Final project..

 

For this project, select an organization that has leveraged Data Mining technologies in an attempt to improve profitability or to give them a competitive advantage.

Research the organization to understand the challenges that they faced and how they intended to use Data Mining to overcome their challenges. The paper should include the following sections each called out with a header.

• Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.

• Challenges: Discuss the challenges that limited their profitability and/or competitiveness and how they planned to leverage Data Mining to overcome their challenges.

• Solution: Describe the organization’s Data Mining implementation and the benefits they realized from the implementation. What was the result of implementing Data Mining? Did they meet their objectives for fall short?

• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

The paper must adhere to APA guidelines including Title and Reference pages.There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due.

Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.

The body of the paper should be 3  pages in length.

The Title and Reference pages do not count towards the page count requirements.

UML diagram

Plot a      Package Diagram for the Online Student Registration System. Use the      Package Diagram class-based syntax.

Social Media

 

This week, you watched the Social Media Revolution 2019 #Socialnomics and read The Beginner’s Guide to Social Media.  https://moz.com/beginners-guide-to-social-media

Discussion:
As you review the multiple statistics that display in Social Media Revolution 2019 #Socialnomics, and reflecting on what you read about social media, assess the impact of social media in your life.
Question #1: 
What role does Social Media play in your life? Are you aware of the social media policies of the organizations where you work, attend school, or volunteer? Have you used social media to resolve problems, participate in a cause you are passionate about, or to learn about UMGC? How does Social Media impact your personal and professional communications?

 

Topic 2: Digital Humanitarianism

This week you also watched Innovations in Humanitarian Relief (PBS online video) https://www.pbs.org/video/innovation-humanitarian-relief-e6xivw/

Discussion:
In the wake of natural disasters and acts of terror, several tech companies are making an effort to improve traditional responses effort in humanitarian relief.

Question #1: 
Do you think that humanitarian aid workers constantly need new ways of thinking, new products and new processes to better respond to disasters? Why or why not?

 

Topic 3: Cyber Psychology

This week you read: Cyber psychology and cyber behavior of adolescents-the need of the contemporary era  https://www.sciencedirect.com/science/article/pii/S1877050917326704

Discussion:

Cyber psychology evaluates how we interact with others using technology, how we can develop technology to best fit our requirements, and how our behavior and psychological states are influenced by technology. Cyber psychology applies psychological theory to explain how individuals interact in cyberspace and how these interactions might affect our offline lives. It offers a new way to define the self and society.

Question #1: 

How does technology impact psychology? List at least three advantages and at least three disadvantages.

Question #2: 

Do you present yourself differently in different online spaces? In what ways are you different and in what ways are you consistent? Why do you think this is?

OPERATING SYSTEM

 

  • Explain the purpose of an operating system for a personal computer.
  • Give a brief description of the hardware components of a computer that the OS interfaces with. Motherboard, CPU, RAM, hard drive, sound controller, power supply, input and output devices, etc.

Discussion: Remote Access Method Evaluation

Learning Objectives and Outcomes

  • Explore and assess different remote access solutions.

Assignment Requirements

Discuss with your peers which of the two remote access solutions, virtual private networks (VPNs) or hypertext transport protocol secure (HTTPS), you will rate as the best. You need to make a choice between the two remote access solutions based on the following features:

  • Identification, authentication, and authorization
  • Cost, scalability, reliability, and interoperability

NOTE: PLEASE ADD ATLEAST 3 REFERENCES. NEED DISCUSSION APA FORMAT. 

1 page in APA 6th Format Operational Excellence

1 page in APA 6th Format, no Plagiarism with at least one scholarly (peer-reviewed) resource.

Reflect on a below key concepts :

  1. Discuss what power in the context of leadership is and how it relates to bullying within organizations.  Also note how this impacts productivity.
  2. Discuss what organizational culture is and how it impacts work productivity.  Also, note how organizational culture impacts the success of innovation implementation.
  3. How does culture impact leadership? Can culture be seen as a constraint on leadership?

Security Admin security Plan

1) Describe how security administration works to plan, design, implement and monitor an organization’s security plan. Submit by Friday of Week 4 11:59 PM EST in order to receive timely input.

2) Describe five effective change management processes organizations can execute as well as the advantages and disadvantages of change management when it comes to the IT department.

Executive Program Practical Connection Assignment

It is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own careers.

Assignment:

Provide a reflection of at least 500 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of this course   Cryptography have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories, and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Research Paper & Discussion

1. •• Research paper **

 Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

What is penetration testing

Testing Stages

Testing Methods

Testing, web applications and firewalls

Your paper should meet the following requirements:

Be approximately four to six pages in length, not including the required cover page and reference page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

2. ** Discussion post **

 There is much discussion regarding Data Analytics and Data Mining.  Sometimes these terms are used synonymously but there is a difference.  What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used. Also explain how you may use data analytics and data mining in a future career. Lastly, be sure to utilize at least one scholarly source from Google Scholar. 

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

Ask an interesting, thoughtful question pertaining to the topic

Answer a question (in detail) posted by another student or the instructor

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.