WK7 20210617

NOTE: **** post answers in separate documents for each Question

      **** Please follow the instructions to the point and pick relavant topics according to the subject

      **** Follow APA7 format

Subject: Introduction to Data mining 

Question 1: Write a 300+ word essay (APA format & latest scholarly journal article references 2016 on words)

There are many different approaches in Data Mining. Explain and provide an example of the “Statistical Procedure Based Approach” in Data Mining?

Question 2: Assignment 3+ pages (APA format & 2 latest scholarly journal article references 2016 on words)

ANSWER EACH QUESTION WITH 300+ WORDS WITH PROPER REFERENCES IF NEEDED

Classification: Alternative Techniques Assignment

1) Define and provide an example of Rule Coverage and Accuracy.

2) What are the Characteristics of Rule-Based Classifier?

3) What do the steps to building a rule set consist in a Direct Method: RIPPER?

4) Describe what is used to separate data in Support Vector Machines.

5) List and describe the two classifiers of Ensemble Methods.

Subject: Database security

Question 3: Write a 500+ word essay (APA format & latest scholarly journal article references 2016 on words)

Write an essay of at least 500 words:

how a blockchain implementation would improve data security in a military, education, or other context. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences.

Include 3 quotes with quotation marks and cited in-line and in a list of references. 

Include an interesting meaninful title.

Include at least one quote from each of 3 different articles.

Subject: Building secure web applications

Question 4: Write a 300+ word essay (APA format & latest scholarly journal article references 2016 on words)

What is the Dark Web? How is it accessed? How is it used by criminals? How can it be used in a positive way? 

How can be used by law enforcement and intelligence services? How can be used by private individuals?

IT207 week 7

Please discuss/answer the following questions:

  1. Compare the output redirection operators (>, >>) with the pipe (|) operator. How do both broaden your command processing capabilities?
  2. Please compare and contrast Linus Vim and Gedit editors.

For APA format, include a title page. Include an abstract statement on page two. Add the body on pages 3 & 4. Put your references on page 5. Use more than one reference for your information. Use Times New Roman 12 point font, double-spaced through the entire document. Indent paragraphs in the body. The abstract is not indented.

discussion

 

Discuss the role played by a scheduler in ensuring the serializability of transactions.

Discussion Guidelines
You must provide an original response of 300+ words of your own 

 Printed Textbook: Database Systems: Design, Implementation, and Management, 13th
edition, Coronel and Morris.  

GDSS Discussion

 Explain how GDSS can increase some benefits of collaboration and decision-making in groups and eliminate or reduce some losses. 

Please respond in 250 -300 words in APA format and include the references.

week-13

Our assignment for the week is a minimum 450-word initial discussion board post and a minimum of 2 100-word minimum responses.

This week navigate to the Visualizing Data ( https://www.visualisingdata.com/ ) website and click on resources and then click on the colour tab.  This site is managed by the author of the textbook.  Pick one option and note it by the name in the website.  For example “ HTML Color Picker”.  Then note what it is, when you would use it.  Next, find a website that uses the method or should use the method.  Explain why.

In response to peers, continue the conversation by agreeing or disagreeing with the color method selected. Explain your thoughts.

Your work must be entirely original, checked with Grammarly, and make use of proper grammatical conventions.

Assignment help

Answer the following questions from  Chapter 5 in the text with a paragraph that contains at least five  sentences. Include the question and number your answers accordingly. 

1. With all the stories about millions  and millions of bytes of personal data having been exposed, why is their  still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment  for Parkinson’s disease. Medical devices such as these are now becoming  accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Plagiarism

Research at least two recent articles concerning plagiarism incidents in the news.  The article should be no more than two years old.  Use the issue presented in the article to continue the discussion using the guidelines below.

Task:

Identify and discuss the plagiarized issue within the article, then address the following questions in your main discussion post:

  1. In what way did the plagiarized work impact others? 
  2. What was the penalty? 
  3. Present your own advice on how to prevent future plagiarism 

The paper must be supported with at least two properly cited APA source.

Assignment & NO PLAGIARISM

Assignment 1: 250 words excluding references – Need it by 03/24

How is the implementation of network security similar and different between on-perm and cloud environments? Give some examples.
How is the management of network security similar and different between on-perm and cloud environments? Give some examples.

Assignment 2: Need it by 03/25
Discuss the best practices for implementing an access control system – 2 pages (double spaced) excluding references