Categories
Computer Science

To define a meaningful management problem or application, suppose you own a real

To define a meaningful management problem or application, suppose you own a real estate firm and you want to identify types of houses. Knowing types may help in marketing activities or in the assignment of territories to relators. Knowledge of housing types may be useful in appraising the value of properties for sale. If you were a real estate investor, you might want to identify properties that are undervalued when evaluated against comparable properties. You might look for anomalies or outliers. The unsupervised learning methods you use should provide guidance in addressing the management problem.
Select at least two cluster analysis methods to carry out the analysis. Justify your choice of methods. Justify decisions regarding the number of clusters to retain. Select a single clustering solution to present to the management client. Justify your selection. Utilize data visualization (including t-SNE) to guide your analysis and to present results to the client.

Categories
Computer Science

Same as the previous discussion in Week 5, select from the two topics below and

Same as the previous discussion in Week 5, select from the two topics below and answer the question in a detailed explanation.
(1) Based on the items below: What do think is most important when you design secure applications and architectures? How can it be implemented in the AWS cloud environment? Why is it important to be included?
Design secure access to AWS resources
Design secure application tiers
Select appropriate data secure options
(2) Based on the items below: What do think is most important when you design cost-optimized architectures? How can it be implemented in the AWS cloud environment? Why is it important to be included?
Identify elastic and scalable compute solutions for a workload
Select high-performing and scalable storage solutions for a workload
Select high-performing networking solutions for a workload
Choose high-performing database solutions for a workload

Categories
Computer Science

Margins: 1.25” Left, 1” Right, Top, Bottom • Paper size: standard 8” x 11” • Spa

Margins: 1.25” Left, 1” Right, Top, Bottom
• Paper size: standard 8” x 11”
• Spacing: 1.25
• Font and font size: Calibri, size 12.
• Boldface all relevant/important words or phrases

Categories
Computer Science

The instructions are in the attached Assessment Descriptor file. Take note that

The instructions are in the attached
Assessment Descriptor file. Take note that one assessment is 4600 words while the presentation is 900 words.

Categories
Computer Science

refer to the attached files for instructions. please make sure you are not copy

refer to the attached files for instructions. please make sure you are not copy and pasting the codes from anywhere. and please write the codes as simple as possible. I was already caught cheating so please be careful ??. thank you so much

Categories
Computer Science

Steganography is the age-old practice of concealing a message within another med

Steganography is the age-old practice of concealing a message within another medium. Unlike cryptography, where it is clear that there is a message or file present, but it is difficult or impossible to interpret it, steganography is the art of ‘hiding in plain sight’. Cryptography conceals the contents of the message; steganography conceals the message’s existence.
Digital steganography is the concealment of information within computer files. These files could be pictures, movies, audio, or any other file that offers the size and space to add a hidden message. There are a variety of techniques to do this and readily available programs on the internet that can assist. The detection of steganography is called steganalysis.
Discuss: Provide one detailed example each of a historic use of steganography and a current use of digital steganography. In these examples, how would steganography be implemented? How could this steganography be detected? Comment on the ethics of using this technology.
Interaction: At the end of your original post, add an interesting question for your classmates to answer.
Instructions:
Read and understand the question and address it fully in all its aspects.
The best answers will cite 3+ supporting sources in APA format and contain a solid rationale and/or additional facts.
Use some sources outside of the textbook and course lectures. The quality of the source matters, so try to use reputable sources.
Critically examine your response for spelling and grammar prior to posting. Avoid responding in first person.
Use the Preview button in the top right to check formatting. (Note: if you are copy-and-pasting from Word or similar, use CTRL+Shift+V to strip formatting, since Blackboard butchers it.)
Please post your original post (as a reply to this post – “Create Thread” button) by Friday, February 3, 11:59 PM. There is a flat 10% penalty for being late.
Please respond to a peer (as a reply to their posts – GRAY button) by Friday, February 10, 11:59 PM. The discussion closes at that point and will not re-open.
Limit the size of your posts to approximately 500-600 words.
Review any previous feedback.

Categories
Computer Science

Technical debt is the concept of incurred costs in software development when a l

Technical debt is the concept of incurred costs in software development when a limited or inefficient solution is chosen over a better development approach. As a result, additional time and costs are involved to re-work and improve the software or system. This occurs in organizations for multiple reasons, including the need to rush to market. What type of impacts could this decision have on the organizations developing the software or the consumers using it?
What type of selection methods can be used in these organizations to prevent technical debt from occurring when making these software decisions in the future?

Categories
Computer Science

[4pt] Give an analytical question which can be answered by desсrіptive analysis.

[4pt] Give an analytical question which can be answered by desсrіptive analysis. [4pt] Give an analytical question which can be answered by diagnostic analysis. [4pt] Give an analytical question which can be answered by predictive analysis. [3pt] Come up with a general business problem. [10pt] List a few analytical questions which can be solved/answered by individual projects. Please also indicate whether they are desсrіptive/diagnostic/predictive/presсrіptive question. [10pt] Pick one diagnostic or predictive analytical question from item 4 for this quesiton. If you are allowed to collect any data from the world, what data would you collect to conduct your analysis? Please list the 3 most important datasets you want to collect, and where do these data come from? (e.g. any commercial database? by survey? from business activities?…etc.) [5pt] Think about the data you mentioned in item 5, will there be any problem/difficult to obtain the data? (e.g. ″I want to use SSN for my ana
Important Info
The order was placed through a short procedure (customer skipped some order details).
Please clarify some paper details before starting to work on the order.
Type of paper and subject
Number of sources and formatting style
Type of service (writing, rewriting, etc)

Categories
Computer Science

[4pt] Give an analytical question which can be answered by desсrіptive analysis.

[4pt] Give an analytical question which can be answered by desсrіptive analysis. [4pt] Give an analytical question which can be answered by diagnostic analysis. [4pt] Give an analytical question which can be answered by predictive analysis. [3pt] Come up with a general business problem. [10pt] List a few analytical questions which can be solved/answered by individual projects. Please also indicate whether they are desсrіptive/diagnostic/predictive/presсrіptive question. [10pt] Pick one diagnostic or predictive analytical question from item 4 for this quesiton. If you are allowed to collect any data from the world, what data would you collect to conduct your analysis? Please list the 3 most important datasets you want to collect, and where do these data come from? (e.g. any commercial database? by survey? from business activities?…etc.) [5pt] Think about the data you mentioned in item 5, will there be any problem/difficult to obtain the data? (e.g. ″I want to use SSN for my ana
Important Info

The order was placed through a short procedure (customer skipped some order details).
Please clarify some paper details before starting to work on the order.

Type of paper and subject
Number of sources and formatting style
Type of service (writing, rewriting, etc)

Categories
Computer Science

Overview You work as a C++ and OpenGL 3D graphics developer for Triangle & Cube

Overview
You work as a C++ and OpenGL 3D graphics developer for Triangle & Cube Studios. This company designs 3D worlds for clients and customizes them based on the varied needs presented by each particular client.
In this professional landscape, the demand for computational graphics and visualizations is continually growing. Your clients may come from the games industry looking for graphics and animations, the healthcare industry for medical visualizations, the entertainment industry for computer-generated imagery (CGI) and visual effects, business industries for 3D printing to create physical objects for applied real-world problem solving, and much more. When you are assigned one of these types of projects, you become responsible for writing code in OpenGL to create objects, apply texture, apply light, render, and control virtual environments relative to a virtual camera.
Your current project with Triangle & Cube Studios is to recreate a 3D version of a 2D image that you have been given by a client. Your client will later be 3D printing this to use as a preliminary concept for their business, so they only need you to create a simple approximation using a few basic shapes.
This week you will begin recreating the 2D scene by constructing just one 3D object. Note that you will be using the image you selected last week for this task.
Prompt
Using the image you selected in the Module Two milestone, begin creating a 3D object to represent one of the objects in your 2D scene. The object you create in this milestone will need to be made from two or more primitive 3D shapes. You will complete your work in Visual Studio. Be sure to work from a project file that has the libraries set up correctly from your work in Module One.
Specifically, you must address the following rubric criteria:
Create a complex 3D object using at least two primitive shapes. The object you create should be reflective of one object from your 2D scene. At this stage of your object’s creation, you should add different colors to each vertex of the object. This will help you better visualize the variance between the different parts of the shapes you are creating. Note that the code you already have uses rainbow colors on the shapes that are provided; if you use this code you may keep that rainbow format. Remember, the shapes you may wish to use are as follows:
Cube
Cylinder
Plane
Pyramid
Sphere
Torus
Apply transformations so shapes are scaled, rotated, and translated (placed) correctly. This work should be relevant for the 2D reference image. For example, if you are working with a cylinder, should it be standing up or lying on its side, based on the image you are referencing? If you are also creating a cube, where should it be placed relative to the cylinder? What sizes are the two objects when compared to each other? It will be easier if you complete these transformations in the right order for your specific object. In general, you will wish to first scale, then rotate, and then translate. While this is not always the case, that is the most likely order for your process to follow.
Create code that follows a logical flow without syntax errors. The code you create needs to be executable and all the code that is included will have to be reached by the execution. Note that not everything should be written in a single function and your work should be well-modularized.
Apply coding best practices in your creations. Pay particular attention to the way you format and comment your code. Program code should be easy to read and follow industry standard code formatting practices, such as indentation and spacing. Commenting best practices should be in place to ensure the source code is briefly and clearly explained using descriptive comments.
Guidelines for Submission
Submit a completed ZIP folder with all of your code, which may include one or multiple CPP files along with Visual Studio project files. Also make sure the ZIP folder includes an EXE file, because without this your code will not be able to run. Checking for the EXE can be used as a quick reference on the functionality of your code before you submit. Reference the Visual Studio Export Tutorial, linked in this week’s Resources, for guidance on how to download the necessary ZIP folder.