biw1

Find information about IBM Watson’s activities in the healthcare field. Write a report.

discussion

 

Discussion

R is a language and environment for statistical computing and graphics. It is a GNU project which is similar to the S language and environment which was developed at Bell Laboratories (formerly AT&T, now Lucent Technologies) by John Chambers and colleagues. R can be considered as a different implementation of S. There are some important differences, but much code written for S runs unaltered under R.

Reply post

Why are statistical programming languages important to data scientists? What are some advantages and disadvantages the R programming language has over the other main statistical programming languages (i.e. Python, SAS, SQL)?

When replying to a classmate, offer your opinion on what they posted comparing the R programming language to the other statistical programming languages. Using at least 3 – 5 sentences, explain why you agreed or disagreed with their evaluation of the different statistical programming languages.

Access Module 6 SAM Project 1a

Need help with Access Sam Project. Details below.

Personal Insurance, Inc. is a national company that insures homeowners and renters. As a regional manager, you need to be able to create professional reports for employees and for entities outside the company.
 

Import the data from the file Support_AC19_6a_Claims.txt, and then append the records to the Claims table. The text file is a delimited file with a comma separating each of the six fields. Do not create a new table, and do not save the import steps.

Instructions uploaded, but starting file cannot be attached. Will need to send it separately. 

Discussion Question

Take a position on the ethical concerns raised by employees who are upset about organizations monitoring their e-mail or Internet access for security purposes.

  • Assess whether you believe it is fair for an employee to undergo this type of surveillance.
  • Suggest an alternative approach for an organization to control security without monitoring employee actions.

Assignment 1

  

Assignment 1 (20 points)

CONTEXTUAL THINKING ABOUT DIFFERENT SCENARIOS

This exercise involves you using imagination and logical reasoning to occupy the mindset of a visualiser facing the task of formulating a brief for different scenarios. Imagine you are given the challenge of creating a visualisation/infographic in each of the following made-up scenarios relating to the subject of Oil Spills

Scenario A: A broadsheet newspaper reporting on the regions and communities affected by oil spills

Scenario B: Analysts at the International Tanker Owners Pollution Federation (ITOPF) providing business intelligence reporting to support operational colleagues

Scenario C: Presentation to shareholders of BP (British Petroleum) demonstrating the reduction in spill-related losses

Website reference: The International Tanker Owners Pollution Federation (ITOPF) statistics page

Compile a document outlining your assumptions, definitions and ideas about the context and vision for each of the scenarios presented above. Get into the mindset of the potential creators and audiences. If you were them what do you think you might be faced with in terms of requirements, constraints, needs and possibilities? 

(Context) CURIOSITY: Outline what you think might be the essence of the trigger curiosity behind each scenario?

(Context) CIRCUMSTANCES: Work through the list shared in the book of the main circumstantial headings and list or describe your creative and critical judgment about the inevitable, assumed, or self-defined factors you think might be relevant or existent in each scenario. Consider the reasons behind your judgments

(Context) PURPOSE: How might you describe or articulate what you imagine the purpose of the work associated with each scenario would be: how might success, impact or effectiveness be expressed and measured? What is the right kind of experience and tone of voice that would reflect the best fit creative direction (could be a singular location or a journey across the dimensions of the map).

(Vision) IDEAS: Sketch out your instinctive ideas about what you think the visual work for each scenario look’s like in your mind’s eye: what colours, forms, keywords, layouts, thoughts come to mind when you think about the subject at hand? What other work can you find through research or past experience that may offer inspiration, influence or reference for your thinking?

There is no need to do any data extraction or analysis, just use your imagination for what data could exist and could be available. There is no perfect answer, no right and no wrong: it is about using a degree of practical imagination and empathy (your ability to occupy the mindset of others). You will need to make many assumptions and take the initiative to define things yourself.

Algorithm analysis

 

We  have n stations along a river, numbered 1 to n in the direction of the  current. You can rent a boat at any station i, go down the river to a  station k> i, return the boat and pay a fee c (i, k) for the tour. It  is possible that c (i, k) is greater than c (i, j) + c (j, k), with j  being an intermediate station between i and k. In this case, it is  cheaper to rent a boat from i to j and then another from j to k. Give an  efficient algorithm that calculates the minimum cost of a trip from 1  to n. Depending on n, how long does your algorithm consume?

Build a C program that has two functions: one for encryption and one for decryption.

 Procedure

 Implement one program that has two functions: one for encryption and one for decryption. 

Encryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.) 

Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file. 

Case Study 8

Read Deceitful Spammer or Marketing Genius? and complete the questions at the end of the case study.

https://www.scu.edu/ethics/focus-areas/business-ethics/resources/deceitful-spammer-or-marketing-genius/

At least 600 words with APA format. Need to answer all questions. Reference and citations.