Analyzing the data using r programming using random forest model.

 Problem: The Texas A & M University Real Estate Center collects home listings data in Texas. One of the metrics is the number of months a home is listed until it sells (Texas A & M University, n.d.). A stagnant home listing is not beneficial to anyone in the process, typically impacting the individuals selling their dwellings the most. Opportunities to reduce the wait-time-to-sales for a particular home will reduce the potentially negative impact on the individuals selling their homes.

 Question: Using the data consolidated by Texas A & M University (n.d.), what predictors represent the majority of the explainable variance when predicting the number of months a property will remain in inventory considering the quantity of real estate sales, the monetary value of those sales, and the average sale price, the median sale price, and the quantity of properties in the inventory, the year, and the month in the data set? 

Objective: Use a random forest model as the analysis method to answer the research question. Additionally, consider how this research may help a realtor reduce the amount of time that their listings remain in their inventory when you discuss and present your findings. 

Professional Paper

This assignment is based on the attached article and Professional Paper Worksheet.
A template for the professional paper has been attached.
Please pay attention to the specified word counts and ensure that they are not exceeded,

This assignment must use the required article stated in the announcement described above to complete the following items:

1. Title Page

2. Introduction
  A) Explain that this paper is a summary of the assigned article
  B) Explain that the impact of the article contents on your own future practice will be presented
  C) Length of Introduction must be 50-75 words

3. Assigned Article Summary
  A) Clearly summarize the major content of the assigned article. This should be an improved version of your Week 4 submission.
  B) One or two short quotations with citations (must include the assigned sentence for quotation)
  C) Several paraphrased areas with citations (must include the assigned sentence for paraphrasing)
  D) Length must be 175-200 words

4. Impact of Assigned Article Content on Future Practice
  A) Clearly state how learning from the assigned article will impact your future practice
  B) Must be your own ideas about the impact of the article on your future nursing practice
  C) Use first person in this section
  D) No citations are needed in this section
  E) Length must be 125-150 words

5. Conclusion
  A) Write a concise summary of the main points of the paper
  B) Provide a concluding statement
  C) Length must be 75-100 words

6. Reference for the assigned article should be a revised version of the Week 4 reference improved based on your instructor’s Week 4 feedback. Include the following:
  A) Author(s)
  B) Year
  C) Article title
  D) Journal name
  E) Volume number
  F) Issue number
  G) Page numbers
  H) Parentheses
  I) Double line spacing
  J) Hanging indent
  K) DOI if available

Attached you will find:
A) Assigned Article
B) Professional Paper Worksheet
C) Professional Paper Template
D) Rubric

Effects, Politics, and Regulatory Control of Tobacco Use

Effects, Politics, and Regulatory Control of Tobacco Use
Tobacco use is the primary cause of  mortality in the United States today. Tobacco use is responsible for  cancer, chronic obstructive pulmonary disease (COPD), asthma, and heart  disease and has caused the deaths of nearly half a million people per  year. Tobacco control, prevention, and treatment are compelling and  urgent public health issues. The development of tobacco control laws  have been passed by a number of states.
Write a comprehensive overview of the  health effects, politics, and regulatory control of tobacco use control  efforts. Your paper should be based on the following points:

What are the factors (biological, environmental, economic, and  political) that contribute to tobacco addiction? What are the medical  consequences (morbidity and mortality) for tobacco users?
What is the public health impact (epidemiological and economic) of tobacco use and secondhand smoke exposure?
How do tobacco control regulations relate to positive and normative economics?
How do tobacco control regulations impact individual health care
What is the public health policy regarding tobacco control? What is  the role of the state and Federal Government in policy making?
What is the history of regulatory tobacco control? What is the  current state of tobacco control in the United States (states that have  passed tobacco control regulations)?
What is the evidence that tobacco control is effective?

Based on your understanding, create a 6- to  7-page Microsoft Word document that includes the answers to the above  questions. You need a minimum of five scholarly sources that should be  in APA format for both in-text citations and citations on the reference  page.
This assignment requires a title page, an abstract, an introduction, a body, a conclusion, and a reference page.
Submission Details:

Support your responses with reasoning and examples
Cite any sources in APA format

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Info tec | Information Systems homework help

  

Part I Q1-10 (5 points each), choose best one. Please provide reason as asked of your choice in a few sentences, in your own words and/or reasons not choosing the other choices. Restating the problem in your own words does not constitute as the reason. Sometimes defining the terms may give you a clue to the reason. 

Reason:

1. How one should not report computer crime?

a. telephone 

b. e-mail

c. tell management in person

d. tell the IT department in person

Reason: Why you did not select other options

2. The algorithm _____ is no longer considered computationally secure.

a. DES

b. RSA

c. AES

d. Diffie-Hellman?

Reason: Why did you choose?

3.  Which of the following are the reason for the difficulties in prosecutions of computer-related crimes? (a, b, c or d)

1. The area of litigation is extremely technical and difficult to understand.

2. Most of the crimes do not fall under any of the current laws 

3. The laws themselves are relatively new and untested.

4. The technology is very dynamic, and the tactics of the perpetrators are constantly changing.

a. 1 and 2

b. 1, 2 and 3

c. 1, 2 and 4

d. 1, 3 and 4

Reason:

4. What is authentication?

a. the act of binding an entity to a representation of identity

b. the act of ensuring that information is being sent securely

c. the act of ensuring that the receiver of information actually received it

d. the act of binding a computer system to a network

Reason: Why it is important?

5. Which is not considered the misuse of information?  

a. the untimely release of secret information 

b. the deletion of information from a system

c. the illegal sale of information to rival companies

d. the misrepresentation of information

Reason:

6. How does a client machine find the web address associated with a particular URL?

a. It uses translation software in the interpreter.

b. It sends a message to the nearest domain name server.

c. It uses hashing to translate the address.

d. It sends a message to the URL server.

Reason:

7. What defines the strength of a cryptographic method?

a. number of shifts

b. need for a code book

c. complexity of the algorithm

d. length of time needed to crack it

Reason: Why it defines the strength?

8 What is the most important benefit of asymmetrical encryption? 

a. It speeds up the encryption process.

b. It makes e-mail easier to encode.

c. Only the sender knows to whom the information is going.

d. Encryption key can be transmitted openly and only the receiver can decrypt the information

Reason: Contrast with symmetrical encryption

9 What piece of legislation allows computer records documenting criminal activity to be used in court?

a. National Infrastructure Protection Act

b. Federal Computer Documents Rule 703(a)

c. Digital Signature Bill 

d. Federal Rules of Evidence 803(6)

Reason:

10 Which part(s) of CAIN is realized through the use of message digest functions and hashes? 

a. confidentiality 

b. authenticity 

c. integrity 

d. non-repudiation

How it is realized?

  

Part II Q1-2(Each 15 points)

QII.1 Suppose we use key pair K1, K2 (public key and private key) for encryption and key pair K3, K4 (public key and private key) for the digital signature

What are the advantages and disadvantages in the following cases

A. K1 and K2 are the same as K3 and K4

B. K1 and K2 are different than K3 and K4

QII.2  Suppose your spy colleague wanted to send you messages that you could be sure came from him (and not an enemy trying to pretend to be him). Your colleague personally tells you: “Whenever I send you a message, the last thing in the message will be a number. That number will be a count of the number of letter E’s in the message. If you get a message, and the number at the end is NOT an accurate count of the number of letter E’s, then that message is from an imposter.”

a. [2 pts] This number, put at the end of each message, is an example of what cryptographic item?

b. [2 pts] Does it have the characteristic of being one-way i.e. can you deduce the original message?

c. [4 pts] Is it collision resistant? Why?

d. [7 pts] Can you suggest some other way to indicate that message is from the sender without resorting to encryption?

  

Part 3: Essay Question. Maximum length: 900 words, (weight 20 pts.) 

An enterprising group of entrepreneurs is starting a new data storage and retrieval business, SecureStore, Inc. For a fee, the new company will accept digitalized data (text and images, multimedia), and store it on hard drives until needed by the customer. Customer data will be transmitted to and from SecureStore over the Internet. SecureStore guarantees that the confidentiality and integrity of the data will be maintained.

SecureStore also envisions certain information assurance requirements for their internal operations. Company employees will need to exchange confidential email and will need a mechanism for verifying the integrity and originator of some email messages. Also, SecureStore intends a daily backup of all customer data to a remote facility via a leased line. They wish to do so as economically as possible, while ensuring the data’s confidentiality and integrity. 

Describe briefly how they would satisfy Secure Store’s requirements as stated above. How would a successful candidate respond? 

First, list the requirements derived from the above statements (note the highlighted words); list them and address each requirement. Keep in mind that this business will be operating in the real world, which means please pay attention to economics