use r to slove the project

  1. Prepare a graph showing indices of mean and median (log) prices by quarter for the data in price.rda.
  2. Using the price.rda data set, regress lnprice on lnbldg, lnland, age, z, factor(quarter), and factor(ctract).
  3. Add distance to Lake Michigan, distance to the nearest EL station, and distance to State and Madison Street to the data set, and add them as explanatory variables to the regression in part 2. Discuss the results.
  4. Prepare graphs of the four price indices – means, medians, and the coefficients on the factor(quarter) variables from parts 2 and 3. The indices should all have a value of zero for 2000:1.
  5. Prepare a table with the estimated coefficients, standard errors, and the two R-square values.
  6. Discuss all of the results.

Philosophy 6

 To what extent can you relate to Plotinus’s “trinity”?  To what extent does Augustine’s notion of the image of God make sense to you?  250 words

Explanation Presentation

Source Requirement: For this presentation you are required to use at least three (3) credible sources. If you fail to use the appropriate number of acceptable sources you may be penalized twenty (20) points on your presentation grade. Additionally, using websites such as Wikipedia, About.com, AskJeeves, or other such online encyclopedias will result in an automatic zero (0) for the presentation grade. Finally, although encouraged, interviews, personal correspondence, atlases, dictionaries and encyclopedias do not count toward your total number of sources—though they must be listed in the bibliography and properly cited within the outline.

 

Topic: The theme of this course is “Control” and “gun”

 

 Task: Students will explain a complicated subject related to the course theme in 4 minutes to a classmate. The listener will be randomly assigned on the day of the presentation. The listener must pay close attention to the speaker. The speaker will ask the listener a question regarding the explanation within the 4 minutes. For example, “can you give me an example,” “think of a way/time when you experienced this,” “how do you make sense of this.” This question should require the listener to apply the material from the explanation in a way that demonstrates their understanding. These questions should not be geared toward offering an opinion, such as the following: “How do you feel about this?” “What are your thoughts on this issue?” “Do you believe what I am telling you?” At the conclusion of the presentation the listener will also record his/her answers to a list of questions pertaining to his/her partner’s presentation. The “answers” will be part of the speaker’s grade as well as the listener’s grade. All students will have the opportunity to play both roles at least once. 

 

400 words, must be explanation!!!! 

fourhelpme

fourhelpme

for this discussion post explain how you think kantianism would respond to the following scenario

Q: While sitting in your favorite restaurant, you overhear the owner tell a mildly racist joke to one of the other customers. You come here a lot and you know the owner in passing, while the person to whom he is speaking is a stranger to you but clearly is a friend of the owner. You have never seen (or heard) the owner do anything of this sort before.

What would the philosopher Kant, and his namesake moral theory suggest you should do? Use the principles of the theory to justify your decision(s) (i.e. the two formulations of the categorical imperative).

Remember: Don’t just tell us what they would suggest doing; show us why they would recommend doing it as well, citing relevant information from the case and the theory.

Requirments: Two paragraphs

INFO: https://learn-us-east-1-prod-fleet01-xythos.s3.us-east-1.amazonaws.com/5df3e136cc472/3173468?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Ethics%2520-%2520A%2520Kantian%2520Approach%2520to%2520World%2520Hunger%2520-%2520Onora%2520ONeill.pptx&response-content-type=application%2Fvnd.openxmlformats-officedocument.presentationml.presentation&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200413T021546Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAZH6WM4PLTYPZRQMY%2F20200413%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=77e937c43d697f15abdd3ce294c22da37a283b1711cb9cb6312324f8f4d67324

essay for history 1302 please read requirements

HIST 1302: Writing Assignment Please read all instructions carefully.

  • any instances of plagiarism will result in a failing grade (if you are unsure what constitutes plagiarism, please contact Professor Welty)
  • you must provide evidence in your essay

o Please refer to evidence in the film and cite it by indicating the time in the

film, which should be visible by pausing the stream. Cite the time in the film at the end of your sentence, as follows: (34:23). This should be the time in the film, not the time remaining.

  • you must offer your own analysis in your essay
  • as this is an academic writing assignment; please follow the following instructions:

o avoid contractions (e.g., do not use don’t)
o avoid being too colloquial and avoid slang
o use a person’s full name in his/her first mention and then use the last name

subsequently
o write out numbers less than one hundred (including centuries: ‘eighteenth’

not 18th century)
o creativity is encouraged, but clarity is supreme

â–ª if you are uncertain what a word means, you should refrain from using it (or look up its meaning and then use it if appropriate)

o avoid switching between verb tenses
â–ª for most historical writing, the past tense is most suitable

o avoid large block quotations

  • you will submit your essay via Blackboard (a hard copy is not required)
  • your essay should be between 350 and 650 words—do not exceed this limit by morethan 10% (doing so will lower your grade)
  • your essay’s heading must include: your name, the name of the assignment (Option#1 or #2), class & section number, the word count, and the date (you may include a title, but it is not required)o each element of your heading should be on its own line, beginning with your full name on the top left of your fist page (a title page is not required and should be avoided)
  • you must upload a Microsoft Word file with the extension .doc or .docx or a PDF o if you do not comply with this, your essay will be given a zero
  • If you select this option, you will watch one episode of this series and write an essay evaluating its content.
  • You may select any of the episodes, but the recommended episodes are: 2, 4, 5, 6, and 7. Depending on the episode you select, you will focus your work on Theodore,Franklin, or Eleanor Roosevelt, with some episodes featuring more than one of the figures.
  • In your first paragraph, please write a concise summary of the entire episode,identifying key person(s) and events covered in the film. Your reader should not be left wondering if you viewed the film or not. Be certain to identify the episode that you watched.
  • In your second paragraph, you should address this question:
    o What events, which shaped this era, were presented in the episode? Explainand analyze the events’ importance.
  • Please address the following questions in your third paragraph:o How did their context shape the main figures in the episode? o How did they react to their context and events of the period? o What surprised you about the figure(s) in the episode?
  • In a short fourth paragraph, please answer these questions:
    o What aspects of his/her/their character were emphasized?
    o What did you find admirable and/or regrettable about the person?
  • In a substantial fifth paragraph, you will address the following questions:
    o How would you evaluate the filmmaker’s presentation of the figure(s)? Did the treatment seem objective? Did you detect any bias? Please explain your evaluation.

here is the link for the video that MUST be seen in order to answer the essay question.

critique discussion post below half page th

Cyber-attacks on the financial industry are happening more frequently at an alarming rate of 300 times more in comparison with other industries (Thomas, 2019). In preparation for the annual 3-day security meeting with Padgett-Beale Inc. (PBI), a background paper has been created to highlight the cybercriminal activity that may pose a threat to PBI’s business model. To perform the analysis of the potential threats, the CISO collected data from recent events that have negatively impacted the financial services industry. One current event of particular interest that will be highlighted in this paper is the Capital One Breach that occurred on 22-23, March 2019.

Analysis

Per the Capital One 2019 Facts security report update for its recent cyber incident: “On July 19, 2019, we determined that an outside individual gained unauthorized access and obtained certain types of personal information about Capital One credit card customers and individuals who had applied for our credit card products” (Capital One, 2019). Furthermore, it goes on to state that this attack impacted more than 100 million individuals exposing “addresses, phone numbers, and dates of birth, along with 140,000 Social Security numbers, 80,000 bank account numbers, credit scores, and transaction data” (CISO MAG, 2019). This attack was one of the most prominent attacks in recent history that could have been ultimately prevented if their firewall had been configured correctly according to security analysts (Thomas, 2019).

Per the CISO MAG (2019), the FBI charged a suspect, “Paige A. Thompson, with computer fraud and abuse. Thompson, who went by the hacker name ‘erratic’, allegedly exploited a misconfigured firewall to access the Capital One cloud repository and exfiltrate the data in March 2019”. As a result, Capital One sent out notices to all of its customers that were impacted by the security breach. Furthermore, the bank offered free credit monitoring and identity protection for all individuals that had their Social Security numbers and/or bank account numbers exposed (Capital One, 2019). There is no known or clear motive for her reasons for exploiting a server vulnerability and stealing Capital One’s customer data.

Should the company take actions or develop strategies to protect itself from similar crimes? What are your recommendations in this regard?

In response to the growing threats faced by the Financial Services Industry, PBI must be prepared to protect its digital assets from cyber-attack or other compromise. First, the M&A must continue its “due diligence” as evidenced in the Risk assessment, subsequent, Gap Analysis, and the development of a Cybersecurity Strategy. Compiling the data from the tools aforementioned will aid PBI in identifying security vulnerabilities and risk mitigation strategies to eliminate or reduce the risk to an acceptable level. Failing to do so, can open the company up to lawsuits, reputation damage and substantial cleanup costs. Furthermore, due to PBI-FS’s limited nature of experience in the Financial Industry, special care needs to be taken to address the impact a breach would have on its operations by , at a minimum, conducting a Business Impact Analysis (BIA).

Closing

In closing, the writing is on the wall and PBI-FS has been put on notice of impending attempts to compromise its security based on recent statistics and trends. As a new formed financial services division, they are a prime target for cyber criminals looking for an easy hit. Developing a Cybersecurity Strategy and Implementation plan will steer the team in the right direction. Likewise, PBI-FS must be extraordinarily vigilant in performing its “due diligence” in all aspects of its business model. Finally, by adopting the “best practices”/frameworks to harden their security posture against the looming threats, PBI-FS can avoid being a victim like Capital One.

Capital One. (2019). Information on the capital one cyber incident. Retrieved from https://www.capitalone.com/facts2019/

CISO MAG. (2019). CISO mag rewind: biggest financial data breaches of 2019. Retrieved from https://www.cisomag.com/ciso-mag-rewind-biggest-fi…

Thomas, B. (2019). Financial data breaches 2019: capital one, first american, desjardins, more. Retrieved from https://www.bitsight.com/blog/financial-data-breac…

SOcs2502

Part 1

 

Directions : Describe the following terms.  Responses to each topic should be a minimum of one paragraph in length, which must consist of five to seven sentences.  Please provide examples if applicable.  Students should utilize APA guidelines for formatting and citations.

 

1.      First world, Second world, the Third world

 

2.      Economic and technological disparity between the developed world and developing countries.

 

3.      The intrinsic and extrinsic factors that inhibit development in the third word.

 

4.      Burden of debt on developing countries.

 

5.      Income gap between the developed and developing countries.

 

6.      Impact of natural and man-made disasters in Bangladesh.

 

7.      Impact of technology on Afghan people in the war against the Soviet Union during the cold war period.

 

8.      What is meant by globalization?

 

9.      Status of use of appropriate technologies (solar and wind) for meeting the energy demand of the third world.

 

10.    Efforts for recycling in the developing countries.

 

 

Part 2   Answer in at least 5 to 10 sentences.

 

 

Q. why is AIDS now considered the world’s most deadly infectious disease? What have governments done to prevent AIDS? Are the preventions working?

INF 620 Week 1 DQ 2

  

Ashford 2: – Week 1 – Discussion 2

 

Your initial discussion thread is due on Day 3 (Thursday) and you have until Day 7 (Monday) to respond to your classmates. Your grade will reflect both the quality of your initial post and the depth of your responses. Reference the Discussion Forum Grading Rubric for guidance on how your discussion will be evaluated.

 

     

Uses   of Information Technology

How could a business use information technology to increase switching costs and lock in its customers and suppliers? How could a business integrate flexible and rigid solutions? Use business examples to support your answer. Respond to at least two of your classmates’ posts.

Sweeping structural changes have occurred in the American economy in the past few decades. These…

Sweeping structural changes have occurred in the American economy in the past few decades. These have had deep impacts on labor markets and middle-income households. The PBS Frontline documentary film “Two American Families” follows the lives of
two American households as they experience these changes from 1992 to 2012. It is available for free to view at the following

website:
http://www.pbs.org/wgbh/pages/frontline/two-american-families/
1) Watch the film documentary above. (It’s about 80 minutes).
2) Write a 2-3 page reaction paper to this documentary that applies concepts, knowledge, and economic theory learned during the class. Your reaction paper must say something meaningful and interesting using labor economics. It must be more than a summary of the film. It must use labor economics to explain what is observed in the film.
A paper receiving full extra credit does the following:
– Makes an interesting, thoughtful point
– Applies economic theory to make point
– Shows the student learned something about labor economics in the past month
– Uses examples from the film, refers to film to make point
– Shows the student put thought and effort into the reaction paper and film
– At least 2 pages in length, typed, one inch margins, uses paragraphs and complete sentences, etc