term paper

Write a 3-4 page APA formatted paper on a business problem that requires data mining, why the problem is interesting, the general approach you plan to take, what kind of data you plan to use, and finally how you plan to get the data. You should describe your problem, approach, dataset, data analysis, evaluation, discussion, references, and so on, in sufficient details, and you need to show supporting evidence in tables and/or figures. You need to provide captions for all tables and figures.

Your paper should include an abstract and a conclusion and a reference page with 3-5 references.

Summary topic

 Topic

Find and view several online videos on unified communications. Identify the URLs for three that you think do a particularly good job illustrating the characteristics and capabilities of UC systems. Select the one that you think is best and briefly justify your selection. . ‘.

– The summary should be 300 words with a minimum of 3 references on the topic.

– There should be no plagiarism, attach a plagiarism report with 0% similarity index

E-Mail Forensics

 Explain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search? 

preemptive scheduling

 We have been assuming in chapter 3 that preemption incurs no over head. Let us now relax this assumption. Consider a 2 task system. Preemption overhead is x. Given e1 , e2 , P1 , P2 , obtain the maximum value of x for which the two tasks are RM schedulable. Note: e1, e2 are execution times. P1, P2 are periods. 

10_Imoprtance of strategic IT planning

Research Paper: Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

Include at least 3 scholarly references in addition to the course textbook.  At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

  • Be approximately 2-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Phd: Discussion topic-2

Several Big Data Visualization tools have been evaluated in this week’s paper.  While the focus was primarily on R and Python with GUI tools, new tools are being introduced every day.  Compare and contrast the use of R vs Python and identify the pros and cons of each.Please make your initial post and two response posts substantive. 

A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

600 Words Initial post with at least 2 scholarly references and In-text citation.

Comment 1: 150 words with at least 1 scholarly reference.

Comment 2: 150 words with at least 1 scholarly reference.

Please attach the grammarly score screenshot in the end of the document.