Data Visualization and data mining

Assignment 1

Q1. There are various languages, some are better for data visualization than others.  Please review the basics of Python, SAS, R, and SQL.  What are the qualities of each language regarding data visualization (select at least two to compare and contrast)?  What are the pros and cons of each regarding data visualization (select at least two to compare and contrast)?

Q2. Kirk (2019) notes the importance of formulating your brief.  What does he mean by this?  Please expand this thought by noting how you would create a vision for your work.  Note any real-world examples to expand upon this thought.

250 words each. There must be APA formatted references (and APA in-text citation) to support the thoughts in the post.

Course Textbook: Kirk, Andy.  Data Visualization: A Handbook for Data Driven Design, Second Edition. Sage, 2019.

Assignment 2

Chapter 2

  1. What is the difference between discrete and continuous data?
  2. Why is data quality important?

Chapter 3

  1. Note the basic concepts in data classification.

Discuss the general framework for classification.

The assignment should be 100-150 words. There must be APA formatted references (and APA in-text citation) to support the thoughts in the post.

easy and own words, discussion topic, one page only,

 

discussion deals with Operating systems and its vulnerabilities.  An  operating system is defined as the following:  A software that manages  the hardware and software of a system.  It also provides the User  Interface that allows humans to interact with the system. As much of the  information is either created and/or stored in the system, securing the  OS requires a thorough understanding of the Operating system and how to  secure it.  There are many different types of operating systems that  exist, either for desktops, routers, switches, servers, and mobile  devices.

In the previous week’s discussion, you identified and discussed a system and its vulnerabilities. 

  1. Based on the definition above, please identify the operating  system.  Provide recommendations on how you would secure and harden the  operating system to ensure it has been configured more securely.
  2. Based on the system and its operating system, please research the  vendor and its website to identify any hardening guides and documents  you may find.  You may also research other sources on the Internet for a  hardening guide.  Some of useful sites you may visit are the following: 
    • SANS Information Security (Links to an external site.)  – SANS is a valuable information Security resource.  SANS organization  has been recognized within the Information Security community as an  indispensable tool for all security needs.  The reading room serves as  the repository on thousands of white papers and documents regarding  information security.  It has templates on creating InfoSec policies and  guidelines on how to configure IT systems securely.
    • Best Practices and How To Articles (Links to an external site.)  – Here is a collection of Information Security policy documents, best  practices, and how to articles for Information Security.  It can be used  to help develop hardening documents.
    • National Vulnerability Database Repository (Links to an external site.)  – National Institute of Standards and Technology is a government agency  that is tasked with developing standards on all technology, from IT to  non-IT technology and things like standard weights and measure.  Many  regulations that drive Information Security reference NIST as a source  for standard methodologies used in the industry.
  3. Based on your research, please list and discuss any operating system  configuration that needs to be evaluated and hardened.  Please identify  the default setting and what it needs to be to ensure a higher level of  security.  You should also indicate the importance of the setting.

Word_3G_Environmental_Newsletter_and_Research_Paper

 

#Word_3G_Environmental_Newsletter_and_Research_Paper

 

#Word 3G Environmental Newsletter and Research Paper

 

Project Description:

In the following project, you will format a newsletter by inserting  pictures and screenshots, applying two-column formatting, and adding a  border to a paragraph. You will edit and format a research paper by  inserting footnotes, creating citations, and formatting a bibliography.  You will also create mailing labels.

#Start   Word. Download and open the file named Student_Word_3G_Environmental_Newsletter_and_Research_Paper.docx.

#On Page 1, click at the   beginning of the newsletter title. From the files downloaded with this   project, insert the picture w03G_Recycle.jpg.

#Set the Height of the picture to 0.4 inches, and then change the Text    Wrapping to Square. Change the Horizontal Alignment to Left relative  to   Margin and the Vertical Alignment to Top relative to Margin.

#Starting with the paragraph Research on Environmental Economics,    select all of the text from that point to the end of the first  page—do not   include the Page Break in your selection (select only to  the end of MEEC). Format the text in two columns,   and then apply Justify alignment. Insert a Column break before the paragraph The Hard Costs of Pollution. Save your   file.

#Start your internet browser and   navigate https://ehp.niehs.nih.gov Redisplay your document, and   then click at the end of the paragraph that begins Research topics include.  Insert a Screen Clipping of the   website—do not include the address  bar or the taskbar. To the inserted   screenshot, apply a Black, Text 1  Picture Border and change the Weight to 1   pt.

#Select the subheading Research on Environmental Economics.    Use the Font dialog box to apply Small Caps. Display the Font color  gallery,   and in the fourth column, click the first color. Apply the  same formatting to   the subheadings The Hard Costs of   Pollution and Environmental   Economics Conference.

#Select the last two paragraphs in the newsletter, which begin For more information, and end with MEEC,  and then from the Borders and   Shading dialog box, apply a 1 pt Shadow  border using Black, Text 1. From the   Shading tab, display the Fill  color gallery, and then in the fourth column,   click the second color.  Center the two paragraphs of text.

#On Page 2, change the line spacing for all of the text on the page to    2.0. For the same text, change the spacing after to 0 pt.

#On Page 2, apply a first line   indent of 0.5 inches to the paragraph that begins Environmental economics is.

#In the paragraph that begins Environmental economics also studies,   in the second line, immediately following the comma after Kyoto Protocol, insert the footnote The Kyoto   Protocol is an international agreement that aims to reduce carbon dioxide   emissions. Be   sure to type the period at the end of the footnote.

#Modify the Footnote Text style to set the Font Size to 11 and the    format of the Footnote Text paragraph to include a first line indent  of 0.5”   and double spacing.

#On Page 2, at the end of the   paragraph that begins Environmental   economists have,  click to the left of the period, and then using MLA   format, insert a  citation for an article in a periodical with the following    information:
 

  Author: Abboud, Leila S.
   Title: Economist   Strikes Gold
   Periodical Title: The Wall Street Journal
   Year: 2008
   Month: March
   Day: 13
   Pages: A1
   Medium: Print

Edit the Abboud citation to   include A1 as   the page number.

#On Page 4 of the research paper,   click to place your insertion  point in the blank paragraph. On the References   tab, click  Bibliography, and then at the bottom of the list, click Works   Cited.  Select the paragraph Works Cited.   Change the font to Calibri,  change the font size to 11, and change the font   color to Black, Text  1. With the text still selected, center the paragraph,   and then from  the Paragraph dialog box, change the Spacing Before to 0 pt, if    necessary change the Spacing After to 0 pt, and set the Line spacing  to   Double. Move to the top of the document.

Save and close the file, and   then submit for grading.

Home work 4

  Write short answers, uploaded as a WORD DOCUMENT (300 to 400 words) and attach references  

  • 4.1 List ways in which secret keys can be distributed to two communicating parties.
  • 4.2 What is the difference between a session key and a master key?
  • 4.3 What is a key distribution center?
  • 4.4 What entities constitute a full-service Kerberos environment?
  • 4.5 In the context of Kerberos, what is a realm?
  • 4.6 What are the principal differences between version 4 and version 5 of Kerberos?
  • 4.7 What is a nonce?
  • 4.8 What are two different uses of public-key cryptography related to key distribution?
  • 4.9 What are the essential ingredients of a public-key directory?
  • 4.10 What is a public-key certificate?
  • 4.11 What are the requirements for the use of a public-key certificate scheme?
  • 4.12 What is the purpose of the X.509 standard?
  • 4.13 What is a chain of certificates?
  • 4.14 How is an X.509 certificate revoked?

Cloud Vendor Presentation

 In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
  • One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.
  • One slide on the conclusion.
  • All slides must be narrated by you, the student.

How Will My Work Be Evaluated?

As a professional, you will likely make presentations to customers, client audiences, and management. By summarizing your results and recommendations in an effective presentation, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express recommendations to decision makers with the right mix of technical detail in an accepted format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.2.2: Evaluate sources of information on a topic for relevance and credibility.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.
  • 10.1.3: Define the specifications of required technologies.
  • 13.1.1: Create documentation appropriate to the stakeholder.
  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

HR Blockchain

1. Based on your readings, do worldwide executives believe blockchain has the potential to radically change the future of organizations? You are required to cite this week’s assigned readings in your paper. 

 paper 500 words: Introduction, Question 1, Conclusion, References.

Reference

From the Internet: Use the Link to Access the Article.  Note that when you hit the link for the required reading it will take you a web page and you will need to click on Explore Full Report to see the full reading assignment. This option is located on the bottom left hand part of the screen. Please read the full report.

1. Pawczuk, L., Massey, R., & Holdowsky, J. (2019). Deloitte’s 2019 global Blockchain survey: Blockchain gets down to business. Deloitte Insights. Retrieved September 5, 2019 from https://www2.deloitte.com/us/en/insights/topics/understanding-blockchain-potential/global-blockchain-survey.html?id=us:2ps:3bi:confidence:eng:cons:32019:nonem:na:pgYdRMoB:1141606406:77378219758056:bb:Blockchain:Blockchain_Survey_BMM:nb