Enterprise Data Management and Administration

 Read “Can We Trust Big Data?” (see attached file) 

Please use this strategy when you analyze a case:

  1. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.
  5. Conclusion (every paper should end with a strong conclusion or summary)

Social Engineering

Course: Computer Security 

Expected is a 10 page report (This is at least 10 pages of content, not including the Title Page, or Bibliography, Double spaced, 12pt font).  Images/Screenshots are encouraged, however, they should not compose of the majority of the document.  Also, it is expected that the work be primarily in your own wording.  Citation is fine for supporting your work, but the vast majority of the work should be in your own wording, not quoted.   

Discussion paragraphs on Topic : Bitcoin Pyramid Schemes Wreak Havoc on Brazil's 'New Egypt'

 write your complete draft of your discussion section:

  • Activity: Discussion, Para. 1
  • Activity: Discussion, Para. 2
  • Activity: Discussion, Para. 3

references 

Zhang, Y., Yu, W., Li, Z., Raza, S., & Cao, H. (2021). Detecting Ethereum Ponzi schemes based on improved LightGBM algorithm. IEEE Transactions on Computational Social Systems, 9(2), 624–637. https://doi.org/10.1109/tcss.2021.3088145

Al-Nsour, E., Weshah, S., & Dahiyat, A. (2021). Cloud accounting information systems: Threats and advantages. Accounting, 7(4), 875-882. https://doi.org/10.5267/j.ac.2021.1.021

Boylan, D. H., & Hull, J. E. (2022). Have Accounting Information Systems significantly helped in detecting fraudulent activities in accounting? The Journal of Applied Business and Economics, 24(3), 45-56. https://doi.org/10.33423/jabe.v24i3.5191

Abstract of a Quantitative Research Article and Quantitative Data Collection Instrument

Abstract of a Quantitative Research Article

 Overview: The term “abstract” is a homophone which can mean one of two scholarly writing activities. One, is the abstract that you will write to introduce your dissertation. The other meaning is a shortened writing assignment whereby you write a condensed summary of an academic journal.  For this week, we will focus on writing a scholarly abstract of a quantitative journal. More information about writing an abstract can be found via the web resource “Writing Scholarly Abstracts.”Directions: View the rubric and examples to make sure you understand the expectations of this assignment.  Create a 1-2 page (more is fine) single-spaced Analysis of Research abstract published quantitative scholarly article related to your mock dissertation topic/research question from week 1. Additionally, this assignment functions just like assignment 2.1 only it reviews a quantitative article instead of a qualitative one.Brevity and being concise are important as this analysis is intended to be a brief summation of the research.Each abstract must therefore consist of the following in this order:

  1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.
  2. Author Qualifications – name and qualification of each author conducting the research
  3. Research Concern – one paragraph summary of the reason for the overall research topic
  4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research
  5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)
  6. Research Methodology – description of the population, sample, and data gathering techniques used in the research
  7. Instrumentation – description of the tools used to gather data (surveys, tests, interviews, etc.)
  8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

Quantitative Data Collection Instrument

 Overview: Using the topic and research question you developed in week 1, you will design a quantitative instrument that could potentially answer your topic/research question if it were to be applied to a quantitative study. Keep in mind, this may take some stretching if you wrote your question leaning quantitatively. The purpose here is not to box you in but to ensure that you have a solid understanding of both methodologies. This assignment functions similar to 3.1 but in a quantitative format. Finally, view the rubric and examples to make sure you understand the expectations of this assignment.Directions:You will develop a word document to include:

  1. Your research question in the form of a quantitative question (if it was not already).
  2. An instrument or protocol (survey, questionaire, archival data, etc) that could be used to answer the quantitative version of your research question. 

*Special note for those using archival data, you will describe the process of data retrieval for your archival data. See examples to help.

  1. A one paragraph description/justification of how your chosen instrument/protocol is the best choice for answering the quantitative version of your research question.

Assignment

 
The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing. Data analytics in massive manufacturing data can extract huge business values while it can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data. 

summary of civil rights case

 Go  to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.
Using WORD, in your OWN WORDS, write an ORIGINAL brief summary of 300 words or more  :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

Math 3300

  

Math 3300 Programming Assignment 4 Instructions:. Your program should then sort the 4 numbers from smallest to largest and then display the sorted list. Your program should also be able to handle an incorrect input (like if the user enters a negative number for income, or an incorrect choice for filing status). This program may seem daunting, but it is much easier if you realize that the calculations performed for each filing status (column in table above) would be the same for each tax bracket (each filing status has 6 tax brackets (the rows in the table above)), and only the ranges of incomes for the tax brackets change between the different filing statuses. A switch statement might be useful to set the income levels based on choice of filing status, before the calculations are completed. Write a program that will ask the user to select how he or she will file (Single, Married Filing Jointly, Married Filing Separately, or Head of Household), and asks for the user’s taxable income. Your program should then display the user’s tax bracket (10%, 15%, 25%, 28%, 33%, 35%), the user’s federal income tax, and the actual percentage of the user’s income has been paid for taxes. You will have to use a series of if, if-else, or switch statements. Your program should also be able to handle an incorrect input (like if the user enters a negative number for income, or an incorrect choice for filing status). 

Discussion 8- Exe Proj

Assigned Readings:Chapter 8. Cost Estimation and Budgeting Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Imagine you are developing a software package for your company’s intranet. Give examples of the various types of costs (labor, materials, equipment and facilities, subcontractors, etc.) and how they would apply to your project.
  2. Think of an example of parametric estimating in your personal experience, such as the use of a cost multiplier based on a similar, past cost.  Did parametric estimating work or not?  Discuss the reasons why.
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text-

Title: Project Management 

ISBN: 9780134730332 

Authors: Pinto 

Publisher: Pearson 

Edition: 5TH 19

Data and System Security

Read chapter 13 of your textbook (lecture slides under week 5), and review online library and reputable      articles/journals/online resources and write 3/4 page paper and discuss:

Q). How do you design a secure network. Discuss latest technologies to keep your network secure.