Week 3 Discussion -1 Business Intelligence

Create a discussion thread (with your name) and answer the following question:

Discussion 1 (Chapter 5): What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Doctorate Level Research Paper: Business Process Redesign

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 4-5 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

****Very Important APA Format 

Use of headings would have increased the level of organization.  

To adhere to APA, the Title page should include the date and your professor’s name.  The first sentence of each paragraph should be intended one tab.  The sources on the Reference page should each have a hanging indentation.  Each source should also be cited in the body of the paper to give credit where due.

You can use the APA manual or the web for detailed guidance on the proper format of an APA reference page.  A sample reference page is available by scrolling to the end of the sample paper at https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_sample_paper.html.

Information on APA Citations can be found at https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/in_text_citations_the_basics.html.

The Purdue OWL citation chart provides examples of proper use of inline citations and their associated references.  It can be retrieved at https://owl.purdue.edu/owl/research_and_citation/using_research/documents/20180719CitationChart.pdf .

****No Plagiarism***

Discussion – 4 – Response to Peers

Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Encryption:

 Encryption:

 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.)

 Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file.   

Research Report

 

Write a research paper on anyone of the following –

1. Software Engineering and SDLC (Software Development Life Cycle)
2. Software Engineering and Traditional Development Models
3. Software Engineering and Data Verification
4. Software Engineering and Data Validation
5. Software Engineering and Software Quality
6. Software Engineering and Data Analytics

Please follow the instructions in the uploaded file VERY CAREFULLY and write the paper. 

Reach out to me through messaging here on homework market if you have any questions at any point of time.

Thanks, 

Intro to Data mining

I was perusing through the chapter and began re-reviewing mutual information for content. While this is not used in a majority of the use cases, this is noteworthy. In particular with AI (https://thenewstack.io/mutual-information-pearson-correlation-building-blocks-ai/).

Please explain how mutual information and correlations are similar, yet different.

Also please provide an example of how you would use mutual information in a staffing agency.

Please post and respond to two peers with substantive content. If you use an author’s material, please cite this per the APA. 

written assignment

 Explain  how you feel about the need for Internet privacy. If you value your own privacy, explain why you do. If you feel you have nothing to hide, explain why you believe your privacy is protected.