Part 5 – Monitoring and Team Roles

 

Assignment Content

  1. Based on your previous work in the previous weeks, create a 700-word entry in your Database Management Plan.

    Consider the previous week’s creation of standards for database administration and explain the following in your entry:  

    • How performance will be monitored and tuned 
    • How backups will happen 
    • How data quality will be monitored and improved 
    • How information should be secured, etc.  
    • How all of the standards are important to the business from a user perspective
    • Also, include the following from this week’s learning: 
    • Explanations of how individual team roles will need to contribute to managing historical data via data warehouses and data marts
    • Recommendations of techniques for designing an effective data warehouse
    • Submit your assignment.

Final_Assignment

1. In CLIQUE, the threshold used to find cluster density remains constant, even as the number of dimensions increases. This is a potential problem since density drops as dimensionality increases; i.e., to find clusters in higher dimensions the threshold has to be set at a level that may well result in the merging of low-dimensional clusters. Comment on whether you feel this is truly a problem and, if so, how you might modify CLIQUE to address this problem.

2. Name at least one situation in which you would not want to use clustering based on SNN similarity or density.

3. Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of connection (interconnectedness) of clusters.

4. We take a sample of adults and measure their heights. If we record the gender of each person, we can calculate the average height and the variance of the height, separately, for men and women. Suppose, however, that this information was not recorded. Would it be possible to still obtain this information? Explain.

5. Explain the difference between likelihood and probability.

6. Traditional K-means has a number of limitations, such as sensitivity to outliers and difficulty in handling clusters of different sizes and densities, or with non-globular shapes. Comment on the ability of fuzzy c-means to handle these situations.

7. Clusters of documents can be summarized by finding the top terms (words) for the documents in the cluster, e.g., by taking the most frequent k terms, where k is a constant, say 10, or by taking all terms that occur more frequently than a specified threshold. Suppose that K-means is used to find clusters of both documents and words for a document data set.

(a) How might a set of term clusters defined by the top terms in a document cluster differ from the word clusters found by clustering the terms with K-means?

(b) How could term clustering be used to define clusters of documents?

8. Suppose we find K clusters using Ward’s method, bisecting K-means, and ordinary K-means. Which of these solutions represents a local or global minimum? Explain.

9. You are given a data set with 100 records and are asked to cluster the data. You use K-means to cluster the data, but for all values of K, 1 ≤ K ≤ 100, the K-means algorithm returns only one non-empty cluster. You then apply an incremental version of K-means, but obtain exactly the same result. How is this possible? How would single link or DBSCAN handle such data?

Final Project

Overview:

In the meeting with your executives, your CEO announced that you would need to

prepare a PowerPoint presentation of your department achievements for the last quarter

and present it in front of the hospital’s board of trustees who will be visiting your hospital

by the end of the month.

Instructions:

Based on that information, your IT Director asked you to prepare a 12-15-page

PowerPoint presentation which will take a fifteen-minute time slot where you discuss the

following:

• As you have opted for Windows-based computers, what are the significant

differences between a Mac and a Windows-based computer?

• What are the main differences between the leading operating systems: Windows,

Mac OS, and Linux?

• What are the measures that you are taking to keep computers safe and to avoid

health hazards from computer use?

• Is the hospital safe and immune from online annoyances such as spam and

adware? How can you further secure your system from malware?

• The advantages of your recent implementation of VoIP?

• Describe the improvements you have implemented in the hospital’s customer

relationship management (CRM) and how are you managing your relationship

with your vendors.

• Discuss whether the adoption of a medical expert system could be beneficial to

the doctors at your Hospital.

• Describe how social media can be effectively used as part of the hospital’s web

strategies and improve its position in the market?

Requirements:

• This assignment is a PowerPoint presentation consisting of 12-15 slides, using

APA formatting and citations.

• Include four references.

• Record voice narration and include closed captioning or script saved to the notes

in PowerPoint.

o For instructions to add narration to a slideshow: https://support.office.com/enus/article/record-a-slide-show-with-narration-and-slide-timings-0b9502c6-5f6c-40aeb1e7-e47d8741161c#OfficeVersion=Office_365

CAR202- Characteristics of an expert in my field

Instructions

Each field or industry will have its own aspects and skills that will define an expert in the field.  For this assignment, you should: 

  • Find a source (journal article, book, web blog, etc.) that addresses the specific skills and characteristics needed to be an expert and successful in that field.  Briefly (one paragraph) identify the main findings from this source, specifically the characteristics needed. 
  • Identify the experience and expertise you have that allow you to meet each suggested characteristic needed.  Frame your response as you would in an interview if you were seeking to frame yourself as an expert. 

Instructions: 

  • Your assignment should be approximately500 words in length (typically, two double-spaced pages), not counting cover page, reference list page, appendices, figures, or tables.  
  • Your assignment should include a title page and a reference list page, and be completed in Times New Roman 12-point font, double-spaced, with appropriate header, page numbers, one-inch margins, and meet all other requirements of APA Stylebook.  
  • Please use at least one appropriate scholarly reference for the basis of your paper, formatted in the most current APA format.  
  • Please refer to the rubric associated with this assignment for detailed guidance about expectations and grading.   
  • Please submit this assignment through in D2L by 11:59PM Central Time on Sunday. 

Emerging threats_4.2

Discussion: 

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

At least two scholarly sources should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.