SlideShare a Scribd company logo
1 of 8
Discussion 1:
R was made concerning the stage for the factual calculation,
facilitating the traditional tests, group, and time arrangement
examination among others. R has a bigger local area for
information excavators that implies a ton of bundles that are
open both from the engineers of R and the clients. For
illustrations, there is a huge number of bundles and layers for
the plotting and examination of diagrams which incorporate
ggplot2.R has become another style for the computerized
reasoning scene consequently giving the instruments to the
neural organization, AI, and Bayesian inductions.
A python is a superb tool for software engineers and designers
across sheets. Regardless of whether building up a calculation
for the incitement biomolecules or the insect spam delicate
products, you will wind up at home utilizing the interfaces and
varieties of capacity. Delivered in the year 1989 it's cited as
perhaps the main general purposes objects arranged
programming dialects. Python has consistently developing
populism among the new software engineers that demonstrates
more extravagant local area clients and investigators.
Professionals for R versus Python
R
It is incredible for the control of information
R permits the clients to adjust the feel illustrations and to a lter
the insignificant coding which gives a benefit over contenders.
It is an amazing asset for measurable displaying, the production
of factual apparatuses for the information researchers, and being
harbingers in the field, liked by experienced developers.
Python
It is simple and it's instinctive to learn for novices.
Its appeal to the more extensive scope of clients makes an
always developing local area in more teaches and expanding
correspondence between the open-source language.
Exacting sentence structure constrains one to turn out to be
better in coding, composing becomes consolidated, clear code.
It is quicker in managing huge datasets and could stack records
effortlessly, making it suitable for the controllers of large
information.
Cons for R versus Python
Preparing speed:- R is viewed as lethargic where it requires the
items to be put away in actual memory which implies a more
prominent assessment when attempting to bridle the large
information. Python is appropriate for bigger datasets and its
capacity to stack huge records quickly.
Online people group:- R and python has a broadly upheld
encouraging group of people for connecting with were being a
priceless wellspring of help for bugs one can't appear
investigating promptly.
The steep expectation to learn and adapt:- For R the bend is
because of broad force for the analysts. Python is alluring for
new developers because of its usability and relative openness.
R is broadly utilized and spoken and one can exploit this. Those
intrigued by programming advancement, mechanizing, or
mechanical technology may discover you drenched in the
python local area.
References
Big Data Visualization: Allotting by R and Python with GUI
Tools. (2021). Retrieved 18 March 2021, from
https://ieeexplore.ieee.org/document/8538413/
Discussion 2:
The two R and Python are open source, state-of-the-art
programming languages. They are oriented toward data science.
To learn the two languages would be an ideal solution. Python
is a general-purpose, high-level programming language that
concentrates on clearer and versatile programming. In contrast,
R is primarily a low-level programming language used by data
miners and statisticians for developing graphical
representations, statistical software, and for data analysis. R is a
programming language that is free and is regarded as the best
because most statistical languages are not priceless (Zeolearn
Author, 2019). Python is a high-level language, and it is
exceptionally flexible. R can do data analysis without loading
any package in its memory. Contrary, Python requires packages
such as pandas and NumPy for processing the data and
developing data frame. R codes require more maintenance ace
while in python, code they are more robust and easier to
maintain. R is excelling utilized for visualizing data, while
python is excelling for deep learning.
One of the advantages of python is that it is a language for
general-purpose. It is also extremely easy and instinctive. The
learning curve is not very steep, and one can quickly write
programs. One of its disadvantages is that it has many nice
visualization libraries. Although, it becomes a bit challenging to
select from the huge range of choices. Contrary to R, these
libraries create complicated visualizations which to look at may
not be very pleasing. Some pros of R are that it has a rich
ecosystem of an active community and cutting-edge packages. It
also has some cons, which is its learning curve is very steep. An
example of python is to find the factorial of a number. An
example of R is to take input from user. I foresee using python
to create tons of websites.
References
Zeolearn Author. (2019, 10). R vs. Python. Zeolearn.
https://www.zeolearn.com/magazine/comparison-of-r-and-
python
Discussion 1:
Cyber terrorism is considered as the terrorism activity in which
attackers attack on the properties and affect the computer,
information by taking support of internet. This kind of terrorism
activities may cause physical harm to the real world and can
disrupt the infrastructure as well.
Cyber attacks are generally done to harm particular
person but it has no specific goal but cyber terrorism activities
are being performed to hurt specific component of political
system of the country (Taylor and et.al. 2019). Cyber terrorism
activities are being performed with specific motive. The main
motive of this kind of criminal activities is to destroy the
enemies and their operational capabilities as well. By attacking
on the system terrorist try to finish the operational capacity of
the nation so that it may fail to handle the critical situations
well. Another major motive of cyber terrorism is to
misrepresent the reputation of the firm. Many big nations have
strong infrastructure facilities and have sound system as well. If
terrorists attack on these systems then it may cause harm to the
nation. Special there is presence of specific motive then cyber
attack is considered as cyber terrorism
The main target of such kind of terrorism activities are economy
of the nation and particular industry which is performing well in
the market. By attacking the industry, nation may get failed to
handle the security effectively.
These attacks are done with the intention to destroy the
organization and hurt the public of that country. If there is
presence of this feature then this would make the cyber attack
as the cyber terrorism activity (Venkatachary, Prasad &
Samikannu, 2018).
The main agenda of cyber attack is to gain financial benefits or
to hurt the other person but when these attacks are performed to
destroy the political system then it would turn the entire
situation in to the cyber terrorism. These professional hackers
perform such illegal activities to hurt the entire political system
of the country.
References
Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., &
Tafoya, W. L. (2019). Cyber crime and cyber terrorism. New
York, NY: Pearson.
Venkatachary, S. K., Prasad, J., & Samikannu, R. (2018).
Cybersecurity and cyber terrorism-in energy sector–a review.
Journal of Cyber Security Technology, 2(3-4), 111-130.
Discussion 2:
Cyber-attacks are strikes launched by cyber criminals using
computers against a single computer or multiple computers. The
purpose of cyber-attacks is usually to maliciously steal
information from computers or use a breached computer to
attack other computers. The methods used to launch cyber-
attacks include malware, phishing, denial of service among
others. Cyber attacks are preventable. Cyber terrorism on the
other hand, is the use of the internet to perform violent
activities that can lead to the loss of lives or serious bodily
harm. Cyber terrorism is the use of computers or devices to
cause harm to other uses for personal gain of the cyber terrorist.
These two terms, even though may seem to mean the same
thing, refer to two different acts.
Cyber-attacks are taken to be more information oriented as
compared to cyber terrorism. A cyber attack can be viewed as a
launchpad for future cyber terrorism. The theft of information
from personal computers through the illegal access to passcodes
and the breaking of security barriers is a cyber-attack. When
such information and data are used to perform other serious
crimes like blackmail, it becomes cyber terrorism. Cyber
terrorism is therefore more violence oriented than cyber-attack.
A cyber terrorist can deny the user of a personal computer the
use of their own computer. That is classified as a cyber -attack.
If the terrorist then goes forward to steal information from such
computers and blackmail the user or cause actual bodily harm to
the user, it becomes cyber terrorism (Xuan & Zuyi, 2017).
An attack can be classified as cyber terrorism if the attack is
used for acts of terrorism. These acts include grievous bodily
harm, blackmail, murder or robbery and such like vices. Cyber
attacks are used to launch cyber terrorism. This is because cyber
attacks involve the access of computers and/or the illegal access
of information and data in the affected computers. A cyber
attack can be termed as cyber terrorism if it affects many users
at once.
Reference
Xuan Liu, & Zuyi Li. (2017). Trilevel Modeling of Cyber
Attacks on Transmission Lines. IEEE Transactions on Smart
Grid, 8(2), 720–729.

More Related Content

Similar to Discussion 1R was made concerning the stage for the factual ca

JIMS Rohini IT Flash Monthly Newsletter - October Issue
JIMS Rohini IT Flash Monthly Newsletter  - October IssueJIMS Rohini IT Flash Monthly Newsletter  - October Issue
JIMS Rohini IT Flash Monthly Newsletter - October IssueJIMS Rohini Sector 5
 
Data science presentation - Management career institute
Data science presentation - Management career instituteData science presentation - Management career institute
Data science presentation - Management career institutePoojaPatidar11
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET Journal
 
Python vs. r for data science
Python vs. r for data sciencePython vs. r for data science
Python vs. r for data scienceHugo Shi
 
Copy of State of AI Report 2023 - ONLINE.pptx
Copy of State of AI Report 2023 - ONLINE.pptxCopy of State of AI Report 2023 - ONLINE.pptx
Copy of State of AI Report 2023 - ONLINE.pptxmpower4ru
 
State of AI Report 2023 - ONLINE presentation
State of AI Report 2023 - ONLINE presentationState of AI Report 2023 - ONLINE presentation
State of AI Report 2023 - ONLINE presentationssuser2750ef
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYCynthia King
 
What Is The Future of Data Science With Python?
What Is The Future of Data Science With Python?What Is The Future of Data Science With Python?
What Is The Future of Data Science With Python?SofiaCarter4
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet IJECEIAES
 
Annotated Bibliography On Unreliable Software
Annotated Bibliography On Unreliable SoftwareAnnotated Bibliography On Unreliable Software
Annotated Bibliography On Unreliable SoftwareMary Brown
 
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...IRJET Journal
 
How is Python Useful for Cybersecurity in 2024
How is Python Useful for Cybersecurity in 2024How is Python Useful for Cybersecurity in 2024
How is Python Useful for Cybersecurity in 2024riyak40
 
Python & Data Science
Python & Data SciencePython & Data Science
Python & Data ScienceYounusS2
 
A Review Paper on Big Data: Technologies, Tools and Trends
A Review Paper on Big Data: Technologies, Tools and TrendsA Review Paper on Big Data: Technologies, Tools and Trends
A Review Paper on Big Data: Technologies, Tools and TrendsIRJET Journal
 
Is r or python better for data journalism projects hari sandeep reddy
Is r or python better for data journalism projects    hari sandeep reddyIs r or python better for data journalism projects    hari sandeep reddy
Is r or python better for data journalism projects hari sandeep reddyconfidential
 
State of AI Report 2023 - Air Street Capital
State of AI Report 2023 - Air Street CapitalState of AI Report 2023 - Air Street Capital
State of AI Report 2023 - Air Street CapitalAI Geek (wishesh)
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security ReportBAKOTECH
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionvivatechijri
 

Similar to Discussion 1R was made concerning the stage for the factual ca (20)

JIMS Rohini IT Flash Monthly Newsletter - October Issue
JIMS Rohini IT Flash Monthly Newsletter  - October IssueJIMS Rohini IT Flash Monthly Newsletter  - October Issue
JIMS Rohini IT Flash Monthly Newsletter - October Issue
 
Data science presentation - Management career institute
Data science presentation - Management career instituteData science presentation - Management career institute
Data science presentation - Management career institute
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
Python vs. r for data science
Python vs. r for data sciencePython vs. r for data science
Python vs. r for data science
 
Copy of State of AI Report 2023 - ONLINE.pptx
Copy of State of AI Report 2023 - ONLINE.pptxCopy of State of AI Report 2023 - ONLINE.pptx
Copy of State of AI Report 2023 - ONLINE.pptx
 
State of AI Report 2023 - ONLINE presentation
State of AI Report 2023 - ONLINE presentationState of AI Report 2023 - ONLINE presentation
State of AI Report 2023 - ONLINE presentation
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
 
What Is The Future of Data Science With Python?
What Is The Future of Data Science With Python?What Is The Future of Data Science With Python?
What Is The Future of Data Science With Python?
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
 
Chapter I.pptx
Chapter I.pptxChapter I.pptx
Chapter I.pptx
 
Annotated Bibliography On Unreliable Software
Annotated Bibliography On Unreliable SoftwareAnnotated Bibliography On Unreliable Software
Annotated Bibliography On Unreliable Software
 
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
 
Python and r in data science
Python and r in data sciencePython and r in data science
Python and r in data science
 
How is Python Useful for Cybersecurity in 2024
How is Python Useful for Cybersecurity in 2024How is Python Useful for Cybersecurity in 2024
How is Python Useful for Cybersecurity in 2024
 
Python & Data Science
Python & Data SciencePython & Data Science
Python & Data Science
 
A Review Paper on Big Data: Technologies, Tools and Trends
A Review Paper on Big Data: Technologies, Tools and TrendsA Review Paper on Big Data: Technologies, Tools and Trends
A Review Paper on Big Data: Technologies, Tools and Trends
 
Is r or python better for data journalism projects hari sandeep reddy
Is r or python better for data journalism projects    hari sandeep reddyIs r or python better for data journalism projects    hari sandeep reddy
Is r or python better for data journalism projects hari sandeep reddy
 
State of AI Report 2023 - Air Street Capital
State of AI Report 2023 - Air Street CapitalState of AI Report 2023 - Air Street Capital
State of AI Report 2023 - Air Street Capital
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security Report
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detection
 

More from VinaOconner450

Learning SimulationSpecific information to consider for your desig.docx
Learning SimulationSpecific information to consider for your desig.docxLearning SimulationSpecific information to consider for your desig.docx
Learning SimulationSpecific information to consider for your desig.docxVinaOconner450
 
Learning Activity 1Identify key external forces Then interview.docx
Learning Activity 1Identify key external forces Then interview.docxLearning Activity 1Identify key external forces Then interview.docx
Learning Activity 1Identify key external forces Then interview.docxVinaOconner450
 
Learning ReflectionHow would you apply the four p’s to a service .docx
Learning ReflectionHow would you apply the four p’s to a service .docxLearning ReflectionHow would you apply the four p’s to a service .docx
Learning ReflectionHow would you apply the four p’s to a service .docxVinaOconner450
 
Learning Activity #1Please discuss the ethical lessons that you le.docx
Learning Activity #1Please discuss the ethical lessons that you le.docxLearning Activity #1Please discuss the ethical lessons that you le.docx
Learning Activity #1Please discuss the ethical lessons that you le.docxVinaOconner450
 
Learning Activity Data on Child AbuseChildren are suffering from .docx
Learning Activity Data on Child AbuseChildren are suffering from .docxLearning Activity Data on Child AbuseChildren are suffering from .docx
Learning Activity Data on Child AbuseChildren are suffering from .docxVinaOconner450
 
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docx
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docxLearning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docx
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docxVinaOconner450
 
Learning ModulesCh. 11 Corrections History and Institutions His.docx
Learning ModulesCh. 11 Corrections History and Institutions  His.docxLearning ModulesCh. 11 Corrections History and Institutions  His.docx
Learning ModulesCh. 11 Corrections History and Institutions His.docxVinaOconner450
 
Learning goal To develop your ability to systematically analyze and.docx
Learning goal To develop your ability to systematically analyze and.docxLearning goal To develop your ability to systematically analyze and.docx
Learning goal To develop your ability to systematically analyze and.docxVinaOconner450
 
Learning Activity #1  What are the theoretical differences betw.docx
Learning Activity #1  What are the theoretical differences betw.docxLearning Activity #1  What are the theoretical differences betw.docx
Learning Activity #1  What are the theoretical differences betw.docxVinaOconner450
 
LEADERSHIPImagine you are the HR, describe the role of a leade.docx
LEADERSHIPImagine you are the HR, describe the role of a leade.docxLEADERSHIPImagine you are the HR, describe the role of a leade.docx
LEADERSHIPImagine you are the HR, describe the role of a leade.docxVinaOconner450
 
Lead_Professor,Look forward to your quality work!Looking for.docx
Lead_Professor,Look forward to your quality work!Looking for.docxLead_Professor,Look forward to your quality work!Looking for.docx
Lead_Professor,Look forward to your quality work!Looking for.docxVinaOconner450
 
Leadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxLeadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxVinaOconner450
 
Learning Activity 1Impart your understanding and the organizati.docx
Learning Activity 1Impart your understanding and the organizati.docxLearning Activity 1Impart your understanding and the organizati.docx
Learning Activity 1Impart your understanding and the organizati.docxVinaOconner450
 
Leadership versus Management Rost (1991) reinterpreted Burns mode.docx
Leadership versus Management  Rost (1991) reinterpreted Burns mode.docxLeadership versus Management  Rost (1991) reinterpreted Burns mode.docx
Leadership versus Management Rost (1991) reinterpreted Burns mode.docxVinaOconner450
 
Laura Jackson discusses three spatial scales on the aspects of phy.docx
Laura Jackson discusses three spatial scales on the aspects of phy.docxLaura Jackson discusses three spatial scales on the aspects of phy.docx
Laura Jackson discusses three spatial scales on the aspects of phy.docxVinaOconner450
 
Leadership Development and Succession PlanningAn effective success.docx
Leadership Development and Succession PlanningAn effective success.docxLeadership Development and Succession PlanningAn effective success.docx
Leadership Development and Succession PlanningAn effective success.docxVinaOconner450
 
Leadership FactorsWrite a four page paper (not including the tit.docx
Leadership FactorsWrite a four page paper (not including the tit.docxLeadership FactorsWrite a four page paper (not including the tit.docx
Leadership FactorsWrite a four page paper (not including the tit.docxVinaOconner450
 
Leaders face many hurdles when leading in multiple countries. .docx
Leaders face many hurdles when leading in multiple countries. .docxLeaders face many hurdles when leading in multiple countries. .docx
Leaders face many hurdles when leading in multiple countries. .docxVinaOconner450
 
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docx
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docxLaws Enforcement TechnologiesIn this week’s assignment, you will e.docx
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docxVinaOconner450
 
Law Enforcement  Please respond to the followingIdentify the ke.docx
Law Enforcement  Please respond to the followingIdentify the ke.docxLaw Enforcement  Please respond to the followingIdentify the ke.docx
Law Enforcement  Please respond to the followingIdentify the ke.docxVinaOconner450
 

More from VinaOconner450 (20)

Learning SimulationSpecific information to consider for your desig.docx
Learning SimulationSpecific information to consider for your desig.docxLearning SimulationSpecific information to consider for your desig.docx
Learning SimulationSpecific information to consider for your desig.docx
 
Learning Activity 1Identify key external forces Then interview.docx
Learning Activity 1Identify key external forces Then interview.docxLearning Activity 1Identify key external forces Then interview.docx
Learning Activity 1Identify key external forces Then interview.docx
 
Learning ReflectionHow would you apply the four p’s to a service .docx
Learning ReflectionHow would you apply the four p’s to a service .docxLearning ReflectionHow would you apply the four p’s to a service .docx
Learning ReflectionHow would you apply the four p’s to a service .docx
 
Learning Activity #1Please discuss the ethical lessons that you le.docx
Learning Activity #1Please discuss the ethical lessons that you le.docxLearning Activity #1Please discuss the ethical lessons that you le.docx
Learning Activity #1Please discuss the ethical lessons that you le.docx
 
Learning Activity Data on Child AbuseChildren are suffering from .docx
Learning Activity Data on Child AbuseChildren are suffering from .docxLearning Activity Data on Child AbuseChildren are suffering from .docx
Learning Activity Data on Child AbuseChildren are suffering from .docx
 
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docx
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docxLearning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docx
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docx
 
Learning ModulesCh. 11 Corrections History and Institutions His.docx
Learning ModulesCh. 11 Corrections History and Institutions  His.docxLearning ModulesCh. 11 Corrections History and Institutions  His.docx
Learning ModulesCh. 11 Corrections History and Institutions His.docx
 
Learning goal To develop your ability to systematically analyze and.docx
Learning goal To develop your ability to systematically analyze and.docxLearning goal To develop your ability to systematically analyze and.docx
Learning goal To develop your ability to systematically analyze and.docx
 
Learning Activity #1  What are the theoretical differences betw.docx
Learning Activity #1  What are the theoretical differences betw.docxLearning Activity #1  What are the theoretical differences betw.docx
Learning Activity #1  What are the theoretical differences betw.docx
 
LEADERSHIPImagine you are the HR, describe the role of a leade.docx
LEADERSHIPImagine you are the HR, describe the role of a leade.docxLEADERSHIPImagine you are the HR, describe the role of a leade.docx
LEADERSHIPImagine you are the HR, describe the role of a leade.docx
 
Lead_Professor,Look forward to your quality work!Looking for.docx
Lead_Professor,Look forward to your quality work!Looking for.docxLead_Professor,Look forward to your quality work!Looking for.docx
Lead_Professor,Look forward to your quality work!Looking for.docx
 
Leadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxLeadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docx
 
Learning Activity 1Impart your understanding and the organizati.docx
Learning Activity 1Impart your understanding and the organizati.docxLearning Activity 1Impart your understanding and the organizati.docx
Learning Activity 1Impart your understanding and the organizati.docx
 
Leadership versus Management Rost (1991) reinterpreted Burns mode.docx
Leadership versus Management  Rost (1991) reinterpreted Burns mode.docxLeadership versus Management  Rost (1991) reinterpreted Burns mode.docx
Leadership versus Management Rost (1991) reinterpreted Burns mode.docx
 
Laura Jackson discusses three spatial scales on the aspects of phy.docx
Laura Jackson discusses three spatial scales on the aspects of phy.docxLaura Jackson discusses three spatial scales on the aspects of phy.docx
Laura Jackson discusses three spatial scales on the aspects of phy.docx
 
Leadership Development and Succession PlanningAn effective success.docx
Leadership Development and Succession PlanningAn effective success.docxLeadership Development and Succession PlanningAn effective success.docx
Leadership Development and Succession PlanningAn effective success.docx
 
Leadership FactorsWrite a four page paper (not including the tit.docx
Leadership FactorsWrite a four page paper (not including the tit.docxLeadership FactorsWrite a four page paper (not including the tit.docx
Leadership FactorsWrite a four page paper (not including the tit.docx
 
Leaders face many hurdles when leading in multiple countries. .docx
Leaders face many hurdles when leading in multiple countries. .docxLeaders face many hurdles when leading in multiple countries. .docx
Leaders face many hurdles when leading in multiple countries. .docx
 
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docx
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docxLaws Enforcement TechnologiesIn this week’s assignment, you will e.docx
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docx
 
Law Enforcement  Please respond to the followingIdentify the ke.docx
Law Enforcement  Please respond to the followingIdentify the ke.docxLaw Enforcement  Please respond to the followingIdentify the ke.docx
Law Enforcement  Please respond to the followingIdentify the ke.docx
 

Recently uploaded

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 

Recently uploaded (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

Discussion 1R was made concerning the stage for the factual ca

  • 1. Discussion 1: R was made concerning the stage for the factual calculation, facilitating the traditional tests, group, and time arrangement examination among others. R has a bigger local area for information excavators that implies a ton of bundles that are open both from the engineers of R and the clients. For illustrations, there is a huge number of bundles and layers for the plotting and examination of diagrams which incorporate ggplot2.R has become another style for the computerized reasoning scene consequently giving the instruments to the neural organization, AI, and Bayesian inductions. A python is a superb tool for software engineers and designers across sheets. Regardless of whether building up a calculation for the incitement biomolecules or the insect spam delicate products, you will wind up at home utilizing the interfaces and varieties of capacity. Delivered in the year 1989 it's cited as perhaps the main general purposes objects arranged programming dialects. Python has consistently developing populism among the new software engineers that demonstrates more extravagant local area clients and investigators. Professionals for R versus Python R It is incredible for the control of information R permits the clients to adjust the feel illustrations and to a lter the insignificant coding which gives a benefit over contenders. It is an amazing asset for measurable displaying, the production of factual apparatuses for the information researchers, and being
  • 2. harbingers in the field, liked by experienced developers. Python It is simple and it's instinctive to learn for novices. Its appeal to the more extensive scope of clients makes an always developing local area in more teaches and expanding correspondence between the open-source language. Exacting sentence structure constrains one to turn out to be better in coding, composing becomes consolidated, clear code. It is quicker in managing huge datasets and could stack records effortlessly, making it suitable for the controllers of large information. Cons for R versus Python Preparing speed:- R is viewed as lethargic where it requires the items to be put away in actual memory which implies a more prominent assessment when attempting to bridle the large information. Python is appropriate for bigger datasets and its capacity to stack huge records quickly. Online people group:- R and python has a broadly upheld encouraging group of people for connecting with were being a priceless wellspring of help for bugs one can't appear investigating promptly. The steep expectation to learn and adapt:- For R the bend is because of broad force for the analysts. Python is alluring for new developers because of its usability and relative openness. R is broadly utilized and spoken and one can exploit this. Those intrigued by programming advancement, mechanizing, or
  • 3. mechanical technology may discover you drenched in the python local area. References Big Data Visualization: Allotting by R and Python with GUI Tools. (2021). Retrieved 18 March 2021, from https://ieeexplore.ieee.org/document/8538413/ Discussion 2: The two R and Python are open source, state-of-the-art programming languages. They are oriented toward data science. To learn the two languages would be an ideal solution. Python is a general-purpose, high-level programming language that concentrates on clearer and versatile programming. In contrast, R is primarily a low-level programming language used by data miners and statisticians for developing graphical representations, statistical software, and for data analysis. R is a programming language that is free and is regarded as the best because most statistical languages are not priceless (Zeolearn Author, 2019). Python is a high-level language, and it is exceptionally flexible. R can do data analysis without loading any package in its memory. Contrary, Python requires packages such as pandas and NumPy for processing the data and developing data frame. R codes require more maintenance ace while in python, code they are more robust and easier to maintain. R is excelling utilized for visualizing data, while python is excelling for deep learning.
  • 4. One of the advantages of python is that it is a language for general-purpose. It is also extremely easy and instinctive. The learning curve is not very steep, and one can quickly write programs. One of its disadvantages is that it has many nice visualization libraries. Although, it becomes a bit challenging to select from the huge range of choices. Contrary to R, these libraries create complicated visualizations which to look at may not be very pleasing. Some pros of R are that it has a rich ecosystem of an active community and cutting-edge packages. It also has some cons, which is its learning curve is very steep. An example of python is to find the factorial of a number. An example of R is to take input from user. I foresee using python to create tons of websites. References Zeolearn Author. (2019, 10). R vs. Python. Zeolearn. https://www.zeolearn.com/magazine/comparison-of-r-and- python Discussion 1: Cyber terrorism is considered as the terrorism activity in which attackers attack on the properties and affect the computer, information by taking support of internet. This kind of terrorism activities may cause physical harm to the real world and can disrupt the infrastructure as well.
  • 5. Cyber attacks are generally done to harm particular person but it has no specific goal but cyber terrorism activities are being performed to hurt specific component of political system of the country (Taylor and et.al. 2019). Cyber terrorism activities are being performed with specific motive. The main motive of this kind of criminal activities is to destroy the enemies and their operational capabilities as well. By attacking on the system terrorist try to finish the operational capacity of the nation so that it may fail to handle the critical situations well. Another major motive of cyber terrorism is to misrepresent the reputation of the firm. Many big nations have strong infrastructure facilities and have sound system as well. If terrorists attack on these systems then it may cause harm to the nation. Special there is presence of specific motive then cyber attack is considered as cyber terrorism The main target of such kind of terrorism activities are economy of the nation and particular industry which is performing well in the market. By attacking the industry, nation may get failed to handle the security effectively. These attacks are done with the intention to destroy the organization and hurt the public of that country. If there is presence of this feature then this would make the cyber attack as the cyber terrorism activity (Venkatachary, Prasad & Samikannu, 2018). The main agenda of cyber attack is to gain financial benefits or to hurt the other person but when these attacks are performed to destroy the political system then it would turn the entire situation in to the cyber terrorism. These professional hackers perform such illegal activities to hurt the entire political system
  • 6. of the country. References Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. New York, NY: Pearson. Venkatachary, S. K., Prasad, J., & Samikannu, R. (2018). Cybersecurity and cyber terrorism-in energy sector–a review. Journal of Cyber Security Technology, 2(3-4), 111-130. Discussion 2: Cyber-attacks are strikes launched by cyber criminals using computers against a single computer or multiple computers. The purpose of cyber-attacks is usually to maliciously steal information from computers or use a breached computer to attack other computers. The methods used to launch cyber- attacks include malware, phishing, denial of service among others. Cyber attacks are preventable. Cyber terrorism on the other hand, is the use of the internet to perform violent
  • 7. activities that can lead to the loss of lives or serious bodily harm. Cyber terrorism is the use of computers or devices to cause harm to other uses for personal gain of the cyber terrorist. These two terms, even though may seem to mean the same thing, refer to two different acts. Cyber-attacks are taken to be more information oriented as compared to cyber terrorism. A cyber attack can be viewed as a launchpad for future cyber terrorism. The theft of information from personal computers through the illegal access to passcodes and the breaking of security barriers is a cyber-attack. When such information and data are used to perform other serious crimes like blackmail, it becomes cyber terrorism. Cyber terrorism is therefore more violence oriented than cyber-attack. A cyber terrorist can deny the user of a personal computer the use of their own computer. That is classified as a cyber -attack. If the terrorist then goes forward to steal information from such computers and blackmail the user or cause actual bodily harm to the user, it becomes cyber terrorism (Xuan & Zuyi, 2017). An attack can be classified as cyber terrorism if the attack is used for acts of terrorism. These acts include grievous bodily harm, blackmail, murder or robbery and such like vices. Cyber attacks are used to launch cyber terrorism. This is because cyber attacks involve the access of computers and/or the illegal access of information and data in the affected computers. A cyber attack can be termed as cyber terrorism if it affects many users at once. Reference
  • 8. Xuan Liu, & Zuyi Li. (2017). Trilevel Modeling of Cyber Attacks on Transmission Lines. IEEE Transactions on Smart Grid, 8(2), 720–729.