review the corresponding data set and use it to answer questions and complete an exploratory data analysis. You will use R and Excel to complete the assignment.

The second data set includes data about the customers of a telecom company, the services they subscribed to, and whether they left the company’s services. Multiple aspects of the customer’s behaviors could be analyzed using this dataset.

The data and the variable descriptions can be found at:

https://www.kaggle.com/blastchar/telco-customer-churn

Requirements:

Part I: Contextualization

In the Introductory section for Part 1 of your 4-5-page report, provide a contextualization of the dataset by doing the following:

Download the selected data set and review its description. Specify the selected dataset.

Summarize the story behind the data. Provide in-text and reference list citations of any outside sources that you consulted to contextualize the data collection efforts.

Explore the dataset. Explain the attributes of the entities.

Describe the data captured in the data set.

Summarize three observations from a cursory visual inspection of the data.

Part II: Research Questions

When data is collected, or even before collection starts, we have the purpose of the analysis in mind and plan accordingly. For an analysis to provide us with meaningful insight, we must plan it well and have a clear research question or questions in mind. The term “research” can sound scary, but it refers to a path to satisfying curiosity or resolving a problem. For Part II, which should be 2-3 pages, provide an analysis based on the background of the data sets:

Write three questions that this dataset can help answer.

Explain the importance of these questions in a business or other relevant context.

Identify the variables from the data set that are relevant to the questions.

Write a sample statement of outcome that your analysis may reveal.

Underline the words in these statements that refer to the variables identified in task prompt H.

Part III. Data Preparation and Distribution Analysis. Using an R script, please perform the following:

Identify the columns that hold the values of the variables you previously identified in the analysis of the research questions. Write R script to generate a subset of the given data. If the variable is categorical and the values are not numerical, transform the values into numerical values. For example, if the values of a column are ‘Y’ and ‘N’, use SQL to convert them to “0” and “1” respectively when generating the subset. That includes only the values for the selected variables and translate categorical values into numeric codes.

Write an R script for a query that provides insights into your research question.

Part IV. Reporting

Write a 250-word executive summary for members of the general public outlining the findings from your analysis.

Your well-written report should be 10-12 pages in length, not including the title or reference pages. Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references in support of your work, in addition to your text and assigned readings.

You will upload a zipped file that includes your 10-12-page report and all supporting files, including Word, R code and Excel files, and screenshots that support the presentation of the findings in the report.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.

discussion

Module 1: Discussion 1

No unread replies.No replies.

  • Should technology drive an organization’s strategic planning or should strategic planning drive an organizations technology adoption plan? Support your position.
  • What are some of the system development methodologies used by specific corporations?
  • What are the implications of using reengineering versus continuous improvement in a systems development effort?
  • What steps would you take to align the IS functions of an organization with its organizational mission?

Contributions should include responding to another student’s answer in a contributory manner as well as replying to another student’s comments on your original answer. For contributions to count toward the requirement, they must consist of more than a 1-2 sentence/phrase acknowledgment of agreement.  P

security measures

 

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Discussion

 A detailed statement discussing  how you obtained this CPT employment(Java Developer) as well as how this CPT employment is directly related to  major area of study(Masters in Information Technology).

Auditing

 Describe in 400 words discuss the scope of a cloud computing audit for your business.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Preview the document

Project Phase 3

 

Unit 3 Project Phase 3 Downloadable InstructionsPreview the document

Congratulations, you have set up a new network in a rural area that  will be serving a small neighborhood. Your network currently consist of 6  houses but is expected to grow to include all of the 500 houses in your  area. The only other network alternative to your system is satellite  networking which is very slow and prone to outages. You will be  providing both cable TV and internet access through your network so make  sure you are providing enough speed in your network for your customers.

You will be using the following packet tracer file:s

Cable_HomeNetwork.pkt

DSL_HomeNetwork.pkt

Tier1Network_OL.pkt

Download the project instructions. Type your class number:  10.___.0.0/16 in all of the underline ___ indicators, answer the  questions as you go through the steps and add the screenshots where  indicated in the instructions document. Save using the following file  naming convention YourFirst_LastName_Project_Phase_3.  Submit the  document with the screenshots using the upload instruction. 

Imoprtance of strategic IT planning 4

Research Paper: Blockchain

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

  • Be approximately 3 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Digital Forensics Tools and Tech – New England

 

Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved.

Use your own words and do not copy  the work of another student.

300 Words – APA format!

Discussion (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 

Compose and submit well-written paragraphs that contain a minimum of 200 words, which address the following: 

Assume you are a network administrator in your organization, describe the most cost-effective ways to secure your organization’s connection to the outside world. Briefly discuss the risk assessment components necessary to secure the organization’s asset (in this case, data).

The post should include adequate citations and references that adhere strictly to the APA format.

E-Business Strategy – Paper discussing attached Amazon Article Paper and Memo to the CEO Amazon

Subhject: E-Business Strategy

Instruction:

* Read the attached Amazon Article. 

* Discuss the eight unique features Ubiquity,Global Reach,Universal Standards,Richness,Information Density,Interactivity,Personalization/Customization,Social Technology in relvant to article.

* Discuss Amazon’s dominance and disruption mentioned in the article. 

* Also, analyze the e-Business strategies discussed in the article and the impact these strategies have on the marketplace

Important DELIVERABLES: Two items:

————————————————–

*** Item # 1. A 4-5 paper with 4 minimum references.

*** Item # 2. A short memo to the CEO of Amazon stating your opinion of Amazon’s e-Business strategies.