Need help with the lab

  

Big Data – Hadoop Ecosystems

Import the accounts table into HDFS file system:

1) Import account:

$ sqoop import

–connect jdbc:mysql://localhost/loudacre

–username training –password training

–table accounts

–target-dir /loudacre/accounts

–null-non-string ‘\N’

2) List the contents of the accounts directory:

$ hdfs dfs -ls /loudacre/accounts

3) Import incremental updates to accounts

As Loudacre adds new accounts in MySQL accounts table, the account data in HDFS must be updated as accounts are created. You can use Sqoop to append these new records.

Run the add_new_accounts.py script to add the latest accounts to MySQL.

$ DEV1/exercises/sqoop/add_new_accounts.py

Incrementally import and append the newly added accounts to the accounts directory. Use Sqoop to import on the last value on the acct_num column largest account ID:

$ sqoop import

–connect jdbc:mysql://localhost/loudacre

–username training –password training

–incremental append

–null-non-string ‘\N’

–table accounts

–target-dir /loudacre/accounts

–check-column acct_num

–last-value

4) You should see three new files. Use Hadoop’s cat command to view the entire contents of these files.

hdfs dfs -cat /loudacre/accounts/part-m-0000[456]

Cybersecurity

In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page. 

Cloud Computing

 

Assignment Content

  1. Refer to the Learning Infographic Design and Cyber Security Awareness: Digital Data Protection.

    Your work so far has been well-received, and the management team is very interested in quickly bringing the rest of the organization into the process. The management team has expressed interest in incorporating cloud technology as part of the Auburn Regional’s IT architecture.

    To integrate both of these requests, you decide to create an infographic that could, on a single diagram, give the reader an idea of what cloud technology is and how it could be used by Auburn Regional as these enterprise systems updates are in action. As you might imagine, there is a wealth of information on the internet involving the use of cloud computing. 

    Consider the following information, and outline your answers:

    • What are the pros and cons of cloud computing?
    • Where could cloud computing fit in the organizational structure and operations?
    • How do companies that enter cloud technology agreements pass on those issues to their customers?
    • How do these companies really know where their data and the data of their customers is really stored?
    • What precautions are being taken?
    • Using your outline, create an original infographic for a presentation to the Auburn Regional management team that shows:
    • The basics of cloud computing
    • An overview of pros and cons of cloud computing
    • Where cloud computing could possibly fit into the organizational structure and operations 
    • At least two concerns that need to be addressed 
    • Include your outline on a separate document to support your infographic.

       

Measuring the Value Added to the Business

  

Information systems are no longer being used only for data reporting. As information systems have become a major part of the business model—and IS budgets continue to rise because of increased investment in IT—there is also a growing need to understand the value of business systems. 

So what are the various models that are commonly used to help measure the value added to a business by information systems? 

Discussion 7

Kirk (2016) tells us that data adjustments affects what data is displayed and presentation adjustments affects how the data is displayed. Each of the adjustments involve specific features. Data adjustments include: Framing, Navigating, Animating, Sequencing, and Contributing. Presentation adjustments include: Focusing, Annotating, and Orientating. Select one feature and expand on it.

Reference

Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design. Thousand Oaks, CA: Sage Publications, Ltd. (Chapter – 7 Interactivity)

INSTRUCTIONS.

1. No Plagiarism at any cost .

2. The submission date is Thursday (06/18/20).

3. Atleast 3 references in APA format

Risk Management and Mitigation Planning

 

Assignment Content

  1. You are the new IT Project Manager for the organization you chose in Week 1, and the CFO is needing a risk assessment for migrating from SQL Server 2008 r2® database to SQL Server 2016. The migration will lead to the expansion of the cloud data centers worldwide.

    The CIO feels the risk is too high and wants you to develop an Information Guide Handout and Risk Information Sheet for upper management to describe the risks and management of the risks for the impending migration.

    Part A:
    Create a 1- page (does not include title or reference pages) Information Guide Handout to present to upper management, comparing risk management practices to use in the migration that includes:

    • How risk mitigation strategy planning can reduce the likelihood and/or impact of risks
    • How often risks will be reviewed, the process for review, and who will be involved
    • The roles and responsibilities for risk management
    • Adequate references to support your findings, information, and opinions
    • A recommendation for the best risk management practice for this migration
    • Part B:
      Using the sample shown below, create a 4- to 5- page (does not include title or reference pages) Microsoft® Excel® Risk Information Sheet for at least five potential risks which might be encountered during the conversion. At least three of the five risks you choose should be project-management related.

      Risk Information Sheet

    • Risk Description
    • Probability
    • Impact
    • Rationale
    • Risk Mitigation
    • Details/Outcome
      Please note the following:
    • The risk description should fully describe the risk.
    • The probability is the likelihood which the risk will occur (i.e., low, medium, or high).
    • The impact is how the organization will be affected if the risk does occur (i.e., low, medium, or high).
    • The rationale should explain the reasons for your probability and impact assessments.
    • The mitigation strategy should explain how each risk will be addressed.
    • There should be one risk information sheet for each risk identified.
    • Include APA-formatted citations when necessary.

DS HW-8

Write a research paper on the Credit Card Fraud Detection techniques with a focus on both supervised and unsupervised learning.

https://www.kaggle.com/merryyundi/credit-card-fraud-detection

https://www.kaggle.com/isaikumar/credit-card-fraud-detection-using-k-means-and-knn

The paper should have the following sections and discuss how these work:

Section 1: Data Exploration of the Credit Card Fraud Dataset

Section 2: Resampling for Imbalanced Data

Section 3: Logistic Regression

Section 4: Decision Tree Classifier

Section 5: Random Forest Classifier

Section 6: Voting Classifier

Section 7: K-means Clustering