain why.
Length of hospital stay
Birth weight
Family income
Daily stock market returns
Age of death
Female shoe size
Scores in easy exam
Housing prices
Adult male height
Discuss Predicting Skewness from Summary Statistics (5-02 Statistical Analysis of Distributions of Quantitative Variables,
Consider the frequency polygon chart in Figure 5.14b (page 188.) The distribution of female and male age at death is skewed left. How could we have used the summary statistics of location, such as mean and median described on page 193, and the measure of variation such as the quartiles, described on page 196, to predict the existence of skewness in the distributions of female and male age at death?
Besides the charts shown in figure 5.14 (page 188), which other data visualization technique could you have used to display the female and male age at death distributions?
How many outliers does the distribution have?
Possible in-Class Assignment
Create an infographic on the various concepts learned from this chapter. Share the infographic as a PDF. The infographic should include at least one key concept from each section of the chapter
Information on these aforementioned topics will be presented by your professor during this class.
Individual/Group activities will also be determined by your professor and the outcomes of those activities will be submitted in this space. Some of those possible activities will include:
Group Case Studies
Full-Class Case Studies
Individual Deliverables
Class divided into subgroups to advocate for certain points-of-view on a topic in a point-counterpoint discussion with other groups
Group presentations
Any other activity as determine by the instructor
Whatever the instructor chooses for you to do, there will be at least one artifact generated from the classroom activity that will be uploaded to this Classroom Activity Assignment representing individuals or assigned groups. This may include a word doc, spreadsheet, presentation or any other artifact as designated by the instructor. At least half of the participation grade (25 points) will be tied to this in-class activity and will be graded by the instructor.
You will need your own laptop in the classroom for this activity. Please make sure it’s charged and ready to go.
Students must be in the classroom for the opportunity to earn these points.

ScenarioThe Corporation Techs’ current network consists of 1 web server (accessi

ScenarioThe Corporation Techs’ current network consists of 1 web server (accessi

ScenarioThe Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.
The senior network architect has asked you to create a network design that includes the following components:
-Current infrastructure elements
-A logical topology that separates the Accounting and Sales departments
-Redundant communications
-Justification for continuing with IPv4 or upgrading to IPv6
TasksFor this part of the project, perform the following tasks:
1.Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.
2.Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.
3.Include a high-level plan that ensures communications are available 24/7.
4.Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.
5.Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.
6.Create a draft report detailing all information as supportive documentation.
7.Cite sources, where appropriate.
Required ResourcesInternet access
Submission RequirementsFormat: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: Your school’s preferred style guide
Length of report: 3–4 pages
Self-Assessment ChecklistI determined the best network design to ensure the security of internal access while retaining public website availability.
I designed a network configuration with physical and logical topologies, and identified major network elements and their locations within the private and protected network segments.
I created a plan that ensures communications are available 24/7.
I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.
I created a basic network diagram that illustrates the current network and enhancements.
I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
I followed the submission guidelines.
***NO plagiarism***

Hello, I’m looking for some help with two assignments with my Fundamentals Info

Hello, I’m looking for some help with two assignments with my Fundamentals Info

Hello, I’m looking for some help with two assignments with my Fundamentals Info Technology Class, Instead of explaining here I will just attach the question and example here.

Create a 14-slide PowerPoint presentation and audio recording directed to projec

Create a 14-slide PowerPoint presentation and audio recording directed to projec

Create a 14-slide PowerPoint presentation and audio recording directed to project stakeholders presenting project plan details that include the following:
Executive summary
Charter
Scope
Stakeholder registry
Work breakdown structure (WBS)
Gantt chart
Project budget
Communication plan
Risks plan
Quality plan
Procurement plan

PART I – separate word doc from part 2 Respond to assigned questions using the

PART I – separate word doc from part 2
Respond to assigned questions using the

PART I – separate word doc from part 2
Respond to assigned questions using the lessons and vocabulary found in the reading. Support your answers with examples and research and cite your research using the APA format. 2 to 4 pages
In light of the following comments, discuss the questions listed below:
The value chain model identifies primary and support activities within the organization relevant to the transformation process.
What is the focus and principle objective of industry analysis applied to IS? Select two of the five competitive forces (new entrants, substitute products or services, bargaining power of buyers, bargaining power of suppliers, and the rivalry between existing competitors), and offer examples of firms that you believe have been able to influence those two forces by way of an IT-dependent strategic initiative. Justify your answers, and comment on the postings of your peers.
Describe the focus and principle objectives of value chain analysis applied to IS. Why is it important to contextualize the value chain? Provide two examples of firms that you think have been able to create competitive advantage using IS. Identify the primary activities most affected by IS in these firms.
For each barrier to erosion (IT resources, IT project, complementary resources, and preemption barriers), provide an example of an IT-dependent strategic initiative that, in your opinion, leverages the barrier. Discuss which response-lag drivers underpin the barriers to erosion in your examples. How do you think the lag can be shortened? Do you think this will reflect on the profit line? Why or why not?
PART II – separate word doc from part 1
Value creation with IS
You should be familiar now with the different frameworks and analytical models to evaluate strategic IS initiatives. In this phase of the project you will need to conduct the following tools to evaluate the different new IS initiatives you proposed in Week 3:
Industry analysis
Value chain analysis
Customer service life cycle analysis (CSLC)
You will also need to apply the sustainability framework in your case study based on your recommended initiatives.
Create your report for this part of the project in approximately 6–8 pages in a Microsoft Word document. Support your answers with examples and research and cite your research using the APA format make sure include graphs.

i’m working on a artificial intelligence report and need the explanation and ans

i’m working on a artificial intelligence report and need the explanation and ans

i’m working on a artificial intelligence report and need the explanation and answer to help me learn
Need an essay of 8-9 pages on AI privacy of the below topic
Exploring the broader societal impacts of ethical or unethical AI privacy technologies, including their effects on vulnerable populations, and considering potential consequences for individuals, organizations, and society as a whole.
rubric is
essay will be evaluated based on the following criteria:
(a) Topic Relevance: Ensuring that your essay’s content aligns with one of the specified lecture topics.
(b) Concept Understanding: Demonstrating a clear understanding of key ethical and responsible AI concepts.
(c) Critical Thinking: Exhibiting critical thinking skills by evaluating diverse perspectives on ethical AI and offering nuanced insights into the complexities of ethical AI.
(d) Writing: Displaying effective writing skills, including clarity, coherence, and proper grammar.
(e) Citations and References: Properly citing and referencing sources used in your essay, adhering to a recognized citation style -APA.
I Will just give you the reference papers, but you have to do the own research about the topic of privacy .

Create the project plan and Gantt chart for your Final year project of one year

Create the project plan and Gantt chart for your Final year project of one year

Create the project plan and Gantt chart for your Final year project of one year duration.
Note my project is Patient Care System
Add tasks and sub tasks
Add task dependencies
Create work, material and cost resources
Assign resources to subtasks
Identify the critical path of this project

ANNOTATED BIBLIOGRAPHIES The research process is iterative, focused on finding s

ANNOTATED BIBLIOGRAPHIES
The research process is iterative, focused on finding s

ANNOTATED BIBLIOGRAPHIES
The research process is iterative, focused on finding substantiating published research for your selected topic. As research is conducted, it can be very difficult to organize and maintain large collections of relevant research materials. Thus, researchers use different tools and techniques to ensure they have their sources organized, categorized, and in a format that enables them to quickly recall each article’s topic and primary points of relevance, thus making it easier to locate and include in various formal research documentation.
One such tool is an annotated bibliography, which is a listing of references with a short annotation describing the content, the purpose, the quality, and the relevance of the resource to a research topic.
Annotation for a single resource provides you with a summary and an evaluation of a specific resource.
An annotated bibliography contains multiple annotations and provides you with a good perspective on what’s currently being published about a topic.
An annotated bibliography is not a formal component of formal research documentation; however, it is a useful tool that contributes significantly to the development of formal research documents. Reviewing an annotation in an annotated bibliography is much easier than returning to and reviewing the original resource materials you collected during the research process. Think of the annotation as a detailed note to yourself about the content in the resource, the quality of the resource, and the applicability of the resource to your research topic.
Additionally, a well-constructed annotated bibliography can make it easy to copy and paste the content into a literature review, including citations and formatted references. However, modern researchers may use other tools to add reference content in their literature reviews, instead of an annotated bibliography. Examples of such tools include RefWorks and EndNote. You can learn more about these options in the library. For this course, the traditional annotated bibliography is required.
RESOURCE ANNOTATIONSIt’s generally a good idea to create an annotation for every collected resource to help you analyze and organize your research materials. When you create a resource annotation, you’re forced to read the resource more carefully and critically instead of just documenting information.
Annotations should be written concisely and should include only significant and relevant details about the resource, such as a summary of the main points in the article, the purpose of the article, an evaluation of the resource quality, and the value of the resource in relation to your topic.
Figure 1
Annotation Example
AnnotationKey
(1) Merrill, M. D. (2007). The Proper Study of Instructional Design. In R. A. Reiser and J. V. Dempsey (Eds.). Trends and Issues in Instructional Design and Technology (Vol. 2, pp. 336-341). Upper Saddle River, NJ: Pearson Prentice Hall.
(2) In this chapter, the definition of instructional design as a field, the application of instructional design theory, and the role of an instructional designer is questioned and distinguished. (3) The author calls for clarification of instructional designing and attempts to debunk the claim that everyone is a designer. (4) The author has been well-versed in the field of instructional design for four decades with over fifteen publications and has created three theories that help define instructional design and technology. (5) The article brings to light the current misconceptions about the practice of instructional design and proposes alternative ways to research and apply instructional design theories.
(1) Reference
(2) Summary
(3) Purpose
(4) Evaluation
(5) Reflection
The image above provides a visual example of an annotation identifying the five sections of an annotation.
Reference: Provides a properly formatted resource reference.
Summary: Summarizes the key points of the article. Ask yourself, “What is this article about?”
Purpose: Indicates the purpose of the article. Ask yourself, “Why was this article written?”
Quality Evaluation: Evaluates the quality of the article. Ask yourself, “Is the author, publisher, and content in this article credible, accurate, and relevant?” You may need to do a little extra research to answer this question.
Relevance Reflection: Reflects on the relevance of the article to your research topic. Indicate why the resource should be included in an annotated bibliography with other similar resources. Ask yourself, “How does this resource support or relate to my research topic?”
It’s important to note that you are not required to limit the different components of the annotation to a single sentence. You may use several sentences to summarize, evaluate, and reflect on the resource. However, you should try to omit background materials, references to previous work by the same author, and any information that is apparent from the title.
Annotation Formatting Tips:
Do not use in-text citations in an annotation.
Start the annotation on the next line after the reference.
Do not add an extra line or additional spacing between the reference and the annotation.
Use double spacing throughout.
Use formal academic writing. Never use first or second person references in research papers.
SIGNATURE ASSIGNMENT PREVIEWThe culminating signature assignment due towards the end of the course may require you to complete some work ahead of the due date. To ensure you are prepared and have adequate time to complete this assignment, please review the instructions by looking ahead to the signature assignment. Contact your professor if you have questions.
Assignment: Develop an Annotated Bibliography
Instructions
For this assignment, you must select a research topic in your specialization and use the template provided in the weekly resources to create an annotated bibliography containing at least 5 scholarly resources. Plan to use your completed assignment to help you with the development of a literature review in the next assignment. You will also be required to add this annotated bibliography as an appendix to the research proposal you will develop at the end of the course.
NOTE: Your research topic does not need to be the topic you intend to use during your dissertation, but if you choose your topic wisely, you can use the materials you create in this course to guide your dissertation.
Your annotated bibliography should contain the following:
An introduction that describes the topic, not the resources or annotations.
A selection methodology that describes why the resources were included in the annotated bibliography
An annotation section that includes APA formatted annotations for each of the five scholarly resources.
A reference list that provides a list of the resources following APA guidelines.
Formal academic writing is used. Never use first or second-person references in research papers.
Length: 5-7 page academic paper following APA guidelines
References: Include a minimum of 5 scholarly resources
The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, and reflect academic expectations and current APA standards.
References:

You have just been assigned as the security consultant to a project to address s

You have just been assigned as the security consultant to a project to address s

You have just been assigned as the security consultant to a project to address security issues with the company’s wireless network. Some highly confidential information was leaked when an executive lost her tablet. What wireless security policies and management tools will you recommend—and why?
The student will post thread of at least 350 words

writing a methodology of research talking about smart switches I got explaining

writing a methodology of research talking about smart switches I got explaining

writing a methodology of research talking about smart switches I got explaining video to help you understanding the idea and working processes note: the videos in arabic