Computer Science expert needed!
See the Two screenshots of some of the Questions below!
It’s 19 questions in total.
Computer Science expert needed!
See the Two screenshots of some of the Questions below!
It’s 19 questions in total.
Consider the previous week’s creation of standards for database administration and explain the following in your entry:
How do you feel blockchain will change the global economy or will it? Explain your answer.
1. In CLIQUE, the threshold used to find cluster density remains constant, even as the number of dimensions increases. This is a potential problem since density drops as dimensionality increases; i.e., to find clusters in higher dimensions the threshold has to be set at a level that may well result in the merging of low-dimensional clusters. Comment on whether you feel this is truly a problem and, if so, how you might modify CLIQUE to address this problem.
2. Name at least one situation in which you would not want to use clustering based on SNN similarity or density.
3. Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of connection (interconnectedness) of clusters.
4. We take a sample of adults and measure their heights. If we record the gender of each person, we can calculate the average height and the variance of the height, separately, for men and women. Suppose, however, that this information was not recorded. Would it be possible to still obtain this information? Explain.
5. Explain the difference between likelihood and probability.
6. Traditional K-means has a number of limitations, such as sensitivity to outliers and difficulty in handling clusters of different sizes and densities, or with non-globular shapes. Comment on the ability of fuzzy c-means to handle these situations.
7. Clusters of documents can be summarized by finding the top terms (words) for the documents in the cluster, e.g., by taking the most frequent k terms, where k is a constant, say 10, or by taking all terms that occur more frequently than a specified threshold. Suppose that K-means is used to find clusters of both documents and words for a document data set.
(a) How might a set of term clusters defined by the top terms in a document cluster differ from the word clusters found by clustering the terms with K-means?
(b) How could term clustering be used to define clusters of documents?
8. Suppose we find K clusters using Ward’s method, bisecting K-means, and ordinary K-means. Which of these solutions represents a local or global minimum? Explain.
9. You are given a data set with 100 records and are asked to cluster the data. You use K-means to cluster the data, but for all values of K, 1 ≤ K ≤ 100, the K-means algorithm returns only one non-empty cluster. You then apply an incremental version of K-means, but obtain exactly the same result. How is this possible? How would single link or DBSCAN handle such data?
Overview:
In the meeting with your executives, your CEO announced that you would need to
prepare a PowerPoint presentation of your department achievements for the last quarter
and present it in front of the hospital’s board of trustees who will be visiting your hospital
by the end of the month.
Instructions:
Based on that information, your IT Director asked you to prepare a 12-15-page
PowerPoint presentation which will take a fifteen-minute time slot where you discuss the
following:
• As you have opted for Windows-based computers, what are the significant
differences between a Mac and a Windows-based computer?
• What are the main differences between the leading operating systems: Windows,
Mac OS, and Linux?
• What are the measures that you are taking to keep computers safe and to avoid
health hazards from computer use?
• Is the hospital safe and immune from online annoyances such as spam and
adware? How can you further secure your system from malware?
• The advantages of your recent implementation of VoIP?
• Describe the improvements you have implemented in the hospital’s customer
relationship management (CRM) and how are you managing your relationship
with your vendors.
• Discuss whether the adoption of a medical expert system could be beneficial to
the doctors at your Hospital.
• Describe how social media can be effectively used as part of the hospital’s web
strategies and improve its position in the market?
Requirements:
• This assignment is a PowerPoint presentation consisting of 12-15 slides, using
APA formatting and citations.
• Include four references.
• Record voice narration and include closed captioning or script saved to the notes
in PowerPoint.
o For instructions to add narration to a slideshow: https://support.office.com/enus/article/record-a-slide-show-with-narration-and-slide-timings-0b9502c6-5f6c-40aeb1e7-e47d8741161c#OfficeVersion=Office_365
Discuss Howell and Mendez’s three perspectives on followership. Note how these behaviors influence work productivity.
What is the big five personality model?
What is the Myers-Briggs test? How is it similar to the Big five model? How is it different than the Big five model?
Each field or industry will have its own aspects and skills that will define an expert in the field. For this assignment, you should:
Instructions:
Business Intelligence question
C++ coding assignment
Please see the attachments for the instruction of this assignment
I need an A work
Thank you
Discussion:
Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.
When or where would you think it would be necessary to implement security measures for both?
At least two scholarly sources should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.