Editorial Thinking and Association rule

Assignment 1

Watch the video: Andy Kirk: Let’s have a think about data visualization thinking

Read: Ch. 5 in the textbook: Establishing Your Editorial Thinking

Textbook: Kirk, Andy.  Data Visualization: A Handbook for Data Driven Design, Second Edition. Sage, 2019.

1.  What does the author mean by editorial thinking?  Also, there is a video of Andy Kirk (2015) noting the key concepts of data visualization thinking.  Please pick one major concept from the video and note what was said and your thoughts about the topic.

2.  When thinking about data visualization, it is important to understand regular expressions in data analytics.  Therefore, note the importance of data visualizations and choose two types of expressions (* – wildcards for example) and discuss the difference between the two types of expressions.

Answer both questions in 250 words each. There must be APA formatted references (and APA in-text citations) to support the thoughts in the post. Please separate the references for each question.

Assignment 2

Read: Chapter 5 in Textbook: Introduction to Data Mining

1. What is the association rule in data mining?

2. Why is the association rule especially important in big data analysis?

3. How does the association rule allow for more advanced data interpretation?

Answer all the questions in 100-150 words in total. There must be APA formatted references (and APA in-text citations) to support the thoughts in the post.

Define a function named letter

Define a function named letter for the above question 3.1, with the receiver’s name, topic, and the sender’s name as the parameters. Write code to test your function at least two times using different arguments.

Assignment

Considering the importance of data in an organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

Be approximately four pages in length, not including the required cover page and reference page.

– Follow APA7 guidelines. 

– Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

– No plagiarism. 

Info Security & Risk Mgmt

evaluate how project management interacts with risk management. 

You must use at least one scholarly resource. 

Every discussion posting must be properly APA formatted.

Applicants

  

Open Access and create a new database named “5-5 Applicants.”
Create a table named “Applicants” with the following fields: Date, Position, First Name, Last Name, and Phone. Select “Date” as the field type for the Date field. Select “Text” or “Short Text” as the field type for the other fields. Select the Phone field as the primary key.
Enter the following information into the table. Enter the current year in the dates (instead of 20–).
Date Position First Name Last Name Phone
Date Position First Name Last Name Phone1/3/20—Cashier Jennifer Smith 541-555-01011/4/20—Stocker Forrest Bayly541-555-01221/4/20—Cashier Susan Mcintyre541-555-01311/5/20—Manager Barry Gamble541-555-01251/5/20—Cashier Joshua Neslund541-555-00301/6/20—Stocker Erin Gonzales541-555-01271/6/20—Manager Laura Reynolds541-555-01291/7/20—Cashier Amy Pederson541-555-01241/7/20—Cashier Serena Worcester541-555-01261/7/20—Stocker Philip Raymond541-555-01331/8/20—Cashier Bryan Crider541-555-01081/8/20—Manager Sara Reyes541-555-01151/8/20—Stocker Lauren Hurst541-555-01281/9/20—Manager Jennifer Smith541-555-01541/9/20—Stocker Tom Reitz541-555-01141/9/20—Cashier Kelly Tumpane541-555-0111 

Information Governance

 In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results.   From your required readings as mentioned  below, discuss the value that metrics brings to the organization, and identify critical measures of success that should be tracked. 

  • 2 Pages, 4 References most recent ones.
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA).
  • Readings:
  • Textbook: Chapter 4 – Information Risk Planning and Management

Textbook: Chapter 5 – Strategic Planning and Best Practices for Information Governance

Tallon, Paul, (2016). Corporate Governance of Big Data: Perspectives on Value, Risk, and Cost. https://ieeexplore.ieee.org/abstract/document/6519236
Click PDF, In Institution name box, enter: University of the Cumberlands, UC OneLogin will pop up and login with UC email address and Password.

Shevde, N, (2018). Measuring Information Governance Success.https://www.cmswire.com/information-management/measuring-information-governance-success

Support Queue Case Study

 Instructions

For this project, you will apply the CompTIA 6-Step Troubleshooting Process to explain how you would tackle Hudson Fisher Associates Help Desk Tickets. There are three groups of tickets, Level 1, Level 2, and Level 3. You will pick two tickets from each group.

As you prepare to analyze and hopefully solve these typical IT help desk tickets, keep in mind that for this course, it is more about the process and less about finding the “correct” answer. You may not always find an exact answer from the information given. The problems are structured to approximate what you will find in the workplace. Use a logical and repeatable process (e.g., the CompTIA 6-Step Troubleshooting Process) and eliminate the improbable as you work your way through each scenario.

CompTIA 6-Step Troubleshooting Process:

  1. Identify the problem.
  2. Establish a theory of probable cause.
  3. Evaluate the theory to determine the actual cause.
  4. Establish a plan of action to resolve the problem and implement the solution.
  5. Verify full system functionality and if applicable implement preventative measures.
  6. Document findings, actions, and outcomes.

How Will My Work Be Evaluated?

As you progress in your information technology and cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. For this assignment, you should articulate your findings from the six support cases.

But the challenge you face is in expressing a technical solution to a nontechnical audience. Avoid jargon and acronyms. Find a way to relay your solution (and challenges) in language that your audience will find easily relatable.

Communicating in this manner will not always be easy. You may struggle to find the right analogy or metaphor. But if you can master the skill of summarizing your results and recommendations to management in an effective presentation, you will demonstrate how you use your technical knowledge to convey your ideas to others in a professional setting. You will also earn the respect and trust of your peers, your supervisor, and upper management as an effective communicator. You will be viewed as an employee ready for advancement.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 12.7.2: Explain the process of analyzing IT incidents.
  • 13.1.1: Create documentation appropriate to the stakeholder.

Your deliverable for the project is an annotated PowerPoint Presentation covering the following:

  • List of the six tickets you selected (two each from Level 1, Level 2, and Level 3)
  • One to two slides for each ticket, in which you:
    • State the problem.
    • Describe the steps taken to troubleshoot/analyze the problem.
    • Propose a brief resolution.
  • One summary slide: What did you find challenging or interesting about one or two of the support cases (opinion-based)?
  • One reference slide (two to six IEEE references). Include references for materials you consulted in TestOut or on the internet.

If you haven’t already done it last week, download the Support Queue Case Study Presentation Template to get started.

Delete the instructional text from the template before you submit.  

When you are finished, click “add a file” to upload your work, then click the Submit button.

Due DateJul 6, 2021 11:59 PM 

Discussion with 500 words

 

Write an essay of at least 500 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about

Pen Attack and Cyber Terrorism – Discussion 11

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

Please make your initial post at least 500 to 600 words. Please add APA 7 format and intext citations and mention all the references used in the paper with indent hanging format.

  • Explain, define, or analyze the topic in detail
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Foundations of Emergency Management

Emergency Management and the Terrorist Threat: How does terrorism differ from natural disasters and man-made hazards? What is the goal of emergency management in regard to the threat of terrorism, and what are basic progressive measures necessary to prevent, hinder, or respond to the propensity of terrorism to occur?

Note: Please follow the instructions attached.