Please see the attachment for the detail of this assignment
ITISP W 3 D
Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist in the next ten years? Why or why not?
Discussion 5 Infotech
Question: Networks have changed drastically over the last 30 years. With the first introduction of the 56k modem, which was about 3 typewriter pages per second, to speeds well over 1Gbps these days, the ability to use networks globally, has changed the way we do business. Using research, determine where networks will go in the next 5-10 years and how that might impact the global economy.
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- please cite properly in APA
- Make an argument concerning the topic.
- Your initial post must be at least 250 words.
- No Plagirsam
Final_Assignment
1. In CLIQUE, the threshold used to find cluster density remains constant, even as the number of dimensions increases. This is a potential problem since density drops as dimensionality increases; i.e., to find clusters in higher dimensions the threshold has to be set at a level that may well result in the merging of low-dimensional clusters. Comment on whether you feel this is truly a problem and, if so, how you might modify CLIQUE to address this problem.
2. Name at least one situation in which you would not want to use clustering based on SNN similarity or density.
3. Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of connection (interconnectedness) of clusters.
4. We take a sample of adults and measure their heights. If we record the gender of each person, we can calculate the average height and the variance of the height, separately, for men and women. Suppose, however, that this information was not recorded. Would it be possible to still obtain this information? Explain.
5. Explain the difference between likelihood and probability.
6. Traditional K-means has a number of limitations, such as sensitivity to outliers and difficulty in handling clusters of different sizes and densities, or with non-globular shapes. Comment on the ability of fuzzy c-means to handle these situations.
7. Clusters of documents can be summarized by finding the top terms (words) for the documents in the cluster, e.g., by taking the most frequent k terms, where k is a constant, say 10, or by taking all terms that occur more frequently than a specified threshold. Suppose that K-means is used to find clusters of both documents and words for a document data set.
(a) How might a set of term clusters defined by the top terms in a document cluster differ from the word clusters found by clustering the terms with K-means?
(b) How could term clustering be used to define clusters of documents?
8. Suppose we find K clusters using Ward’s method, bisecting K-means, and ordinary K-means. Which of these solutions represents a local or global minimum? Explain.
9. You are given a data set with 100 records and are asked to cluster the data. You use K-means to cluster the data, but for all values of K, 1 ≤ K ≤ 100, the K-means algorithm returns only one non-empty cluster. You then apply an incremental version of K-means, but obtain exactly the same result. How is this possible? How would single link or DBSCAN handle such data?
PPT BE
- Provide an overview of your Course Project.
- Make sure all the sections with important points are covered.
- Include appropriate images as required.
- Minimum 15 – 20 slides Presentation.
- Separate slide for both title and list of references.
discussion
The Board of Directors and CEO of your organization is interested in the business value gained from adopting Cloud computing. You have just received your advance degree in Information Technology and the CEO asked could you to give a presentation to the Board about what cloud computing is. At a minimum, using the key terms from chapter 1 of the textbook to create a voice over presentation using screen cast-o-matic . Submit the link to the voice-over
Python coding (flowchart & Pseudo code)
Instructions:
Create a FLOWCHART and a PSEUDOCODE for each problem.
Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. You may use Microsoft Word® for your pseudocode and Microsoft PowerPoint® for your flowchart.
1. Problem:
Create a flowchart and pseudo code to do the following:-
You are going to modify week 4 assignment (2 problems) to use input() function (no hard coded values) to prompt the user to enter the values.
Make sure the prompt message is meaningful, do not say “Enter value”, say something like this “Enter hours worked” after you get all the inputs, display the results and prompt the user if wants more calculation (y/n). If no then print a message like “Thank you for …….”
The flowchart must include a loop and if-then
Introduction to Operating Systems and Networks Assignment
All the question are in the file that I upload
Please answer all the questions.
cryp
At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
· Provide a 500 word (or 2 pages double spaced) minimum reflection.
· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
· Share a personal connection that identifies specific knowledge and theories from this course.
· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
5s week 8 assignment PL
Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?
2. How has the term hacking changed meaning over the years?
3. What is the most dangerous hacker tool?
4. From the news: How were NSA’s hacker tools compromised?
5. What was the vulnerability in the Target Breach?
6. What do you think of hactivism?
7. How did Stuxnet work?
8. What was the Arpanet?
9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?
10. What is the Red Team?
include references. do not copy paste.