The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.
Business Intelligence
Research: Data Mining Applications.
Background: As noted by Efraim (2020), data mining has become a popular tool in addressing many complex business problems and opportunities. It has proven to be very successful and helpful in many areas such as banking, insurance, and etc. The goal of many of these business data mining applications is to solve a pressing problem or to explore an emerging business opportunity in order to create a sustainable competitive advantage.
Reference: Sharda, R., Delen, Dursun, and Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support. 11th Edition. By PEARSON Education. Inc.
ISBN-13: 978-0-13-519201-6
Research Question: Write a research paper that contains the following:
· Discuss Customer relationship management using data mining applications.
· Discuss the Travel industry using data mining applications.
· Compare and contrast data mining vs statistics.
Your research paper should be at least 6 pages (1000 words), double-spaced, have at least 5 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.
PCA Big data
Practical Connection Assignment on course – Data Science & Big Data Analytics
Provide a reflection of at least 500 words (double-spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment.
In IT – field of study.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment.
Reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Database
Assume that you have a Saudi league player database. In this database, you have a table containing players’ attributes such as (Name, age, position, etc.) and you decided to add information about players’ agents. Would you represent the agent information as attributes in the player table or would you create an entity set for players’ agents? Justify your answer.
Question 2vDiscussion subject Topic related to “Decision Mkg/Essent Bus Comm “
question 2.
Discussion subject Topic related to “Decision Mkg/Essent Bus Comm “
discussion is 400 – 500 words related to audit report (audit report means opinion on whether a company’s financial statements comply with generally accepted accounting principles)
Main Question
Write a brief assessment that addresses the following questions:
What story could you tell as part of your audit report?
Where could you come up with other ideas for a story that would make your audit report more effective?
(Your story ties emotion strongly and effectively to new information or a new understanding
for your business partnering company or organization. )
please watch attached link video for an idea
Sorting – Java Coding Assigment
*** To do this assignment you are not to use any of the Collections API, or any
pre-implemented sort routines in Java. ***
In this assignment you are required to make use of the sorting routines in chapter 8 of you text book. You must ask the user to select which sorting routine he/she wants to use out of those routines implemented in the book (Insertion Sort, Shell Sort, MergeSort, or QuickSort). Based on the user input, you need to call the corresponding routine.
You are required to write one main program that will read in any number of integers and store it in an array of ints (not an ArrayList). What you need to do first is to ask the user what sorting routine he/she would like to use. Then you need to ask the user how many integers to be entered as input, and then ask the user to input that these integers.
Your program will store these integers into an array of integers first. Then your program is supposed to remove the duplicates out of this array by first sorting the array (using the user-specified sorting routine), and then removing any duplicates. Your program must not copy these elements into another array to remove the duplicates, the duplicates should be removed in place which means in the same array. Also, you must sort the array first before you start duplicate removal.
Once your array (the same array you started with) has only unique numbers, your program should print out the array followed by a list of all the numbers that were duplicated.
The numbers that were duplicated can be stored into another array.
--------
The following would be a sample scenario of running your program:
Make your choice of a sorting routine first. Then continue as follows:
Enter the number of integers: 10
Enter the 10 integers: 7 9 8 1 9 24 23 24 9 8
The resulting array is: 1 7 8 9 23 24
The numbers 8, 9, 24 were duplicated in the input.
--------
The only file that is to be submitted is a Main.java (or Assg6.java) and no other file.
Best of Luck
5
Instructions
Please watch this video: https://youtu.be/ctij93rBmsM which is an hour long video on anti-forensics.
Instructions
Now that you have watched the video – please complete this assignment.
1. What did you learn?
2. Did you learn anything that surprised you such as “I didn’t know I could use this technique to try to hide data?!”
3. Please list at least four different ways that a bad actor may try to obfuscate their tracks.
4. Once you have identified four different ways that a bad actor may try to evade scrutiny, please identify how you might be able to uncover those techniques.
REFLECTION
With the finish line in sight for ITS-831 ( INFO TECH IMPORTANCE IN STRATEGIC PLAN ), reflect on the course as far as the topics/elements that best served your learning needs; and those that you would have liked more of or less of. Why?
Also provide thoughts on how the virtual Residency worked for you.
As comments are posted, please feel free to discuss them and their conclusions openly within this Discussion (optional). Note that there may be different perceptions between various class colleagues.
Thanks for sharing your perspectives.
Apply – Signature Assignment: Cryptographic Hash Function
Every developer is focused on transmitting data securely. Hashing and hash functions are essential for securing business information and data. While the term cryptographic hash function may sound intimidating, it’s much simpler than it sounds. For this assignment, expand on the information provided in the course and fully address the items below.
Write a 2- to 3-page paper in which you:
- Define cryptographic hash function (CHF).
- Elaborate on the main properties and definitions of an ideal cryptographic hash function.
- Propose 2 business applications or uses for a cryptographic hash function (e.g., password verification) and include a description of how it is used.
Format your paper according to APA guidelines with at least three sources cited covering scholarly and industry sources.
700 word discussion: Based on this knowledge and assumptions, in your own words, briefly explain what the simulation modeling relies upon?
Chapter Six (6): According to Gilbert and Troitzsch (2005), Foundations of Simulation Modeling, a simulation model is a computer program that captures the behavior of a real-world system and its input and possible output processes.
Based on this knowledge and assumptions, in your own words, briefly explain what the simulation modeling relies upon? provide a clear narrative to support your response.