Reflection

This assignment is a written assignment where students will demonstrate how this course Data Science and Big data analysis research has connected and put into practice within their own career. 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

wk 8 fn

1.How does Fintech compare to regular banking?2. Discuss R3 and its distributed ledger technology mission.3. What are some of the applications of cords and strategies of growing and expanding?4. What are some of the emerging markets that Fintech has impacted?  

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all s

ources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page

case study on bankrupted organization

Go online and search for information about companies that have been harmed or bankrupted by a disaster. Choose one such company and create a brief case study about it. Successful narratives will focus on the manner in which the organization was impacted, including financial losses, losses of sales, or the need for layoffs. 

The same origin policy

 

Do a bit of research on JSON and AJAX.

How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each

Virtualization

Research desktop virtualization and summarize at least one peer-reviewed scholarly article on the topic.  Provide at least two full paragraphs as a summary.

Additionally, provide at least one more paragraph to contrast and compare Hyper-V and ESXi.

Automata and Computability

1. Suppose the languages recognized by DFAs M and N are L1 and L2 respectively. How can

we use DFAs M and N to construct a DFA that recognizes the language L1∩L2? [Can you

use De Morgan’s Law?]

2. Show by giving an example that, if M is an NFA that recognizes language L, swapping the

final and non-final states in M doesn’t necessarily yield a new NFA that recognizes the

complement of L. Is the class of languages recognized by NFAs closed under

complement? Explain your answer.

IT Project assessment

please follow the below 

  • includes filling your information on the cover page.
  • You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
  • The work should be your own, copying from students or other resources will result in ZERO marks.
  • Identical copy from students or other resources will result in ZERO marks for all involved students
  • Use Times New Roman font for all your answers.

security architecture 3

 

  • When should the architect begin the analysis?
  • What are the activities the architect must execute?
  • What is the set of knowledge domains applied to the analysis?
  • What are the tips and tricks that make security architecture risk assessment easier?