Python Api Weather Py

In this example, you’ll be creating a Python script to visualize the weather of 500+ cities across the world of varying distance from the equator. To accomplish this, you’ll be utilizing a simple Python library, the OpenWeatherMap API, and a little common sense to create a representative model of weather across world cities.

Your first requirement is to create a series of scatter plots to showcase the following relationships: Temperature (F) vs. Latitude Humidity (%) vs. Latitude Cloudiness (%) vs. Latitude Wind Speed (mph) vs. Latitude

After each plot add a sentence or too explaining what the code is and analyzing.

Your second requirement is to run linear regression on each relationship, only this time separating them into Northern Hemisphere (greater than or equal to 0 degrees latitude) and Southern Hemisphere (less than 0 degrees latitude): Northern Hemisphere – Temperature (F) vs. Latitude Southern Hemisphere – Temperature (F) vs. Latitude Northern Hemisphere – Humidity (%) vs. Latitude Southern Hemisphere – Humidity (%) vs. Latitude Northern Hemisphere – Cloudiness (%) vs. Latitude Southern Hemisphere – Cloudiness (%) vs. Latitude Northern Hemisphere – Wind Speed (mph) vs. Latitude Southern Hemisphere – Wind Speed (mph) vs. Latitude

After each pair of plots explain what the linear regression is modeling such as any relationships you notice and any other analysis you may have.

Optional You will be creating multiple linear regression plots. To optimize your code, write a function that creates the linear regression plots.

Your final notebook must: Randomly select at least 500 unique (non-repeat) cities based on latitude and longitude. Perform a weather check on each of the cities using a series of successive API calls. Include a print log of each city as it’s being processed with the city number and city name. Save a CSV of all retrieved data and a PNG image for each scatter plot.

C Basic

1.Ask the user the name of the item to be used in the calculations.

2.  Ask the user the current price of the item.

3.  Ask the user for the number of years that they have to pay for the item.

4.  Ask the user for the interest rate.

5.   If the user does not make any payments,  calculate what the item would cost when they pay for the item.

 The output should look like this:

The (name of the item) costs (present cost) now.

The (name of the item) will cost (future cost) in (number of years) years.

Run the program with the following information.

The item is a car.

The present cost is $25,000.

The number of years is 10.

The interest rate is 8%.

Please upload the .cpp file and the results of running the program.

this is a community college assignment and should be done with low complex coding. I need .cpp file and the results of running the program

Rootkit Malware

Cybercriminals use many different types of malware to attack systems. Write about Rootkit using your own words, explain how to defend yourself against it in 350 words.

Cyber Security Planning And Mgmt Week 8

Week 8 – DiscussionWhat do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Discuss this question and provide support for your answer. (300 words)

Writing Assignment – WK 8Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Google’s Data Center may give you some ideas to write about for this assignment.
Your written assignment should consist of 3 paragraphs.

Question 20206

1) Using the following link as your reference, select TWO and explain the differences

(viruses, worms, trojans, and bots). 

2) Conduct your own social engineering experiments.

i) While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk, or cashier personal questions about their family or their interests.How much information are you able to obtain about this person you do not know?

Name, address, age, religion, political beliefs, place of birth, pets, hobbies, number of children, type of car they drive, or any other information you think you can obtain.

Write your findings in either a list or in paragraph form.

3) n a few short paragraphs, explain which cloud services you use (Google, Amazon, iCloud, Verizon, Microsoft One, Dropbox, etc) and what type of information you store (docs, photos, music, other files?). How much space do you have and what does this cost per month?

Information Governance 19553297

W1: Research Question

Research Question

Each week, view the video lectures under Learning Activities to learn about the parts of the research paper. This week, you will learn about the Research Question and the Case.


The purpose of this assignment is to select the research question for your research paper assignment.


The research paper assignment is a semester-long case study research project. Your research project is to discover, compare, and contrast privacy policies. You will achieve this by examining online company policies.

You will choose at least three online organizations in the same industry. For example, you may examine the online privacy policies of three hospitals. Alternatively, you may choose to examine the privacy policies of three universities.

Review this week’s learning activities on case studies. Do a preliminary data search to be sure there is data for your research before finalizing your question.

Research Question: How do (select the industry) ****************************?

Select the industry of your choice such as healthcare, education, finance, etc.You will study their online policies to see how the company manages privacy issues. 


Prepare a Microsoft Word document that includes: Title page Introduction Research question – State your research question as a single question such as How do healthcare companies address privacy in their policies? Background Reference page Certification of Authorship (sample attached)  Certificate of Authorship.docx

The research question should be the last sentence of your introduction. The background is an explanation of the area of your research and sets the context for your study.

Your document should be written in APA style and include at least 3 supporting academic references. Your document should be a minimum of 2 pages in length (excluding the title page, reference page, and certificate of authorship).

Ehdb 6

In 250 words.  

Explain in your own words what type of information can be obtained by using network scanning techniques and why it is an important intelligence gathering process.

Assignment 19575775


Subject : Data Science & Big Data Analy
Provide a reflection of at least 300 words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Assignment Requirements:

Provide a 300 word of minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Please Read The Question In Below Comment Section 19606551

Milestone 2 Fiat Chrysler, you will outline your  marketing objectives, describe any research you would do, and describe  your target market(s). Paper length: 2 pp. not including title page  and references. (Attached milestone 1 doc)

Write an essay of at least  2 pages with APA format. Write an essay format not in bulleted, numbered or another list format.


This paper will be evaluated through SafeAssign. Need plagiarism report mandatory.


Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered 

Discussion Team Management 19567313

Team Leadership/Management Style

Part 1: According to the Sarin and O’Connor (2009) article, certain style and goal structures of team leaders have a strong influence on internal team dynamics.  Based on your research within the article and textbook, as well as your own experience, what team leader management style would be most effective in leading a team in which you were a member?

Part 2: DeRue, Barnes, and Morgeson (2010) found that team leadership style effectiveness depended on the level of charisma exhibited by the leader.  Drawing from the article and the textbook, have you ever worked for a charismatic leader?  What style (coaching or directing) did that leader administer?  Was he or she effective in leading you as part of the team?

Specific Instructions:

Read and respond to three (3) of your classmates’ posts. See posting/discussion requirements.

Be sure to support your work with specific citations from this week’s Learning Resources and any additional sources.

Read a selection of your colleagues’ postings.

Respond to at least 3 your colleagues’ posts in one or more of the following ways:

• Ask a probing question, substantiated with additional background information, evidence or research.

• Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives.