week 12 paper

What is recommendation systems. Follow this up with the analysis of benefits of recommendation systems to:

(a). Customers, and

(b). Sellers.

I need 300 words and 2 references, APA format, Plagarisim report as well

Data Analysis

https://lionbridge.ai/datasets/10-open-datasets-for-linear-regression/
– https://careerfoundry.com/en/blog/data-analytics/where-to-find-free-datasets/
OR ANY REPUTABLE SOURCE OF DATA.
Write a 2 page (minimum) paper.  In the paper, define the problem that you are analyzing.  What is the question that you want to be answered from the data?  What is your hypothesis?
25%:  Analysis of the dataset (explain the data and also perform a statistical analysis).  Speak to which features you kept and why. 
25%: Use the techniques learned in this class and discover at least 1 “AHA” in the data.  By that, I mean that I expect you to discover a relationship between two variables or an INSIGHT into the data.  Explain your findings.
25%: Define which visualization(s) you choose to use and why you chose them.  I expect the visualizations to be professional and readable by themselves without references to anything else.  (I am not going to be looking through your data to try to understand your visual).  Attach your visuals to the end of the document.  Create a Tableau Story that combines your visuals and provide the link to it in the document.
15%: Summarize your work from a social or business perspective.  Why is this important?  How could this insight be used to make a difference?
CITE YOUR SOURCES and add them to the end of your paper.  (I recommend citefast.com.  You can cite all of your sources there and export to word and just add it to the end of your paper.)
In summary – you will turn in:
A 2-page Analysis
A page (or 2) of Visualizations
A list of your sources/references

Vehicle Insurance management system project(OOAD)

  

The project documentation should include the following sections: 

• Title of the project (with the list of project team members); 

• Executive Summary; 

• Table of Contents; 

• Introduction; 

• Project Plan; 

• Functional Specifications (including descriptions of Actors/Roles; Business Rules; Use-Case 

Diagrams with Use-Case descriptions; Examples of Class Diagrams (related to particular Use 

Cases); Examples of Object Diagrams [related to the selected Class Diagrams]; Examples of 

Sequence Diagrams; Examples of Collaboration or Communication Diagrams; Examples of StateChart Diagrams); 

• Functional Tests Plan; 

• System Design Specifications (including System Architectural [Layered, “Physical”] Design Scheme selected; Package Diagram [populated with interrelated classes]; Database Tables; Entity-

Relational diagrams; Window Navigation Diagrams; Drafts of User Interfaces; and Examples of System-Response Report Forms); 

• Integration Tests Plan; 

• Issues to Future Studies; 

• Conclusion; 

• References; 

just need R language commands

 Using dplyr functions (i.e., filter, mutate ,select, summarise, group_by etc. ) and “murder” dataset (available in dslab R package) and write appropriate R syntax to answer the followings: 

a. Calculate regional total murder excluding OH, AL, and AZ (Hint: filter(! abb %in% x) # here x is the exclusion vector) 

b. Display the regional population and regional murder numbers. 

c. How many states are there in each region? (Hint: n ()) 

d. What is Ohio’s murder rank in the Northern Central Region (Hint: use rank(), row_number()) 

e. How many states have murder number greater than its regional average (Hint: nrow() ) 

f. Display 2 least populated states in each region (Hint: slice_min() ) Use pipe %>% operator for all the queries. 

Just need R Language commands for a,b,c,d,e,f. 

Access control discussion 14

Discuss the major components of information assurance.

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly cite the references.

Security Architecture – Discussion

Question A

  • In your own words explain why security architecture is important to an organization? and what does an assessor need to understand before she or he can perform an assessment?

Question B

Each week, research a unique news story or article related to Information Security/Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.

500 words

APA Format

SQL

Answer the following question:

SQL is a pervasive querying language. While there is one primary SQL dialect that all SQL RDBMS implementations must support, and that’s ANSI SQL, each database platform comes out with its own context. Each of these dialects has its own  DDL (Data Definition Language). DML (Data Manipulation Language). and DQL (Data Query Language). Other than for marketing purposes (to sell the product as unique), what is the value of creating a new variation of a SQL dialect. 

Provide an example of one SQL dialect as part of your write-up. 

Instructions:

This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 

You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.

Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.

Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.

Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

EH Week 1

 

The Benefits of Learning Ethical Hacking (Posted in Penetration Testing on August 29, 2018)

https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/

When Ethical Hacking Can’t Compete

https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/

 Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment. 

Assignment

 

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).

In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.