Final Reflection Assignment

The survey assignment. 

Nearing the end of the semester, it is now time for students to reflect on the knowledge obtained in their course(s) and determine the effectiveness of incorporating real-world experience into our academic curriculum. Please complete the survey/reflection to the best of your ability.  

Students should;

    Be able to apply knowledge and theory gained in their courses of study within current workplace or in their future employment.

    Be able demonstrate the application of theory to workplace in written form.

    Be able to identify the benefits of incorporating real-world experience into an academic program.

My Subjects are : 1) Business Intelligence

                             2) Analyzing & Visualizing Data

Note: This assignment should be atleast 500 words and in APA format including references

Web Development Web Accessibility one page paragraph

 You should be REPORTING EVIDENCE and EXAMPLES from what you read. 

Find, Read, and Share – THREE related sources of information

Report – Three things about the topic that you want to remember forever

  1. Identify the topic for this week. The title of this discussion board thread lists topics as well as you should reflect on what was covered during class.
  2. Find three high-quality sources of related information on the Internet. 
  3. Read your chosen high-quality sources of related information.
  4. state your three sources of information.
  5. DESCRIBE each of the three sources of information within a few sentences providing EXAMPLES.
  6. SUMMARIZE with three things about the topic that you want to remember forever.

BSWA Week 8

 In 300 words, 

You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

wk3dis_531

 Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics. 

Data Mining

Write one page on how data mining helps to gain competitive advantage for businesses. Include at least 2 references and in-text citation.

Research paper for inferential statistics in decision making

Regression test for statistics:

Regression test (2 pages)

Half page introduction(article) 

Image should be like statistical graph

Analysis.

Results of the test

NOTE: – 1.     APA format and should have references to each page 

               2.     Total Document should contain minimum 2 pages

Interm1

  For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available. You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:Week 3 – Prepare a two-page paper (double-spaced) that describes the device or system you will investigate and the intended tool you plan to use to conduct your forensics investigation. The interim paper should be in the form of an Executive Summary. Be sure to provide references in APA format. 

risk management

Bellow URLS Will discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management.

Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. 

ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.

URL : https://s3.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/7209489?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Week9-Interdependent%2520Strategic%2520Security%2520Risk%2520Management%2520With%2520Bounded%2520Rationality%2520in%2520the%2520Internet%2520of%2520Things.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20201020T180000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAYDKQORRYTKBSBE4S%2F20201020%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=e26ec3baa22db08b5f2bb413601387c1f340d6e88d07bdccf91e126e4724f5e5

URL : https://web.a.ebscohost.com/ehost/results?vid=0&sid=34cd95fb-0bc3-4ed4-a199-d7450c412c71%40sdc-v-sessmgr02&bquery=Total%2BInformation%2BRisk%2BManagement%253a%2BMaximizing%2Bthe%2BValue%2Bof%2BData%2Band%2BInformation%2BAssets&bdata=JkF1dGhUeXBlPXNoaWImZGI9ZTAwMHhuYSZ0eXBlPTAmc2VhcmNoTW9kZT1BbmQmc2l0ZT1laG9zdC1saXZl