Group Category Projects Group Name Team 5 Instructions The Project WBS is due as shown in the schedule. Use the weekly readings to understand the concepts and what is required for the assignment. Submit this assignment in your Team Assignments folder. IMPORTANT: The three submission files should be named as should be named as “Group” […]
Learning PythonFrancisco Iacobelli 1 Before you begin • Download the latest python (3.x). As a suggestion, download Anaconda at https://www.anaconda. com/. Anaconda installs the latest python version and I recommend you develop with Visual Studio Code or Spyder. PyCharm is also ok. • Teach yourself python. You can start by checking this youtube playlist with […]
1) You are approached by the marketing director of a local company, who believes that hehas devised a foolproof way to measure customer satisfaction. He explains his scheme as follows: “It’s so simple that I can’t believe that no one has thought of it before. I just keep track of the number of customer complaints […]
Purpose The purpose of this exercise is to practice with using public/private key pairs to log in to your cloud instance. Preparation Obtain a ssh client for your local computer. If you have a Mac or Linux system, there is already a command line ssh client built in. If you have a Windows system, a […]
Preparation Start your GCP instance and connect to it using the SSH link. You will need to leave your instance running for at least the next two units. If for some reason you have to reboot your instance, you’ll need to do repairs to make your WordPress site work again. Here is a page to […]
Overview:Determiningaminimumthresholdpopulationfor your quantitative study is critical for achieving a quality study. Conversely, qualitative studies focus less on a minimum population; instead, they have a greater focus on the concept of data saturation and knowing when to cease data collection. Understanding these procedures is paramount in completing both your IRB application and effectively writing the sampling […]
Overview You have been called back by the CISO to report your findings and pursue the next steps of your investigation. During your investigation it was discovered that the estranged husband of the CEO’s executive staff assistant had compromised her system’s account, which allowed him to access confidential documents including other employees’ personally identifiable information. […]
Tools needed for the exercise: sort, uniq –c (count duplicates), tr (translate characters), head, tail, > “output to a file”, < ”input from a file”, | “pipe”, and man pages. Given input text (see attached): Count words in a text and output the list of words in the file with freq counts algorithm: Tokenize (tr)Sort […]
Assignment #2 – Writing Requirements DefinitionsGood Requirements Definitions can mean the success or failure of a project! “A good requirement states something that is necessary, verifiable, and attainable. Even if it is verifiable and attainable, and eloquently written, if it is not necessary, it is not a good requirement. To be verifiable, the requirement must […]
Conference Presentation Scenario You are the Cloud Architect for a startup company. Your company has deployed several client implementations on the public cloud. Your team lead wants you to prepare the presentation for a DevOps event in Silicon Valley. This event can have a big impact on your company to attract more clients.You have pushed […]