Create an Array

Create an Array of 10 random whole numbers between 1-100.

You either select them or use the random function for bonus points).

Create a method to find the average of the 10 numbers.

Display the average to the screen.

Create a method to find the min and the max.

Display the min and max to the screen.

Sort the Array from low to high and display the the numbers on the screen.

Reverse the Array sort from high to low and display the numbers on the screen.

Diagramming a Home Network

 

Diagramming your home network can be beneficial in various ways. It  can help you determine what equipment to include and is present on your  network. Diagramming your network can help determine the best layout for  your equipment- for example, the best placement of your wireless  router. It can be helpful to keep track of equipment and who is the  primary user of the equipment–labeling who the devices belong to on a  home network diagram can be very helpful for inventory and tracking  purposes. Diagramming a home network can help you plan for potential  changes you make to your network. 

Home networks vary. Some rely  heavily on Wi-Fi, and others primarily use hard-wired connections and  little to no Wi-Fi. Some home networks use a cable modem to connect to  the ISP (Internet service provider), while others may use a DSL modem.  Fiber optics is becoming popular for a home network connection to the  ISP. Whatever the case, the type of connection to your ISP will often  determine things like the type of modem, router, and network cabling  your home network will need. These characteristics, networking  equipment, and items such as PCs, laptops, and IoT devices should all be  documented on a network diagram.

 You will use the information at this link to complete the discussion for this week. Make Use of: Home Network Setup Diagram https://www.makeuseof.com/home-network-setup-diagrams/

 

Answer the following:

  • Which of the six network diagram  examples most closely represent your home network? What would you need  to add/remove with this diagram to represent your home network?
  • What  kind of labeling scheme would you use for your home network for each  device? Provide an example of your naming scheme and discuss why you  chose your naming scheme.
  • Choose and discuss the pros and cons  listed for one of the example network setups. Do you agree with the pros  and cons listed?  Why or why not? What other pros and cons would you  add and why?
  • SEE ATTACHEMENT FOR HOME DIAGRAM EXAMPLE

Write a response to the following questions

 

  1. Analyze the four performance measures of cost, quality, duration, and customer satisfaction. What additional metrics or measurement could be important (beyond the additional measurement of size noted in the text)?
  2. Compare and contrast quantitative versus qualitative data in evaluating performance of IT systems. Is one data collection methodology better at assessing the overall effectiveness of operations?

Response should be 1-2 pages or at least 500 words.

Big Data Term Paper Questions and 2 research streams

  

Question #1

The topic Big Data has attracted research interest in the information systems literature. What is Big Data? How is Big Data different from other data? What ways Big Data is used for business innovation? How is Big Data related to Business Intelligence?  State some interesting and important research questions about either Big Data or Business Intelligence or both.

Note: Answer all of the above questions as independent question. Please don’t club

Question #2

  Find at least two peer reviewed articles on each stream from any journal (preferably IS or Computer Science or any Business Administration discipline related journal i.e. Marketing, Management, etc.). Describe the findings of each study. More precisely, (a) how do the predictor variables influence the predicted variables? (b) What is the practical contribution(s) of each research? (c) How could future research extend the theory put forward in each of the research you have included in your answer?

You can use portals like Google Scholar, Web of Science, JSU Library Search, etc. to find articles on peer reviewed journals. Please include a Reference section at the end of your answer section. Use API guidelines to create the reference for each of your sources.

Topics:

1. Big data, machine-to-machine (M2M) analytics to improve product life-cycle management.

2. Big data in marketing, promotions, and social networking.

All together at least 7 pages.   

References are mandatory. 

FRAUD DETECTION SYSTEM USING MACHINE LEARNING

our chosen project subject is ”  FRAUD DETECTION SYSTEM USING
MACHINE LEARNING “

write a brief proposal (at most one-page, 12-point font, single spacing, 1 inch margins) that describes the idea for a project, the work you intend to perform, and all the people involved in the project (4 people). In particular, it should identify the project type, the problem you plan to address, the motivation for why you find the problem important or interesting, any previous work you already know about, and a rough tentative approach to solving the problem (if applicable) . 

 —————————————————————————————————————————————–

In the group project, each group (three to four students) will focus on a topic and comes with a research/technical paper by the end of the semester. The topic should be on any specific security topic, but the expectation is to define a specific problem for in-depth investigation, coming up with a new solution (conceptual or practical application) and compare with similar other approaches extensively. 

Your research project paper must include at least 15 articles from IEEE or ACM digital library and should follow IEEE format.

A good resource to search for journal and conference papers: https://scholar.google.com/

There are various types of projects you can consider:

  1. The project may be very practical in terms of applying techniques you have learned in the course to a real problem such as classification of email messages
  2. The project may involve designing or adapting existing algorithms to a novel class of problems. For example, how might we solve multiple related classification tasks? How can we improve document clustering by designing a new clustering metric?
  3. The project may consist of a theoretical analysis of a method we have discussed. For example, this may be in terms of complexity, convergence, etc.
  4. The project can be a theoretical or more applied survey of a branch of machine learning that we didn’t go through in detail. For example, you may write about the use of machine learning in different domains.

The requirement of the research project is to conduct machine learning techniques using a Weka package or other available programs. You can use any packages or any programming language.

Data can be collected from public domains or from your company.

Week9Table.jpg

SECURITY ASSESSMENT & TESTING

BUSINESS CASE: The Blue Skies Airport management company purchased three more airports. New established Blue Skies Airport System consists of four airports in the USA. Each airport has its own data center.

LOCATIONS.

Airport 1: Washington DC                           Airport 2: Chicago, IL                       

Airport 3: Los Angeles, Ca                            Airport 4: Dallas, TX 

QUESTION 1:  What is SCADA Cybersecurity for Blue Skies Airport System?  Explain the differences between SCADA Cybersecurity vs. Traditional Security.

Resource:

https://www.citetech.com/learn/cybersecurity-for-scada-systems#:~:text=SCADA%20cybersecurity%20is%20the%20practice,natural%20gas%2C%20electricity%20and%20transportation.

https://www.energy.gov/ceser/downloads/21-steps-improve-cyber-security-scada-networks

QUESTION 2:   List the Pros and cons of the Black box, Grey box, and White box pen-testing for the data center at Airport 1 in Washington DC. And explain which one you would prefer for the given business case.

Resource: https://thecyphere.com/blog/types-penetration-testing/

QUESTION 3:   List the Pillars of Security of the Data Center of the Blue Skies Airport data center

QUESTION 4:   Complete the  Potential Threats table based on the given Blue Skies Airport case 

Week9Table.jpg

Potential Threats Table.docx Download Potential Threats Table.docx 

500 words

My literature review : Customer sentiment analysis using their reviews (Big Data,ML Deep Learning)

In this Discussion Board (DB) assignment, reflect on the various strategies that you may need to develop in relation to various aspects of your work with the literature that informs your study. The following are some questions to consider for this DB assignment:

What are regarded as the top academic journals in your field or concentration, and how did you determine this?

What are the top publications in your profession or industry, and how did you determine this?

In general, what strategies are you using to support your search for relevant literature on your topic?

In what ways might you need to adapt those strategies to evaluate the usefulness of peer-reviewed versus gray literature sources?