Discussion-7 MM

  Discuss the role of demographics in relationship to integrated marketing communications. 

1. DISCUSSION: Using 300-350 words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment. 

2. REFERENCES: All references must be listed at the bottom of the submission–in APA format. (continued) Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required. Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.

midterm

Please choose any two topics from the list below and create approx. 1 to 1 ½ page essay answering the 2 questions (out of 4).  Be sure to use at least one reference and ensure the paper is in APA format (with in-text citations).  Note: Avoid DIRECT wording from any source, rather rephrase the author’s work and use in-text citations where necessary.

  1. Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models?
  2. List and briefly describe the nine-step process in conducting a neural network project.
  3. What is the main difference between classification and clustering? Explain using concrete examples.
  4. What are the privacy issues with data mining? Do you think they are substantiated?

** Please note you have minimal space and time to complete the assignment, do NOT write an introduction, rather just answer any 2 questions from above.  Paste it in the Editor’s window and save it when you are done.

Secure Windows Applications Policy

Scenario

One of the security improvements for the Always Fresh IT environment is to ensure all workstations and

servers run secure applications. The company needs policies that set security requirements for the

software. These policies will guide administrators in developing procedures to ensure all client and server

software is as secure as possible.

Specifically, you will write two policies to ensure web server software and web browsers are secure. Your

policy statements will describe the goals that define a secure application.

Consider the following questions for web server software and web browsers:

1. What functions should this software application provide?

2. What functions should this software application prohibit?

3. What controls are necessary to ensure this applications software operates as intended?

4. What steps are necessary to validate that the software operates as intended?

Tasks

Create two policies—one for web server software and one for web browser clients. Remember, you are

writing policies, not procedures. Focus on the high-level tasks, not the individual steps.

Use the following as a guide for both policies:

▪ Type of application software

▪ Description of functions this software should allow

▪ Description of functions this software should prohibit

▪ Known vulnerabilities associated with software

▪ Controls necessary to ensure compliance with desired functionality

▪ Method to assess security control effectiveness

Required Resources

▪ Internet access

▪ Course textbook

Submission Requirements

▪ Format: Microsoft Word (or compatible)

▪ Font: Arial, size 12, double-space

▪ Citation Style: Follow your school’s preferred style guide

▪ Length: 1 to 2 pages

Self-Assessment Checklist

▪ I created two policies that addressed all issues.

▪ I followed the submission guidelines.

Weekly Assignment

In this module, we will discuss network forensics. We move away from cellular/smartphone discovery and look at wired and wireless investigation. We will use the European Union Agency for Cybersecurity’s Introduction to Network Forensics guide. The document is available at:

https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/documents/introduction-to-network-forensics-handbook.pdf

For the discussion, answer the following questions:

1) What types of network investigations are typical of those that fall under the topic of network forsensics?

2) How is information acquired from the various types of networks?

3) Describe several tools for network forensics and how the tools function? 

Your response to the DQ must be a minimum of 400 words. You must provide references for your response (APA format). You will need to reply to two (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.

Assignment

 

Complete the following assignment in one MS word document:

Chapter 1 –discussion question #1 & exercises 5, 15 (limit to one page of analysis for question 15)

question 1 – Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources. 

Exercise 5 –  

Go to http://analytics-magazine.org/issues/digital-editions and find the January/February 2012 edition titled “Special Issue: The Future of Healthcare.” Read the article “Predictive Analytics—Saving Lives and Lowering Medical Bills.” Answer the following questions:

What problem is being addressed by applying predictive analytics?

What is the FICO Medication Adherence Score?

How is a prediction model trained to predict the FICO Medication Adherence Score HoH? Did the prediction model classify the FICO Medication Adherence Score?

Zoom in on Figure 4, and explain what technique is applied to the generated results.

List some of the actionable decisions that were based on the prediction results.

Exercise 15:

Find information about IBM Watson’s activities in the healthcare field. Write a report. 

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

I have attached the pdf related to chapter one.

Visio assignent 1

 

1. Read Ch2,watch the videos in Ch2,and see the example in Ch2 folder in Handouts and read the tutorial.

2. Download the attached document and work the instructions.

Please watch these 2 videos that I recorded to show how to use Visio to draw a BPMN diagram:

https://screencast-o-matic.com/watch/cYjYfxmfHD

https://screencast-o-matic.com/watch/cYjYfMmfdg

discussion

Select and discuss one of the four types of visual communication: idea illustration, idea generation, visual discovery, and everyday dataviz from Berinato’s 2016 article.