- Identify the most used research design in your field of study with design mostly used.
PhD Interview Questions INFORMATION TECHNOLOGY
INFORMATION TECHNOLOGY – PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECTING ON THEIR INTERESTS. IN THE EVENT THAT ANY OUTSIDE RESOURCES ARE USED, RESOURCES SHOULD BE CITED IN APA FORMAT. SUBMISSIONS SHOULD BE A MAXIMUM OF 500 WORDS OR 125 WORDS PER QUESTION/PROMPT. IT IS BEST TO RESPOND TO EACH PROMPT/QUESTION INDIVIDUALLY FOR CLARITY OF THE REVIEWER. WRITING SAMPLES SHOULD BE SUBMITTED IN MICROSOFT WORD FORMAT AND INCLUDE THE CANDIDATE’S NAME.
1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.
2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?
3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?
4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?
5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?
Python Programming (14 Hrs to complete)
Description: The university maintains course schedules at http://appsprod.tamuc.edu/Schedule/Schedule.aspx for different semesters (spring, fall, winter, etc ). You will develop a Python program to dynamically complete certain tasks, such as list, find, sort, and save, in course listings from schedule portal. You will mainly use “request” and “BeautifulSoup” libraries (or similar, see exercise 12.1). The program will operate at different level: Semester and Department. Your program will be a menu based application. Assume that you project file is myproject.py. Once you run, it will show last 5 semester (fall, spring, summer only, (not winter, may mini))
> python myproject.py
Choose a semester: 1) Sprint 2021 2)Fall 2020 3)Summer II 4)Summer I 5)Spring 2020
Selection: 2
Here, your program will parse the data from website and show only last (most recent) 5 semesters. User will make selection, then, you will show departments for the selected semester (Fall 2020). Note that selected semester is visible before a “>” sign.
Fall 2020> Select a department:
1) Undeclared
2) Accounting and Finance
3) Art
4) Ag Science & Natural Resources
…
…
30) Social Work
31) Theatre
Q)Go back
Selection: 3
Fall 2020> Art > Select an option:
1) List courses by instruction name
2) List courses by capacity
3) List courses by enrollment size
4) List courses by course prefix
5) Save courses in a csv file
6) Search course by instruction name
7) Search courses by course prefix
Q)Go back
Selection: ??
Here, your program will parse the data from website and show all available department then list of tasks. Q (go back) option will take user to previous level.
Course listing output should show the following fields. For instance for course listing for “Fall 2020> Computer Science & Info Sys> List the course by prefix ” should show
PrefixIDSecNameInstructorHoursSeatsEnroll.COSC130101WIntro to CompuLee, Kwang33510COSC143601EIntro to Comp Sci & ProgBrown, Thomas44036COSC143601LIntro to Comp Sci & ProgBrown, Thomas4036COSC143601WIntro to Comp Sci & ProgHu, Kaoning44543COSC143602EIntro to Comp Sci & ProgHu, Kaoning43532
as first 5 rows.
You will follow above headers and order (prefix (col. width 6), ID (5), Sec (5) ,Name (25), Inst (20), Hours (5), Seats (5), Enroll. (7) ) for other listing selections too. Data cell should be aligned with column header and left justified. A course name should not have a word more than 5 chars. For instance Algorithms should be abbreviated as “Algor”. The length of course name will not exceed 25 chars. In option 5, the above format should be used to save a listing to a file as .csv format. User will be able to provide a filename for csv file.
For this program you need to develop at least one class (chapter 10) with (possible) many methods.
SyncSession Assignment
Write a 4-5 page paper (deliverable length does not include the title and reference pages)
- What key characteristics distinguish a professional from other kinds of workers, and is an IT worker considered a professional?
- What factors are transforming the professional services industry?
- What relationships must an IT worker manage, and what key ethical issues can arise in each?
- Be prepared to present this assignment at SyncSession 1.
Sync Sessions are held four times per term. For the exact dates and times please check the course schedule under the Course Overview area. To connect to a Sync Session, please click on the Sync Session Classroom area and select the appropriate session.
Due: Assignment is due Wednesday of the second week in the module.
Need Response 2 to below discussion
Please read the below discussion post and provide response in 75 to 100 words for each discussion post
Post#1
DAC is the way people can control their own content. This may sound obvious, but DAC, for example, is really useful for online users who have access to their information. It enables people to quickly and automatically remove or deny privileges. Reactive access control, More display and file sharing Laissez-faire provide users with good examples of DAC science.
A framework that uses DAC allows the resource owner to determine which subjects can access particular resources. This model is referred to as discretionary as access control is focused on the owner’s discretion. There is a different word, which is mostly used for modeling. This is the List of Access Control. A file ACL will list all licensed users and/or groups who have access and unique access to the file.
Although all in the DAC world seems fine, this model has some problems. While this model has the best versatility of any model, it is its weakest point. For instance, when a user opens a virus-infected attachment, code can be installed on the background without the user being conscious. In general, this code inherits all of the user’s rights and permissions and can perform all user-related operations on the device.
A user is only permitted in the system by placing them on the system-associated Access Control List ( ACL). You need to realize that an entry in the ACL of a resource is known as the ACE. For the test, research this. These permissions are activated when a user or group owns an object within the DAC model, and when the user group og allows other users and groups within the same structure. The DAC model is focused on ownership of resources, which is essential for the review.
RBAC is a form of access control that, as you said, is capable of separating responsibilities in a system that fulfills multiple roles. Obviously in companies (such as Brewer, Nash or MCS), this is true but can also be used in a single operating system to enforce the less privileged principle. By letting users choose the positions they need for a particular task, RBAC is optimized for separating tasks.
If a user is allocated a task by an administrator that includes some predetermined system rights and privileges, the player will be able to access only certain system resources and perform certain functions that have to be allocated under the rules. Please note that RBACK is also known as the Non Discretionary Access Control because it is necessary for the review. The user functions are handled centrally by the system administrator.
If your Customer Service Representative is calling the cable provider to collect your pay-per-view, I would say I am sorry that you have been sent to Billing so that you can pay your expired bill they know that you have an outstanding bill. You pay your bill and inform me that I will get my service when you are moved to the bill. I see you want this service but that isn’t my role. They say let me pass you back.
MAC itself is vague, for many systems there are various ways of implementing it. You will also use a mixture of multiple paradigms in operation. For example, most DACs are used by UNIX and DAC privileges are bypassed by the root account. In an organization you can allow some DAC for employees to exchange information about your corporate file system in addition to separating the various divisions and teams with the MAC / RBAC.
A construction of control is one of the main elements that only occurs in the MAC. No amount of approval will get you to see a Top Secret Document if you have secret level clearance. It’s unusual that you need this building in commercial organizations. However, the second point, which is special to MAC, is that if you can not do an operation, you can not do it in particular.
Post#2
In the technological organizations, it is the security which most of the organizations are looking to perform their operations. There are opportunities within the an organization which sometimes slip away due to security concerns and the threat possibilities therefore a robust framework is required to mitigate all the threats. An information a system which can help in the mitigation of threats and keeps check on confidential information of the organization. This can be ensured by the three types of models of security in cloud computing technology. These systems are well implemented and built to perform access control modes. These are MAC, DAC and RBAC. “To implement get to control, it has been said that all the accompanying customary models can be utilized as a part of distributed computing: required access control (MAC), optional access control (DAC) (for instance, get to control records or ACLs), and nondiscretionary get to control (for instance, RBAC or assignment based access control” (Niranjan, 2018).
MAC is the Mandatory Access Control which uses a combination of different paradigms to implement security in many systems. MAC is a vague access control model which allows some DAC for coworkers to share data and manage the corporate file systems in the organization. Security labels are assigned to resource objects within the system which contain information based on two pieces and classify the confidential information. User attempts to access resource under MAC is assessed with the security labels.
DAC is the discretionary access control which allows users to control and access their own information and data. This type of access control systems is used for the desktop operating systems. DAC is assigned a Access control list which contains information about the groups and users who has permitted the access and the level of access given in the system to the user of the group. There are control access systems which are utilized within the system to provide security to the organization. “The organizations are adapting to cloud networks at a rapid pace due to the benefits like cost-effectiveness, scalability, reliability and flexibility” (Indu, 2018).
RBAC is the role based access control which is based on the mechanism which is the job oriented function and places as the user within the organization. It is the computer system which belongs to the system access control and performs all the necessary actions. The RBAC access model is also known as the non discretionary access control. RBAC introduces the absurdness within the system which allows the user to set a number of rules which is defined within the system administrator. It is the system and the situation which is based on the network connection and also permits the user to a particular time frame. “As the number of roles increase, the complexity is increased. To get rid of limitations of RBAC, the attribute base access control model has been introduced which has more flexibility” (Soni, 2019).
Analysis of Algorithms Exam
Computer Science expert needed!
See the Two screenshots of some of the Questions below!
It’s 19 questions in total.
Part 5 – Monitoring and Team Roles
Assignment Content
- Based on your previous work in the previous weeks, create a 700-word entry in your Database Management Plan.
Consider the previous week’s creation of standards for database administration and explain the following in your entry:
- How performance will be monitored and tuned
- How backups will happen
- How data quality will be monitored and improved
- How information should be secured, etc.
- How all of the standards are important to the business from a user perspective
- Also, include the following from this week’s learning:
- Explanations of how individual team roles will need to contribute to managing historical data via data warehouses and data marts
- Recommendations of techniques for designing an effective data warehouse
- Submit your assignment.
Discussion: Blockchain
How do you feel blockchain will change the global economy or will it? Explain your answer.
Final_Assignment
1. In CLIQUE, the threshold used to find cluster density remains constant, even as the number of dimensions increases. This is a potential problem since density drops as dimensionality increases; i.e., to find clusters in higher dimensions the threshold has to be set at a level that may well result in the merging of low-dimensional clusters. Comment on whether you feel this is truly a problem and, if so, how you might modify CLIQUE to address this problem.
2. Name at least one situation in which you would not want to use clustering based on SNN similarity or density.
3. Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of connection (interconnectedness) of clusters.
4. We take a sample of adults and measure their heights. If we record the gender of each person, we can calculate the average height and the variance of the height, separately, for men and women. Suppose, however, that this information was not recorded. Would it be possible to still obtain this information? Explain.
5. Explain the difference between likelihood and probability.
6. Traditional K-means has a number of limitations, such as sensitivity to outliers and difficulty in handling clusters of different sizes and densities, or with non-globular shapes. Comment on the ability of fuzzy c-means to handle these situations.
7. Clusters of documents can be summarized by finding the top terms (words) for the documents in the cluster, e.g., by taking the most frequent k terms, where k is a constant, say 10, or by taking all terms that occur more frequently than a specified threshold. Suppose that K-means is used to find clusters of both documents and words for a document data set.
(a) How might a set of term clusters defined by the top terms in a document cluster differ from the word clusters found by clustering the terms with K-means?
(b) How could term clustering be used to define clusters of documents?
8. Suppose we find K clusters using Ward’s method, bisecting K-means, and ordinary K-means. Which of these solutions represents a local or global minimum? Explain.
9. You are given a data set with 100 records and are asked to cluster the data. You use K-means to cluster the data, but for all values of K, 1 ≤ K ≤ 100, the K-means algorithm returns only one non-empty cluster. You then apply an incremental version of K-means, but obtain exactly the same result. How is this possible? How would single link or DBSCAN handle such data?
Final Project
Overview:
In the meeting with your executives, your CEO announced that you would need to
prepare a PowerPoint presentation of your department achievements for the last quarter
and present it in front of the hospital’s board of trustees who will be visiting your hospital
by the end of the month.
Instructions:
Based on that information, your IT Director asked you to prepare a 12-15-page
PowerPoint presentation which will take a fifteen-minute time slot where you discuss the
following:
• As you have opted for Windows-based computers, what are the significant
differences between a Mac and a Windows-based computer?
• What are the main differences between the leading operating systems: Windows,
Mac OS, and Linux?
• What are the measures that you are taking to keep computers safe and to avoid
health hazards from computer use?
• Is the hospital safe and immune from online annoyances such as spam and
adware? How can you further secure your system from malware?
• The advantages of your recent implementation of VoIP?
• Describe the improvements you have implemented in the hospital’s customer
relationship management (CRM) and how are you managing your relationship
with your vendors.
• Discuss whether the adoption of a medical expert system could be beneficial to
the doctors at your Hospital.
• Describe how social media can be effectively used as part of the hospital’s web
strategies and improve its position in the market?
Requirements:
• This assignment is a PowerPoint presentation consisting of 12-15 slides, using
APA formatting and citations.
• Include four references.
• Record voice narration and include closed captioning or script saved to the notes
in PowerPoint.
o For instructions to add narration to a slideshow: https://support.office.com/enus/article/record-a-slide-show-with-narration-and-slide-timings-0b9502c6-5f6c-40aeb1e7-e47d8741161c#OfficeVersion=Office_365