Excel homework help

Excel homework help

A Skills Approach: Excel 2016 Chapter 4: Formatting Worksheets

and Managing the Workbook

1 | Page Skill Review 4.1 Last Updated 4/15/16

Skill Review 4.1 In this project, you will work on an attendance log for a 16-week college course. For one section of the course,

you will set up the sheet to print as an attendance sign-in sheet. For another section, you will set up the sheet

to print as an attendance report for the administration office. This is a long project. Be sure to save often!

Skills needed to complete this project:

 Naming Worksheets

 Changing the Color of Sheet Tabs

 Moving and Copying Worksheets

 Grouping Worksheets

 Modifying Column Widths and Row Heights

 Changing the Worksheet View

 Adding Headers and Footers

 Applying Themes

 Splitting Workbooks

 Inserting and Deleting Rows and Columns

 Deleting Worksheets

 Freezing and Unfreezing Rows and Columns

 Hiding and Unhiding Rows and Columns

 Changing Worksheet Orientation

 Setting Up Margins for Printing

 Scaling Worksheets for Printing

 Showing and Hiding Worksheet Elements

 Printing Selections, Worksheets, and Workbooks

 Printing Titles

 Inserting Page Breaks

1. Open the start file EX2016-SkillReview-4-1. The file will be renamed automatically to include your

name. Change the project file name if directed to do so by your instructor, and save it.

2. If the workbook opens in Protected View, click the Enable Editing button in the Message Bar at the

top of the workbook so you can modify the workbook.

3. Rename Sheet1 and change the color of the sheet tab.

a. Right‐click on the Sheet1 tab, choose Rename, and type: TTh300

b. Press the ENTER key.

c. Right‐click the sheet tab again, point to Tab Color, and select Green, Accent 6 (the last color in the

first row of theme colors).

4. Make a copy of the TTh300 sheet.

a. Right‐click the sheet tab and select Move or Copy… to open the Move or Copy dialog.

b. In the Before sheet box, select Sheet2.

c. Check the Create a copy check box.

d. Click OK.

 

Step 1

Download start file

 

 

A Skills Approach: Excel 2016 Chapter 4: Formatting Worksheets

and Managing the Workbook

2 | Page Skill Review 4.1 Last Updated 4/15/16

5. Name the new sheet MWF301 and change the tab color.

a. Right‐click the new TTh300 (2) sheet tab, choose Rename, and type: MWF301

b. Press the ENTER key.

c. Right‐click the sheet tab again, point to Tab Color, and select Blue, Accent 5 (the second color

from the right in the first row of theme colors).

6. Group sheets TTh300 and MWF301 so you can apply formatting changes to both sheets at once.

a. Click the TTh300 sheet tab, press and hold the Ctrl key, and click the MWF301 sheet tab. Now any

changes made to one of the sheets will be made to both sheets.

b. Verify that [Group] appears in the title bar, indicating that the selected sheets are grouped.

7. Resize column A in both worksheets at once to best fit the data by double-clicking the right border of

the column heading.

8. Add a header and footer to both worksheets at once.

a. Switch to Page Layout view by clicking the Page Layout button on the status bar.

b. Click in the center section of the header.

c. On the Header & Footer Tools Design tab, in the Header & Footer Elements group, click the File Name

button. The code &[File] will be entered in the center section of the header. Once you click

somewhere else, this will display the name of your file.

d. Click in the right section of the header and type your own name.

e. On the Header & Footer Tools Design tab, in the Navigation group, click the Go to Footer button.

f. Click in the center section of the footer.

g. On the Header & Footer Tools Design tab, in the Header & Footer Elements group, click the Sheet Name

button. The code &[Tab] will be entered. Once you click somewhere else, this will display the name

of the sheet.

h. Click in the right section of the footer.

i. On the Header & Footer Tools Design tab, in the Header & Footer Elements group, click the Current

Date button. Once you click somewhere else, this will display the current date.

j. Click in any cell of the worksheet and click the Normal button on the status bar.

9. Ungroup the sheets by clicking Sheet2. Verify that the same formatting was applied to both sheets and

that they are now ungrouped.

10. Apply the Integral theme to the workbook.

a. On the Page Layout tab, in the Themes group, click the Themes button to display the Themes gallery.

b. Notice that as you hover the mouse pointer over each option in the Themes gallery, Excel updates the

worksheet to display a live preview of how the theme would affect the worksheet.

c. Click the Integral option.

 

 

A Skills Approach: Excel 2016 Chapter 4: Formatting Worksheets

and Managing the Workbook

3 | Page Skill Review 4.1 Last Updated 4/15/16

11. Select the TTh300 sheet. It can be difficult to work with such a wide worksheet. Scroll to the right to see

the end of the semester, and you can no longer see the student names. Split the screen into two views of

different parts of this worksheet.

a. Click cell D1. On the View tab, in the Window group, click the Split button. Now you can scroll each

pane separately, but it is all still the same worksheet. You can drag the split bar to the right or left as

needed.

b. Scroll to show the student names and the last few weeks of the semester on your screen.

c. Click the Split button again to return to normal.

12. Insert a new row to add a new student to the list.

a. Right‐click on the row heading for row number 9 and select Insert.

b. Click the Insert Options button that appears immediately below where you right‐clicked, and select

Format Same As Below.

c. Enter the new student name: Aaron, Kayla

d. Enter her student ID #: 1350679

13. Select the MWF301 sheet. Because this sheet was copied from the TTh300 class worksheet, the student

names and ID numbers are not those of the students in MWF301 class. Copy the student data from

Sheet2, and then delete Sheet2 when it is no longer needed.

a. On sheet MWF301, select cells A9:B29. Press the DELETE key to delete the content.

b. Go to Sheet2 and copy the student names and ID numbers from cells A2:B20.

c. Paste the copied names and ID numbers to cell A9 in the MWF301 sheet.

d. Delete Sheet2 by right-clicking on the sheet name and selecting Delete.

e. When Excel displays the message telling you that you can’t undo deleting sheets, click the Delete

button to complete the action.

14. Jay Parson has decided to drop the class. Remove him from the MWF301 class roster.

a. On worksheet MWF301, delete the entire row for Jay by right-clicking on the row heading for row

number 21 and selecting Delete.

15. Use the Freeze Panes option to keep rows 1:8 and columns A:B visible at all times.

a. Verify that the MWF301 sheet is selected, and click cell C9.

b. On the View tab, in the Window group, click the Freeze Panes button, then click the Freeze Panes

option.

c. Verify that you selected the correct point at which to freeze panes. Scroll down and to the right. Are

rows 1:8 and columns A:B visible regardless of where you scroll?

 

 

 

A Skills Approach: Excel 2016 Chapter 4: Formatting Worksheets

and Managing the Workbook

4 | Page Skill Review 4.1 Last Updated 4/15/16

Modify sheet MWF301 to print as an attendance sign-in sheet.

16. First, hide the student ID numbers by right‐clicking on the column B heading and selecting Hide.

17. Set the page layout options.

a. On the Page Layout tab, in the Page Setup group, click the Orientation button, and select Landscape.

b. On the Page Layout tab, in the Page Setup group, click the Margins button, and select Narrow.

c. On the Page Layout tab, in the Scale to Fit group, expand the Width list and select 1 page, and expand

the Height list and select 1 page.

d. On the Page Layout tab, in the Sheet Options group, click the Print check box under Gridlines.

18. Print only the part of the worksheet to use as the attendance sign‐in sheet.

a. Select the appropriate cells to print as an attendance sign-in by selecting cells A1:C26.

b. Click the File tab to open Backstage view, and then click Print to display the Print page.

c. Under Settings, click the Print Active Sheets button to expand the options, and select Print

Selection.

d. If your instructor has directed you to print the attendance sign-in list, click the Print button.

e. Click the Back arrow to exit Backstage view.

At the end of the semester you will need to print all the attendance records to turn in to the administration

office. Let’s set this up for the TTh300 class worksheet.

19. Select the TTh300 worksheet, and hide the attendance sign-in column by right-clicking the column C

heading and selecting Hide.

20. Modify the worksheet so column A and rows 1 through 8 will print on every page.

a. On the Page Layout tab, in the Page Setup group, click the Print Titles button.

b. Click in the Rows to repeat at top box, and then click and drag with the mouse to select rows 1:8.

When you release the mouse button, you should see $1:$8 in the box.

c. Click in the Columns to repeat at left box, and then click with the mouse to select column A. When

you release the mouse button, you should see $A:$A in the box.

d. Click OK.

21. Preview how the worksheet will look when printed and make adjustments from the Print page to keep

the report to four or fewer pages.

a. Click the File tab to open Backstage view, and then click Print.

b. If necessary, select Print Active Sheets under Settings.

c. Note that the current settings will cause the worksheet to print on five pages.

d. Under Settings, click the Portrait Orientation button and switch to Landscape Orientation instead.

e. Under Settings, click the Normal Margins button, and select Custom Margins… to set your own

margins.

 

 

 

A Skills Approach: Excel 2016 Chapter 4: Formatting Worksheets

and Managing the Workbook

5 | Page Skill Review 4.1 Last Updated 4/15/16

 

f. In the Page Setup dialog, on the Margins tab, change the Top, Bottom, Left, and Right values to 0.5.

Click OK.

g. Under Settings, click the No Scaling button, and select Fit All Rows on One Page.

22. Modify the worksheet page breaks so weeks 1-8 print on the first page and weeks 9-16 print on the

second page.

a. Click the Back arrow to exit Backstage.

b. If necessary, scroll to the right so columns T:V are visible. Note the current page break in the file.

c. Click cell T1.

d. On the Page Layout tab, in the Page Setup group, click the Breaks button, and select Insert Page

Break. This inserts a page break to the left of the selected cell (after week 8).

e. Click the File tab to open Backstage view, and then click Print to preview how the change will affect

the printed pages.

f. If your instructor has directed you to print the worksheet, click the Print button.

g. Click the Back arrow to exit Backstage view.

23. Save and close the workbook.

24. Upload and save your project file.

25. Submit project for grading.

Step 2

Upload & Save

Step 3

Grade my Project

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Data Mining assignment Help

Data Mining assignment Help

Question 1

Suppose that you are employed as a data mining consultant for an Internet search engine company. Describe how data mining can help the company by giving specific examples of how techniques, such as clustering, classification, association rule mining, and anomaly detection can be applied.

Question 2

Identify at least two advantages and two disadvantages of using color to visually represent information.

Question 3

Consider the XOR problem where there are four training points: (1, 1, −),(1, 0, +),(0, 1, +),(0, 0, −). Transform the data into the following feature space:

Φ = (1, √ 2×1, √ 2×2, √ 2x1x2, x2 1, x2 2).

Find the maximum margin linear decision boundary in the transformed space.

Question 4

Consider the following set of candidate 3-itemsets: {1, 2, 3}, {1, 2, 6}, {1, 3, 4}, {2, 3, 4}, {2, 4, 5}, {3, 4, 6}, {4, 5, 6}

Construct a hash tree for the above candidate 3-itemsets. Assume the tree uses a hash function where all odd-numbered items are hashed to the left child of a node, while the even-numbered items are hashed to the right child. A candidate k-itemset is inserted into the tree by hashing on each successive item in the candidate and then following the appropriate branch of the tree according to the hash value. Once a leaf node is reached, the candidate is inserted based on one of the following conditions:

Condition 1: If the depth of the leaf node is equal to k (the root is assumed to be at depth 0), then the candidate is inserted regardless of the number of itemsets already stored at the node.

Condition 2: If the depth of the leaf node is less than k, then the candidate can be inserted as long as the number of itemsets stored at the node is less than maxsize. Assume maxsize = 2 for this question.

Condition 3: If the depth of the leaf node is less than k and the number of itemsets stored at the node is equal to maxsize, then the leaf node is converted into an internal node. New leaf nodes are created as children of the old leaf node. Candidate itemsets previously stored in the old leaf node are distributed to the children based on their hash values. The new candidate is also hashed to its appropriate leaf node.

How many leaf nodes are there in the candidate hash tree? How many internal nodes are there?

Consider a transaction that contains the following items: {1, 2, 3, 5, 6}. Using the hash tree constructed in part (a), which leaf nodes will be checked against the transaction? What are the candidate 3-itemsets contained in the transaction?

Question 5

Consider a group of documents that has been selected from a much larger set of diverse documents so that the selected documents are as dissimilar from one another as possible. If we consider documents that are not highly related (connected, similar) to one another as being anomalous, then all of the documents that we have selected might be classified as anomalies. Is it possible for a data set to consist only of anomalous objects or is this an abuse of the terminology?

You will need to ensure to use proper APA citations with any content that is not your own work.

with zero plagiarism needed.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Uses Of Efficient Frontier Analysis In SRM assignment Help

Uses Of Efficient Frontier Analysis In SRM

Discussion1

Explaining the results of Efficient Frontier Analysis to non-technical decision-makers

The implementation of Efficient Frontier Analysis in an organization helps the process of strategic risk management to encompass and advanced analytical technique. The outcomes derived from it can easily be acknowledged and utilised by the non-technical decision-makers of the organisation as well. With the private utilization of Efficient Frontier Analysis, the decision-maker can easily consider identifying Complex property and developing casualty risk profiles. It has been observed in the considered case study that the most convincing organizational decision-making practices to determine efficient risk management need extensive acknowledgement of the governance structure followed by the processes and the varieties of tools used in it. In addition to it, they are also subjected to be developed on the basis of the guidance and principles of ISO 31000 followed by the guidance of implementation empowered by Australian and New Zealand handbook HB 436 (Fraser, Simkins & Narvaez, 2014). The consideration of Efficient Frontier Analysis emphasizes the hierarchical roles within an internal audit function as well as the organization and risk management function.

The results of implementing Efficient Frontier Analysis depend in-depth assessment of the risk portfolio volatility followed by the pricing structure acknowledged through decision-making. Furthermore, the considered case study also explains that the implementation of Efficient Frontier Analysis also needs to analyze the insurance layering efficiency to determine the risk portfolio application in order to ensure the catastrophic loss potential within the decision-making practices of strategic risk management (Rezaeiani & Foroughi, 2018). Additionally, a business organization implementing it can also become capable of analyzing and resolving the control break down easily with the identification of risk origins, actors, causes and consequences precisely. With the help of proper strategic management, the non-technical decision-making practices can be functional through a risk appetite framework that influences risk control framework. both these further impact on the emergence of the dynamic risks followed by integrated enterprise risk profile and scenario and stress testing by enabling untapped opportunities.

Recommendations assuming the risk appetite

The notion of risk appetite is strongly aligned with risk tolerance to influence the scenario and stress testing abilities to develop an analytical framework. The fundamental purpose of this Framework is to drive multiple sets of discussions based on analytical information to help the decision-makers in determining the risk profile and lead the organization to constitute competitive opportunities. It has been observed that the risk appetite in association with the risk tolerance helps them in categorizing the risks and further reframe them as opportunities (Zhou & Xu, 2016). The decision-makers are recommended to acknowledge this concern in order to determine the position control framework.

Identifying risk appetite also enables control actions for the decision-makers considering the components of market share, product or service provision, market profit, social impact, stakeholder levels and other benefits (Hillson & Murray-Webster, 2017). The decision-makers are also recommended to acknowledge SRM over the traditional risk assessment in order to two distinct advantages risk profiles from the exploitable with a profile in order to determine sustainable efficiency and preventing competitively noisy environment by foreseeing the risk dynamics categorically through risk appetite.

 

Discussion2

For an organization to access risk versus return of each proposed project, their project lead should use the concept of efficient frontier analysis. If the frontier analysis is used efficiently, a company can easily understand and find the high profitable project to invest in. In addition, the information, which is gathered during this process, can be used to develop decision structure, which is eventually used by the project managers to assess a project. As per (Fraser, 2014), the idea of using the idea of using the concept of efficient frontier analysis is to help investors to invest in a project that gives high returns against risks. This process is usually represented by a graph. The value on the X-Axis of the graph is risk and the value on the Y-Axis of the graph is investment returns.  A line is drawn to connect the highest portfolio return that a project can give with the existing risks factors.  This line is the efficient frontier line and the analysis.

I would prefer using a simple graph, so that a non-technical person can easily understand the point. Additionally, this is a simple approach too, not all the points that fall under the efficient frontier line is optimal, therefore making it a not-a-good-idea-to-implement kind of project. Further, dumping a bunch of statics and random facts is going to be less fascinating to a non-techie.

The first and foremost recommendation from my end is, making sure the information is well recorded in the graph, so that we can obtain accurate information. If not, the main purpose of the analysis will never be achieved.

 

Discussion3

Most investment choices involve the trade-off between risk and reward. The “Efficient frontier” is a modern portfolio theory tool that shows investors the best possible return they can expect from their portfolio, given the level of volatility they are willing to accept. The chart here demonstrates the influence of concept. The vertical axis represents the expected rate of return. The horizontal axis signifies the investors’ risk tolerance. The frontier is a line curve, which shows the potential yield of portfolio given a degree of risk. Optimal portfolios should lie on this curve. In addition, the portfolios that fall below the frontier curve represent the less ideal mix of investment because with the same risk one could achieve a greater return. Any portfolio above this curve is impossible.

Take Chris who owns portfolio A. Currently, his investment generates the combined yield of 8%. Based on the efficient frontier, however, Chris can be achieving the same level of return with a considerably safer mix of investments with portfolio B. Both portfolio offer the same level of return but portfolio B has less risk. The job of investment advisor who uses modern portfolio theory is to identify the basket of securities that get as close as possible to the frontier. Investors should realize there is no preferred point on the frontier. A young professional probably is willing to accept a high level of risk and will therefore want to be somewhere near to the right of the curve. For an older adult, nearing retirement, a portfolio further to the left maybe ideal.

What is important is to get as close as possible to the efficient frontier whatever your risk profile may be. The effort to take advantage of complex data techniques was, in part, stimulated by the evolving risk management framework integration into what is now being modestly referred to as enterprise risk management (ERM) or strategic risk management (SRM).

Within the 2013 Risk and Insurance Management Society (RIMS) SRM Implementation Guide, the concept of strategic risk management is defined as a “business discipline that drives the deliberations and actions surrounding business- related uncertainties, while uncovering untapped opportunities reflected in an organization’s strategy and execution.”

What distinguishes this definition from previous descriptions of enterprise wide risk management (ERM) approaches is the effort to sustainably deliver a robust fact-based strategic dialogue across the entire organization. This new strategic dialogue requires an analytical framework that is dynamic and encompasses all areas of an enterprise. In this chapter, we demonstrate how the use of efficient frontier analysis (EFA), and many of its derivative techniques, provides a robust portfolio approach to hazard, operational, market, and reputational risk domains.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Artificial Intelligence ( Computer Science, Python) assignment Help

Artificial Intelligence ( Computer Science, Python) assignment Help

Homework 2 (10% of total course weight) – Multiagent Search

California State University San Bernardino, School of Computer Science and Engineering (CSE)

 

Date of Issue: February 24, 2020, Date of submissionMarch 10, 2021 – 11:59 pm (PST)

Module: CSE 5120 Introduction to Artificial Intelligence

Assessment brief: The code and resources provided in this homework are drawn from UC Berkeley which are part of their recent offering. Thanks, and credit to the authors (particularly Dan Klein, Pieter Abbeel, John DeNero, and others) at UC Berkeley for making these projects available to the public.

Pacman lives in a shiny blue world of twisting corridors and tasty round treats. Navigating this world efficiently will be Pacman’s first step in mastering his domain.

The code for this project consists of several Python files, some of which you will need to read and understand in order to complete the assignment, and some of which you can ignore. You can download all the code and supporting files as a zip folder from homework 2 link given on Blackboard (multiagent.zip).

Your homework is based on two parts as given below:

1. Code implemented for multiagent algorithms in given multiAgents.py file (in specific sections as indicated in detail below)

2. A brief report on what you did for each algorithm (i.e., how you implemented with screenshots from autograder script given in the folder)

 

File Name Description
multiAgents.py Where all of your multi-agent search agents will reside.
pacman.py The main file that runs Pacman games. This file describes a Pacman GameState type, which you use in this project.
game.py The logic behind how the Pacman world works. This file describes several supporting types like AgentState, Agent, Direction, and Grid.
util.py Useful data structures for implementing search algorithms.

 

After downloading the code, unzipping it, and changing to the directory, you should be able to play a game of Pacman by running the following command.

python pacman.py

pacman.py supports a number of options (e.g. –layout or -l). You can see the list of all options and their default values via python pacman.py -h.

You can use Spyder (installed through Anaconda from week 1 Thursday’s lecture) or other IDE for this work.

Files to Edit and Submit: You will need to edit and submit (multiAgents.py) file to implement your algorithms. Once you have completed the homework, you are welcome to run automated tests using an autograder.py given in the folder before you submit them for accuracy. You do not need to submit autograder.py file in your code submission but will need to test your algorithms with autograder.py to copy screenshots in your report. Please do not change the other files in this distribution or submit any of the original files other than these files.

 

Academic Dishonesty: Your code will be checked against other submissions in the class for logical redundancy. If you copy someone else’s code and submit it with minor changes, they will be detected easily, so please do not try that and submit your own work only. In case of cheating, the University’s academic policies on cheating and dishonesty will strictly apply which may result from the deduction in your grade to expulsion.

 

Getting Help: If you are having difficulty in implementing the algorithms from the pseudocodes provided in this homework, contact the course staff for help. Office hours and Slack are there for your support. If you are not able to attend office hours, then please inform your instructor to arrange for additional time. The intent is to make these projects rewarding and instructional, not frustrating and demoralizing. You can either complete this homework on your own or discuss the problem and collaborate with another member of the class (or different section). Please clearly acknowledge and mention your group member in your homework report submission who you will collaborate with in this homework. Your report and program (search.py file) will be separately submitted by yourself on Blackboard irrespective of your collaboration with your group member. Group discussions are encouraged but copying of programs is NOT recommended. Programming based on your own skills is encouraged.

 

Tasks for homework 2

 

1. Minimax search (3%)

Write an adversarial agent in the provided MinimaxAgent class in multiAgents.py. Your minimax agent should work with any number of ghosts, so your algorithm should be a more generalized version of the standard Minimax algorithm that we have studied in the class. Your minimax tree will have multiple min layers (one for each ghost) for each max layer. Your code should also be able to expand the tree to an arbitrary depth which can be accessed from self.depth and score your nodes with the supplied self.evaluationFunction. Make sure your Minimax program refers to these variables since these are populated in response to the command line options.

Important:  A single search ply is considered to be one Pacman move and all the ghosts’ responses, so depth 2 search will involve Pacman and each ghost moving two times. For further reading and understanding of Minimax (including alpha-beta pruning), please see this short video tutorial with pseudo code.

Hints and Observations

· Hint: Implement the algorithm recursively using helper function(s).

· The correct implementation of minimax will lead to Pacman losing the game in some tests. This is not a problem: as it is correct behavior, it will pass the tests.

· The evaluation function for the Pacman test in this part is implemented for you (self.evaluationFunction). You should not change this function but recognize that now we are evaluating states rather than actions, as compared to the reflex agent. Look-ahead agents evaluate future states whereas reflex agents evaluate actions from the current state.

· Pacman is always agent 0, and the agents move (take turns) in order of increasing agent index.

· All states in minimax should be GameStates, either passed in to getAction or generated via GameState.generateSuccessor. In this project, you will not be abstracting to simplified states.

Evaluation: Your code will be checked to determine whether it explores the correct number of game states. This is the only reliable way to detect some very subtle bugs in implementations of minimax. As a result, the autograder will be very picky about how many times you call GameState.generateSuccessor. If you call it any more or less than necessary, the autograder will complain. Please note that q1 relates to ReflexAgent which is not a part of this homework and can be skipped. We will start with q2 in this homework. To test and debug your code, run

python autograder.py -q q2

This will show what your algorithm does on a number of small trees, as well as a pacman game. To run it without graphics, use:

python autograder.py -q q2 –no-graphics

Figure 1: Pseudo-code for the implementation of Minimax algorithm. Please use this as a guide only. You will still need to carefully read multiAgents.py file for helper functions given in the comments and think/reason about the implementation of Minimax in Pacman scenario.

 

Figure 2: Pseudo-code for general-purpose implementation of Minimax algorithm. Please use this as a guide only. You will still need to carefully read multiAgents.py file for helper functions given in the comments and think/reason about the implementation of Minimax in Pacman scenario.

 

2. Alpha-beta pruning (2%)

write an adversarial agent in the provided AlphaBetaAgent class in multiAgents.py to more efficiently explore the minimax tree. Your agent should work with any number of ghosts, so your algorithm should be a generalized version of the standard Alpha-Beta Pruning algorithm. The AlphaBetaAgent minimax values should be identical to the MinimaxAgent minimax values, although the actions it selects can vary because of different tie-breaking behavior.

Note: The correct implementation of alpha-beta pruning will lead to Pacman losing some of the tests. This is not a problem: as it is correct behavior, it will pass the tests.

Evaluation: Your code will be checked to determine whether it explores the correct number of game states. Therefore, it is important that you perform alpha-beta pruning without reordering children. In other words, successor states should always be processed in the order returned by GameState.getLegalActions. Again, do not call GameState.generateSuccessor more than necessary. Additionally, in order to match the set of states explored by the autograder, you must not prune on equality: that is, stop generating children for a max (min) node only if a child’s value is strictly greater than (less than) β (α). To test and debug your code, run

python autograder.py -q q3

This will show what your algorithm does on a number of small trees, as well as a pacman game. To run it without graphics, use:

python autograder.py -q q3 –no-graphics

Figure 3: Pseudo-code for the implementation of the algorithm you should implement for this question. Please use this as a guide only. You will still need to carefully read multiAgents.py file for helper functions given in the comments and think/reason about the implementation of Minimax in Pacman scenario.

3. Expectimax Search (2%)

Implement the ExpectimaxAgent, which is useful for modeling probabilistic behavior of agents who may make suboptimal choices. As with the search and constraint satisfaction problems covered in CSE 5120, the impressive feature of this algorithm is its general applicability.

Note: The correct implementation of expectimax will lead to Pacman losing some of the tests. This is not a problem: as it is correct behavior, it will pass the tests.

 

Evaluation: You can debug your implementation on small the game trees using the command:

python autograder.py -q q4

Debugging on these small and manageable test cases is recommended and will help you to find bugs quickly. Once your algorithm is working on small trees, you can observe its success in Pacman. Random ghosts are not optimal minimax agents, and so modeling them with minimax search may not be appropriate. ExpectimaxAgent, does not take the min over all ghost actions, but the expectation according to the agent’s model of how the ghosts act. To simplify your code, assume you will only be running against an adversary which chooses amongst their getLegalActions uniformly at random (read about uniform distribution for further understanding). To see how the ExpectimaxAgent behaves in Pacman, run:

python pacman.py -p ExpectimaxAgent -l minimaxClassic -a depth=3

You should now observe a more cavalier approach in close quarters with ghosts. In particular, if Pacman perceives that he could be trapped but might escape to grab a few more pieces of food, he will at least try. Investigate the results of these two scenarios:

python pacman.py -p AlphaBetaAgent -l trappedClassic -a depth=3 -q -n 10

python pacman.py -p ExpectimaxAgent -l trappedClassic -a depth=3 -q -n 10

You should find that your ExpectimaxAgent wins about half the time, while your AlphaBetaAgent always loses. Make sure you understand why the behavior here differs from the minimax case.

4. Constraint satisfaction problems (3%)

1. (1.5%) Consider the problem of placing k knights on an n×n chess board such that no two knights are attacking each other, where k is given and k ≤ n2.

· Choose a CSP formulation. What are the variables in your formulation?

· What are the possible values of each variable in your formulation?

· What sets of variables are constrained, and how?

2. (1.5%) Class scheduling (items to answer are at the end in green font)

You are given a problem of class scheduling for the computer science department at CSUSB. The class timings are Tuesdays, Thursdays, and Fridays. There are 5 different classes on these given days and 3 professors who are qualified for teaching these classes.

Problem constraint: Each professor can teach only one class at a time.

Classes:

C1 – CSE 5120 Introduction to Artificial Intelligence: Time: 1:00 – 2:15pm

C2 – CSE 4600 Operating Systems: Time: 9:00 – 10:15am

C3 – CSE 4550 Software Engineering: Time: 10:30-11:45am

C4 – CSE 5720 Database Systems: Time: 10:30 – 11:45am

C5 – CSE 5160 Machine Learning: Time: 2:30 – 3:45pm

Professors:

Professor A: Qualified to teach Classes 1, 2, and 5.

Professor B: Qualified to teach Classes 3, 4, and 5.

Professor C: Qualified to teach Classes 1, 3, and 4.

1. Formulate this problem as a CSP where there is one variable per class, reporting the domains and constraints (e.g., for each class, the entry in the table should be <class number (e.g., C1)> <Domains (unary constraints)>). Also, list binary constraints on the classes . Your constraints should be specified formally which can be implicit rather than explicit

2. Draw the constraint graph for your problem in item 1

3. Make sure your CSP looks nearly tree-structure. Provide a one paragraph description of why the solution to CSP via tree structured CSPs is preferred. Review lecture slides and videos for help.

 

 

1

 

Homework 2 (10%)

 

 

 

 

 

CSE 5120 (Section ##) – Introduction to Artificial Intelligence – Spring 2021

 

 

 

 

 

 

Submitted to 

 

Department of Computer Science and Engineering California State University, San Bernardino, California

 

 

by

 

Student name (CSUSB ID)

(Your collaborator in this homework (if any))

 

 

 

 

 

Date: Month Day, Year

 

 

 

 

 

 

Email:

· Your email

· Your collaborator’s email (if you collaborated with any)

 

 

Report

Brief description of your work here acknowledging your collaboration with your class fellow (or a friend from other CSE 5120 section), and the capacity at which he/she collaborated with you, followed by the algorithms you implemented.

1. Minimax algorithm

Your brief explanation of the problem, your code solution, and any documentation with screenshots of your code Evaluation (results from autograder.py)

2. Alpha-beta pruning

Your brief explanation of the problem, your code solution, and any documentation with screenshots of your code Evaluation (results from autograder.py)

3. Expectimax Search

Your brief explanation of the problem, your code solution, and any documentation with screenshots of your code Evaluation (results from autograder.py)

4. Constraint satisfaction problems

Your explanation and drawings, wherever necessary, numbered according to how the questions are defined in the questions.

 

α-βImplementationdef min-value(state, α, β):initialize v = +∞for each successor of state:v = min(v, value(successor, α, β))if v ≤ αreturn vβ = min(β, v)return vdef max-value(state, α, β):initialize v = -∞for each successor of state:v = max(v, value(successor, α, β))ifv ≥ βreturn vα= max(α, v)return vα: MAX’s best option on path to rootβ:MIN’s best option on path to root

Minimax Implementationdef value(state):if the state is a terminal state: return the state’s utilityif the next agent is MAX: return max-value(state)if the next agent is MIN: return min-value(state)def min-value(state):initialize v = +∞for each successor of state:v = min(v, value(successor))return vdef max-value(state):initialize v = -∞for each successor of state:v = max(v, value(successor))return v

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Lab5 – Legal Regulations, Compliance, And Investigation

Lab5 – Legal Regulations, Compliance, And Investigation

35

 

Introduction

When consumers provide personal information for a product or service, the assumption is the

receiving company will exercise due diligence to protect their information. Bear in mind there is

no all-purpose federal law mandating personal data should be protected, only certain industry-

specific laws, for example, health care and financial. But even without an overarching mandate,

most companies will attempt to protect your personal data just to avoid a charge of negligence

should a privacy breach occur.

One nonprofit organization that monitors how well companies guard personal data—among

other missions—is the Electronic Frontier Foundation (EFF). EFF’s purpose is to defend free

speech, privacy, innovation, and consumer rights. This lab takes a look at a class-action lawsuit

filed by EFF.

In this lab, you will explain the privacy issues related to an EFF case study, you will identify

U.S. privacy law violations and their implications, and you will assess the impact of those

violations on consumer confidential information.

Learning Objectives

Upon completing this lab, you will be able to:

Explain the mission statement of the Electronic Frontier Foundation (EFF).

Relate privacy issues in the case study to any personal or individual laws in the United

States.

Identify U.S. citizen privacy law violations and their implications for privacy and

confidential information in the case study.

Assess the impact of these violations on consumers’ confidential information from a legal,

ethical, and information systems security perspective.

Lab #5 Case Study on Issues Related to Sharing Consumers’ Confidential Information

 

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

36 | LAB #5 Case Study on Issues Related to Sharing Consumers’ Confidential Information

 

Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your

instructor:

1. Lab Report file; 2. Lab Assessments file.

Instructor Demo

The Instructor will present the instructions for this lab. This will start with a general discussion

about privacy law and how this is different from information systems security as well as how

they are related. The Instructor will then present an overview of the Electronic Frontier

Foundation (EFF) and the case study in this lab.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

37

 

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Student Lab Manual

 

 

Hands-On Steps

Note: This is a paper-based lab. To successfully complete the deliverables for this lab, you will need access to Microsoft® Word or another compatible word processor. For some labs, you may also need access to a graphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual for information on creating the lab deliverable files.

 

1. On your local computer, create the lab deliverable files.

2. Review the Lab Assessment Worksheet. You will find answers to these questions as you proceed through the lab steps.

3. Review the following case study on issues related to sharing consumers’ confidential information. Note that this information originated from the following Electronic Frontier

Foundation Web pages: https://www.eff.org/about, https://www.eff.org/cases/hepting, and

https://www.eff.org/nsa/hepting.

From the Internet to the iPod, technologies transform society and empower us as

speakers, citizens, creators, and consumers. When freedoms in the networked world come

under attack, the Electronic Frontier Foundation (EFF) is the first line of defense. EFF

broke new ground when it was founded in 1990—well before the Internet was on most

people’s radar—and continues to confront cutting-edge issues defending free speech,

privacy, innovation, and consumer rights today. From the beginning, EFF has

championed the public interest in every critical battle affecting digital rights.

Blending the expertise of lawyers, policy analysts, activists, and technologists, EFF

achieves significant victories on behalf of consumers and the general public. EFF fights

for freedom primarily in the courts, bringing and defending lawsuits even when that

means taking on the U.S. government or large corporations. By mobilizing more than

61,000 concerned citizens through the Action Center, EFF beats back bad legislation. In

addition to advising policymakers, EFF educates the press and public.

EFF is a donor-funded nonprofit and depends on support to continue successfully

defending digital rights. Litigation is particularly expensive. Because two-thirds of EFF’s

budget comes from individual donors, every contribution is critical to helping EFF

fight—and win—more cases (https://www.eff.org/about).

EFF Case Study Information

The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on

January 31, 2006, accusing the telecom giant of violating the law and the privacy of its

customers by collaborating with the National Security Agency (NSA) in its massive, illegal

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

38 | LAB #5 Case Study on Issues Related to Sharing Consumers’ Confidential Information

 

program to wiretap and data-mine Americans’ communications. In May 2006, many other

cases were filed against a variety of telecommunications companies. Subsequently, the

Multi-District Litigation Panel of the federal courts transferred approximately 40 cases to

the Northern District of California federal court.

In Hepting v. AT&T, EFF sued the telecommunications giant on behalf of its customers

for violating privacy law by collaborating with the NSA in the massive, illegal program

to wiretap and data-mine Americans’ communications. Evidence in the case includes

undisputed evidence provided by former AT&T telecommunications technician Mark

Klein showing AT&T routed copies of Internet traffic to a secret room in San Francisco

controlled by the NSA.

In June of 2009, a federal judge dismissed Hepting and dozens of other lawsuits against

telecoms, ruling that the companies had immunity from liability under the controversial

Foreign Intelligence Surveillance Act Amendments Act (FISAAA), which was enacted in

response to court victories in Hepting. Signed by President Bush in 2008, the FISAAA

allows the attorney general to require the dismissal of the lawsuits over the telecoms’

participation in the warrantless surveillance program if the government secretly certifies

to the court that the surveillance did not occur, was legal, or was authorized by the

president—certification that was filed in September of 2008.

Note: To read the full order from the federal judge who dismissed the many EFF lawsuits, the order is available here: http://www.eff.org/files/filenode/att/orderhepting6309_0.pdf.

 

EFF plans to appeal the decision to the 9th U.S. Circuit Court of Appeals, primarily

arguing that FISAAA is unconstitutional in granting to the president broad discretion to

block the courts from considering the core constitutional privacy claims of millions of

Americans (http://www.eff.org/cases/hepting; https://www.eff.org/nsa/hepting).

Note: Public proof regarding the case study came in June 2013 when British newspaper The Guardian first published news of massive electronic data collection by the NSA, a U.S. spy agency. Revelations from former NSA contractor and whistleblower Edward Snowden have detailed the extensiveness of data collection.

 

4. In your Lab Report file, describe the EFF’s mission statement.

5. In your Lab Report file, explain the privacy issues in the case study.

6. In your Lab Report file, identify the U.S. citizen privacy law violations in the case study and the implications those violations have on privacy and confidential information.

Note: This completes the lab. Close the Web browser, if you have not already done so.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

39

 

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Student Lab Manual

 

 

Evaluation Criteria and Rubrics

The following are the evaluation criteria for this lab that students must perform:

1. Explain the mission statement of the Electronic Frontier Foundation (EFF). – [25%] 2. Relate privacy issues in the case study to any personal or individual laws in the United

States. – [25%]

3. Identify U.S. citizen privacy law violations and their implications for privacy and confidential information in the case study. – [25%]

4. Assess the impact of these violations on consumers’ confidential information from a legal, ethical, and information systems security perspective. – [25%]

 

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

40 | LAB #5 Case Study on Issues Related to Sharing Consumers’ Confidential Information

 

Lab #5 – Assessment Worksheet

Case Study on Issues Related to Sharing Consumers’ Confidential Information

Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________

Overview

In this lab, you explained the privacy issues related to an EFF case study, you identified U.S.

privacy law violations and their implications, and you assessed the impact of those violations on

consumer confidential information.

Lab Assessment Questions & Answers

1. What is the Electronic Frontier Foundation’s mission statement?

 

2. Did the U.S. government violate the constitutional rights of U.S. citizens by ordering the NSA to review consumer confidential privacy information?

 

 

3. Why is the Hepting v. AT&T case crucial to the long-term posture of how the U.S. government can or cannot review consumer confidential information?

 

 

4. If Hepting v. AT&T results in “Big Brother” being allowed to eavesdrop and/or review the local and toll telephone dialing and bills of individuals, will U.S. citizens and consumers have any

privacy rights left regarding use of communication technologies?

 

 

5. What are the legal implications of consumer privacy information being shared?

 

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

41

 

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Student Lab Manual

 

 

6. What are the ethical implications of consumer privacy information being shared?

 

7. What are the information systems security implications of consumer information being shared?

 

8. What law allowed a federal judge to dismiss Hepting v. AT&T and other lawsuits against telecommunication service providers participating in the warrantless surveillance program

authorized by the president?

 

 

9. True or false: EFF claimed that the ruling set forth by FISAAA was unconstitutional.

 

 

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

Adjust your audio

This is a narrated slide show. Please adjust your audio so you can hear the lecture.

If you have problems hearing the narration on any slide show please let me know.

 

1

 

Chapter 1 The Information Systems Strategy Triangle

2

 

Kaiser Permanente (KP) Opening Case

What was KP’s business strategy in 2015?

On what were bonuses to doctors based under the “fix me” system?

What would the new idea be called instead of a “fix me” system?

What is the new basis for end-of-year bonuses?

What goal alignment has helped KP’s success?

What IS components are part of this?

Could only the IS components be changed to achieve their success?

Could only the strategy be changed to achieve their success?

© 2016 John Wiley & Sons, Inc.

3

To promote better health care at lower cost

Billings

Proactive health system

Improved health of patients

Alignment between business strategy, organizational design, and information systems strategy

Fast communication with patients outside of face-to-face appointments; automatic email reminders to patients for exercise or medications

No, the business strategy must be aligned with the IS, in addition to incentives

No, without the new incentives and new IS, employees would not wish to cooperate, nor would they be able to do so.

3

4

The Information Systems Strategy Triangle

These need to be balanced.

 

Business Strategy

Organizational Strategy

Information Strategy

© 2016 John Wiley & Sons, Inc.

4

 

What is a “Strategy?”

Coordinated set of actions to fulfill objectives, purposes, or goals

It sets limits on what the organization seeks to accomplish

Starts with a mission

Company Mission Statement
Zappos To provide the best customer service possible. Internally we call this our WOW philosophy.
Amazon We seek to be Earth’s most customer-centric company for three primary customer sets: consumer customers, seller customers and developer customers.
L.L. Bean Sell good merchandise at a reasonable profit, treat your customers like human beings and they will always come back for more.

© 2016 John Wiley & Sons, Inc.

5

What is a business strategy?

It is where a business seeks to go and how it expects to get there

It is not a business model, although it includes business models as one component of a business strategy

Business models include subscriptions, advertising, licenses, etc.

Business models do not include where the business seeks to go, and only the revenue portion of how it expects to get there

 

© 2016 John Wiley & Sons, Inc.

6

Generic Strategies Framework

Michael Porter: How businesses can build a competitive advantage

Three primary strategies for achieving competitive advantage:

Cost leadership – lowest-cost producer.

Differentiation – product is unique.

Focus – limited scope – can accomplish this via cost leadership or differentiation within the segment

7

© 2016 John Wiley & Sons, Inc.

7

 

Three Strategies for Achieving Competitive Advantage

Strategic Advantage
Strategic Target Uniqueness Perceived by Customer Low Cost Position
Industry Wide Differentiation Cost Leadership
Particular Segment Only Focus

© 2016 John Wiley & Sons, Inc.

8

Three Strategies for Achieving Competitive Advantage Examples

Strategic Advantage
Strategic Target Uniqueness Perceived by Customer Low Cost Position
Industry Wide Differentiation Cost Leadership
Particular Segment Only Focus

Apple

Wal-Mart

Marriott

Ritz Carlton

© 2016 John Wiley & Sons, Inc.

9

Dynamic Strategies

Beware of Hypercompetition

Can lead to a “red ocean” environment

Cutthroat competition – zero sum game

Every advantage is eroded—becoming a cost.

Sustaining an advantage can be a deadly distraction from creating new ones.

D’Avenis says: Goal of advantage should be disruption, not sustainability

Initiatives are achieved through series of small steps. Get new advantage before old one erodes.

Better to adopt a “blue ocean” strategy

Change the industry; create new segments/products

10

© 2016 John Wiley & Sons, Inc.

10

 

Creative Destruction

GE’s Approach under Jack Welch

Ask people to imagine how to destroy and grow your business

DYB: Imagine how competitors would want to destroy your business.

GYB: Counteract that by growing the business in some way to:

Reach new customers/markets

Better serve existing customers

© 2016 John Wiley & Sons, Inc.

11

Summary

Strategic Approach Key Idea Application to Information Systems
Porter’s generic strategies Firms achieve competitive advantage through cost leadership, differentiation, or focus. Understanding which strategy is chosen by a firm is critical to choosing IS to complement the strategy.
Dynamic environment strategies Speed, agility, and aggressive moves and countermoves by a firm create competitive advantage. The speed of change is too fast for manual response making IS critical to achieving business goals.

© 2016 John Wiley & Sons, Inc.

12

Organizational Strategy

What is organizational strategy?

Organizational design and

Choices about work processes

How do you manage organizational, control, and cultural variables?

Managerial Levers

13

© 2016 John Wiley & Sons, Inc.

13

 

14

Managerial Levers

© 2016 John Wiley & Sons, Inc.

14

 

IS Strategy

What is an IS Strategy? – The plan an organization uses in providing information services.

Four key IS infrastructure components

15

© 2016 John Wiley & Sons, Inc.

15

 

16

Information systems strategy matrix.

What Who Where
Hardware The physical devices of the system System users and managers Physical location of devices (cloud, datacenter, etc.)
Software The programs, applications, and utilities System users and managers The hardware it resides on and physical location of that hardware
Networking The way hardware is connected to other hardware, to the Internet and to other outside networks. System users and managers; company that provides the service Where the nodes, wires, and other transport media are
Data Bits of information stored in the system Owners of data; data administrators Where the information resides

© 2016 John Wiley & Sons, Inc.

16

 

What Who Where
Hardware Laptops, servers to store info and back up laptops Consultants have laptops, managed by the IS Dept. Laptops are mobile; servers are centralized
Software Office suite; collaboration tools Software is on consultants’ laptops but managed centrally Much resides on laptops; some only resides on servers
Networking Internet; hard wired connections in office; remote lines from home, satellite, or client offices ISP offers service; Internal IS group provides servers and access Global access is needed; Nodes are managed by ISPs
Data Work done for clients; personnel data Data owned by firm but made available to consultants as needed Resides on cloud and copies “pulled” into laptops as needed.

17

Illustration in a Consulting Firm

© 2016 John Wiley & Sons, Inc.

17

 

One IS Strategy: Social Strategy

Collaboration

Extend the reach of stakeholders to find and connect with one-another

Engagement

Involve stakeholders in the business via blogs; communities

Innovation

Identify, describe, prioritize new ideas

© 2016 John Wiley & Sons, Inc.

18

Summary

After you have listened to this lecture and read Chapter 1 of your text

Go to Discussion Board 2 and answer the discussion prompt

Finally complete Quiz 1

© 2016 John Wiley & Sons, Inc.

19

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Personal Reflection Assignment

Personal Reflection Assignment

Provide a reflection of at least 600 words (or 2 pages double spaced ) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

 

Requirements:

Provide a 600 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

 

Share a personal connection that identifies specific knowledge and theories from this course.

 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

The assignment will be graded using the following criteria:

(Maximum # of Points Per Area)

Grammar/Spelling/Citation: Make sure all work is grammatically correct, spelling is 100% accurate, and cite all sources in-text/at the end of the paper where applicable.

 

Technical Connection: Make the paper relevant to the course and its connection with your current classwork. Discuss how what you have learned can be applied to your work or future work.

 

Word Count: The minimum word count is 600 words. 350-500 will receive 50% credit. Anything below will receive a minimum number of points.

 

Personal Connection – 4 Points: How does this course and the experiences you have been taught in BLCN-635 ONLY impact your personal work.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Project On Access 2013 Assignment Help

Project On Access 2013 Assignment Help

Access 2013 Chapter 3 Creating and Using Queries Last Updated: 2/27/15 Page 1

USING MICROSOFT ACCESS 2013 Independent Project 3-5

Independent Project 3-5 The State of New York Department of Motor Vehicles wants to create three queries. The first query provides summary data on the number of tickets by city and violation. The second query summarizes the total tickets by violation. The third query provides summary data for the total fines assessed against each driver who has had a ticket. To ensure consistency, the starting file is provided for you. Use Design view to create the summary queries. Edit the queries to add fields, aggregate functions, and sorting. Finally, save and run the queries.

Skills Covered in This Project  Create a summary query in Design view.

 Edit a query in Design view.

 Add fields to a query.

 Execute a query.

 Save a query.

 Sort query results.

 Add aggregate functions.

 

 

1. Open the NewYorkDMV-03.accdb start file.

2. The file will be renamed automatically to include your name. Change the project file name if

directed to do so by your instructor, and save it.

3. If needed, enable content in the security warning.

4. Create a new summary query in Design view. The

query counts the number of tickets issued by city

and violation.

a. Add the Ticket table into the Query

Design window.

b. Increase the size of the table object to

display all of the fields.

c. Add the following fields into the query: City,

PrimaryFactor, and TicketNumber.

d. Add the Total row to the query.

e. Group By the City and PrimaryFactor fields

and Count the TicketNumber field.

5. Save the query as

TicketCountByCityAndFactor.

6. Run the query. The datasheet should display

20 records.

7. Widen the field column widths to the Best Fit

(Figure 3-104).

8. Save the changes to the query.

9. Save a copy of the query as

TicketCountByFactor.

10. Edit the TicketCountByFactor query in Design

view. The query should show the total tickets

issued for each violation factor, sorted in

descending order by count.

a. Delete the City field.

b. Sort the TicketNumber field in

descending order.

11. Save and run the query. The datasheet should

match Figure 3-105.

Step 1

Download start file

 

 

 

Access 2013 Chapter 3 Creating and Using Queries Last Updated: 2/27/15 Page 2

USING MICROSOFT ACCESS 2013 Independent Project 3-5

12. Close the query.

13. Create a new summary query in Design view. The query provides summary data on the total fines

assessed against

each driver.

a. Add both tables into the Query

Design window.

b. Increase the size of the table

objects to display all of the fields.

c. Add the following fields into the

query: LicenseNumber,

FirstName, LastName, Fine, and

TicketNumber.

d. Add the Total row to the query.

e. Group By the LicenseNumber,

FirstName, and LastName fields,

Sum the Fine field and Count the

TicketNumber field.

f. Sort the Fine field in descending

order.

14. Save the query as TicketsByDriver.

15. Run the query. The datasheet should

display 21 drivers who have received

tickets, sorted in descending order

by the total dollar amount of their

fines (Figure 3-106).

16. Save and close the database.

17. Upload and save your project file.

18. Submit project for grading. Step 3

Grade my Project

Step 2

Upload & Save

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Python 3.6 Assignment

Python 3.6 Assignment

Hello,

Hope this email finds you well.

I have an important assignment worth 100% of my grade that I really need your help with. Kindly find below the set of questions:

Assignment
Answer all parts of the following question. Marks allocated to each part in square
brackets.
Data source for Questions 2 through 5 needs to be the same, and has to be mentioned at
the beginning of your report
1) Many people find it difficult to understand blockchain because it requires the
coordination of many components for it to function, and it’s hard to see the full picture
until all the individual components are fully understood. In brief, please explain the
following from a technological standpoint: What are the basics of interaction of
cryptography and economics? What is your fundamental understanding of blockchain
technology? [10]
2) What were the key events for Cryptocurrencies from January 31, 2018 till January 31,
2019? Create and present a graphical timeline with the key dates and the key events.
What was the reaction in Bitcoin trading (BTC) on these dates? Did the BTC price go up
or down? By how much? What was the mean return on key events dates? What was the
median return? What was the standard deviation? Plot the distribution of the daily
percentage change on key events dates. Create a variable that takes the value 0 on days
without key events and 1 on days with key events. Calculate the correlation matrix on key
events dates and non-key events dates between the behaviour of Bitcoin, Ethereum
(ETH), Ripple (XRP) and Nasdaq. Perform a regression analysis between the previous
variables and briefly comment on the results.
[25]
3) Create a function called assess_portfolio() that takes as input an asset allocation of a
cryptocurrency asset portfolio and computes important statistics about the portfolio. You
are given the following inputs for analysing a portfolio:
• A date range to select the historical data to use (specified by a start and end date).
You should consider performance from close of the start date to close of the end
date on a daily basis, if you choose intraday data then please use daily median
price.
• Symbols for each cryptocurrency asset (e.g., BTC, ETH, XRP, LTC).
• Portfolio allocations for each asset at the beginning of the simulation (e.g., 0.2,
0.3, 0.4, 0.1) which should sum to 1.0.
• Total starting value of the portfolio (e.g. $1,000,000)
Your goal is to create a programme to compute and visualise the daily portfolio value
over the given date range within a sample period from: February 15, 2017 to February 15,
2019, and then the following statistics for the overall portfolio:
• Cumulative return for the chosen date range from the sample period
• Plot the average period return (if sampling frequency == 252 trading days then
this is average daily return for the portfolio)
• Calculate the standard deviation of daily returns
• Calculate the annualised Sharpe ratio of the daily returns of the portfolio, given
daily risk-free rate (usually average of overnight LIBOR rate), and yearly
sampling frequency (usually 252 days, the number of trading days in a year)
• Plot the moving historical volatility with a minimum rolling period of 30 days
(i.e. moving historical standard deviation of the log returns)
• Ending value of the portfolio
Are these returns all positive? Or not? What is your explanation for what you observe?
[25]
4) Create an event study profile of a specific market event in the Cryptocurrency market,
and compare its impact on two relatively liquid cryptocurrencies. The event is defined as
when the daily median price / daily close price of the cryptocurrency is 10% lower than
the previous day. Evaluate this event for the time period: February 15, 2017 to February
15, 2019. Create and describe your own trading strategy based on the findings, to include
writing the code for your trading strategy and execution of the strategy with relevant
visual output in plots for this sample period. [20]
5) Now that you’ve got your trading strategy at hand, it’s a good idea to also backtest it and
optimise its performance. However, when you’re backtesting, it’s a good idea to keep in
mind that there are some pitfalls. For example, external events such as market regime
shifts, which are regulatory changes or macroeconomic events. Also, liquidity constraints,
could affect your backtesting heavily. Create your own ‘market event’ and experiment
with it using your trading strategy developed in the previous question for a
cryptocurrency portfolio. Consider answering these questions:
? Explain why the event chosen is a relevant ‘market event’ for cryptocurrency assets?
? Is it possible to make money using your event?
? If it is possible, what is your trading strategy? Think about details of entry (buy), exit
(sell) and how many days would you hold?
? Is this a risky strategy?
? How much do you expect to make on each trade?
? How many times do you expect to be able to act on this opportunity each year?
? Is there some way to reduce the risk? [20]
For questions 2, 3, 4 and 5, you will need to write code in Python 3.6 using Python functions, libraries
and classes. You will need to respect the good programming practices such as commenting your code
so that it is clear (to you and other programmers that might read it) as to what it attempts to execute.
Assessment Criteria
Your work will be assessed in terms of how well you have carried out the various parts of the
assignment, in terms of: appropriate understanding of key concepts / principles discussed in class
(programming code, functions, classes, commenting); correctness, clarity, completeness and
relevance of your interpretations and commentaries.
The marks assigned to each part of the assignment are given in square brackets at the end of each part.

Kindly reply to me the soonest if you could help me out.
you need to use   python 3.6

Many thanks

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

MatLab Program Project

MatLab Program Project

**Begin with typing in the Live Script:

format Comment by Wadlington, Julie: I do not see this at all. Just copy paste it in the code

format compact

 

syms x

F = @(x) atan(x) + x – 1

F1 = eval([‘@(x)’ char(diff(F(x)))])

 

G=@(x) x.^3-x-1

G1=eval([‘@(x)’ char(diff(G(x)))])

 

Notes: (1) a MATLAB command syms x defines a symbolic variable x;

(2) F and G are the function handles and F1 and G1 are the function handles for the first derivatives of F and G, respectively.

 

 

**Next, we create and output 2-D plots of the functions F, G, and y=0 on the interval [-2, 2] in order to visualize the x-intercepts and choose initial approximations. An initial value should be chosen close to the x-intercept which we are approximating. Comment by Wadlington, Julie: I see a graph I see F I do not see G, y=0 [-2,2]

**Type in the Live Script the code given below – it will output the graphs of F and G together with the function y=0 after you Run the section.

 

yzero=@(x) 0.*x.^(0)

x=linspace(-2,2); Comment by Wadlington, Julie: Copy past this code in after the top code

plot(x,F(x),x,yzero(x));

plot(x,G(x),x,yzero(x));

Note: here we have created another symbolic function yzero.

 

It is obvious from the properties of the function F(x) that it has only one real zero, which we will approximate. Concerning the function G, which is a polynomial of the third degree (we will denote it p), we are going to verify that it has only one real zero. In order to do that, we find all zeros of the polynomial p using MATLAB built-in functions sym2poly and roots: the function sym2poly(p) outputs the vector of the coefficients of the polynomial p (in descending order according to the degree), and the composition of two functions roots(sym2poly(p))outputs all zeros of the polynomial p. Comment by Wadlington, Julie: I don’t see this

**Type in the Live Script:

syms x

p=x^3-x-1;

roots(sym2poly(p))

 

After you Run Section, this part of the code will output the three zeros of the polynomial p – two of them are complex conjugate numbers and one is a real zero that we will approximate.

 

Next, we proceed with constructing a function in the file that approximates a real zero.

**Create a function called newtons. It begins with: Comment by Wadlington, Julie: Or this

function root=newtons(fun,dfun,x0)

format long

The inputs fun and dfun are the function and its first derivative, respectively, and x0 is the initial approximation. The output root will be our approximation of the real zero of a function. We will program consecutive iterations according to the Newton’s method, and we will assign to root the iteration which will be the first one falling within a margin of 10^(-12) from the MATLAB approximation x of that zero – the last is delivered by a built-in MATLAB function fzero. The details are below:

**Type the line

x=fzero(fun,x0) Comment by Wadlington, Julie: I do not see this

in your function newtons and output x with a message that it is a MATLAB approximation of the real zero of the function.

 

**Then, your function newtons will calculate consecutive iterations , using Newton’s Method (see Theory above). You can employ a “while loop” here. The loop will terminate when, for the first time, abs(-x)<10^(-12) for some consecutive iteration . Output with a corresponding message the number of iterations N, and assign the last iteration, , to the output root. This will be the end of your function newtons. Comment by Wadlington, Julie: Or this

 

**Print the function newtons in your Live Script.

**Next, proceed with the following tasks in the Live Script:

Part (a)

You will work with the function F in this part. Using the graph of the function F, choose three different values of the initial approximation x0 of the zero of F.

**Then, input the function handles:

fun=F;

dfun=F1;

and run the function root=newtons(fun,dfun,x0) for each of your three choices of x0 – one at a time.

 

Part (b)

You will work with the function G in this part.

**First, input the corresponding function handles.

**Then, run root=newtons(fun,dfun,x0) for each of the initial approximations (1)-(8) of the real zero of G:

(1) x0=1.3;

(2) x0=1;

(3) x0=0.6;

(4) x0=0.577351;

(5) Pick the initial value x0 to be the positive zero of the derivative of G(x). Type

x0=1/sqrt(3)

(display x0) and run the function root=newtons(fun,dfun,x0).

(6) x0=0.577;

(7) x0=0.4;

(8) x0=0.1;

 

 

1

 

0

x

,0:

n

xnN

=

N

x

N

x

N

x

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!