Reflection Paper – VI-SPDAT case study

Imagine that you are living in a post-Apocalyptic future version of Indianapolis. You have been tasked with creating a system to allocate resources in a manner similar to how VI-SPDAT assigns housing in order to assist in this transition. Specifically, you need to provide accommodations for the following resources: food, water, and housing.

  1. How would your system determine how and to whom these resources were assigned?
  2. What ideologies motivated the solutions you’ve proposed?
  3. Compare your solution to the VI-SPDAT case study. What ideological or practical similarities or differences are made apparent?

Brief summary of the software engineering tools used in development including IDE, frameworks, and software quality assurance tools.

Try to use AWS and Devops Concepts
The report should contain the following:
· Brief summary of the software engineering tools used in development including IDE, frameworks, and software quality assurance tools.
· Discussion of related software quality assurance theories and practices related to the project development
· Critical review of the software quality assurance tools and techniques used in the development and real practice experiences in the overall software development lifecycle.
· Discussion on future work if the project goes beyond the level defined in the coursework specification.
The Report should:
· Follow a logical Structure (Abstract, Preface, Main body, Conclusions, References )
· All sources should be acknowledged and fully referenced, including URLs etc. where appropriate
· Any quotations (from other sources) should be clearly marked as such, and referenced
· Be of publishable quality
The report should contain the following:
· Brief summary of the software engineering tools used in development including IDE, frameworks, and software quality assurance tools.
· Discussion of related software quality assurance theories and practices related to the project development
· Critical review of the software quality assurance tools and techniques used in the development and real practice experiences in the overall software development lifecycle.
· Discussion on future work if the project goes beyond the level defined in the coursework specification.
The Report should:
· Follow a logical Structure (Abstract, Preface, Main body, Conclusions, References )
· All sources should be acknowledged and fully referenced, including URLs etc. where appropriate
· Any quotations (from other sources) should be clearly marked as such, and referenced
· Be of publishable quality

Technology And Criminal Justices

Technology And Criminal Justices 

  1. Identify and describe at least 3 less-than-lethal options that are available to law enforcement.
  2. Identify and describe at least 1 new less-than-lethal or nonlethal technology that is currently under development.
  3. Make sure to include the following in your paper:
    • What are some of the advantages and disadvantages of using less-than-lethal weapons?
    • What are some of the concerns about the inappropriate use of less-than-lethal weapons, such as torture?
    • What use of force policies would you suggest to govern the use of less-than-lethal weapons?
  4. Include a title page, abstract, and separate reference page.

Cloud Computing And Digital Forensics

Answer below two questions.
1) Go  to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case. Using WORD, in your OWN WORDS, write an ORIGINAL brief essay of 300 words or more.
Summarize the case, Give your opinion of the decision and describe how the case deals with the material in this chapter( Graves text, Legislated Privacy Concerns.)
2) Cloud computing/cloud security:
Compare and evaluate in 500 words or more qualitative verses quantitative risk assessment.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) these quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. Write in essay format not in bulleted, numbered or other list formats. It is important that you use your own words, that you cite your sources that you comply with the instructions regarding length of your post.

Cyber Research

Cyber Research 
In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.

Cyber Research

Cyber Research 
In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.

IT leader in the digital transformation era

Paper Requirements:   Review the section on the IT leader in the digital transformation era.  Note how IT professionals and especially leaders must transform their thinking to adapt to the constantly changing organizational climate.  What are some methods or resources leaders can utilize to enhance their change attitude?
This assignment must be submitted by 11:59 PM on Sunday, April 12, 2020 (No Exceptions).  As per the syllabus, no late assignments will be accepted.
The paper should be one-page in length and adhere to APA formatting standards.
**Remember the page length does not include the APA cover page or any references**
Please understand that Plagiarism will not be tolerated and will result in a zero grade. Please review the Academic Dishonesty Policy outlined in the syllabus and in your student handbook.

Case study or story of an emerging  information technology

Choose a case study or story of an emerging  information technology. Find an article online or through the UMUC Library. Then do a brief analysis of the technology and its potential impact on business.
Your response should be 3-5 pages excluding title page and bibliography.
Be sure to cite and list the main source reference and any additional sources used in correct APA format.

Case study or story of an emerging  information technology

Choose a case study or story of an emerging  information technology. Find an article online or through the UMUC Library. Then do a brief analysis of the technology and its potential impact on business.
Your response should be 3-5 pages excluding title page and bibliography.
Be sure to cite and list the main source reference and any additional sources used in correct APA format.

Python regression

Problem 1:
Based on the Python regression example code that I explained in the video, apply the polynomial feature and fit the diabetes data set. Plot your new model and compare it with the linear model that I explained by finding the mean squared errors.
Problem 2:
One of the data sets that can be found in SKlearn in python is boston. You can load it using load_boston. Follow the steps we followed for the diabetes data set to fit this dataset using linear regression.