Business Intelligence

  

Complete the following assignment in one MS word document:

Chapter 1 –discussion question #1 & exercise 15 (limit to one page of analysis for question 15)

Chapter 2 – discussion question #1 & exercises 4, 5, and 15(limit to one page of analysis for question 15)

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Chapter 1

Discussion 1) Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources

Exercise Q) Find information about IBM Watson’s activities in the healthcare field. Write a report.

Chapter 2

Discussion 1) Discuss the difficulties in measuring the intelligence of machines.

Exercise Q4. In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. (Note: This is a class project.) 

5. Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.

15. Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recognition product.

Web Technologies, Use of Social Media in Business

Overview:

Congratulations! You have been hired as the IT manager at the local hospital; the job

you applied for in the previous unit. Part of your 60-90-day plan is preparing a presentation for the executive board.

Instructions:

Your IT director asked you to prepare a 5-6-page PowerPoint presentation where you

explain the following concepts:

1) The functionality of various web technologies: HTML, XML, XHTML, CSS, etc.

And how they could be used to improve the Hospital’s website?

2) Your hospital is currently ranked as second in your region, how can better use of

social media as part of the hospital’s web strategies improve its position?

3) Part of the low-ranking came from a breach on the hospital’s website.

a. How can we remediate this from happening again?

b. Why are we not safe and immune from online annoyances such as spam and adware?

c. How can we further secure our system from malware?

Requirements:

• This assignment is a PowerPoint presentation consisting of 5-6 slides, using APA

formatting and citations.

• Include two references.

Be sure to read the criteria by which your work will be evaluated before you write

and again after you write.

Security breach

Review a Security Breach which occurred over the past year and present a research paper providing the below point!! 

Describe the incident

Provide Specifics about the incident.

What data or information was impacted?

Describe threat modeling techniques which could have assisted in the mitigation of breach.

How can the organization be better postured for future attacks?

This assignment should be in APA format and have to include references and 650 words

Access control Assignment 11

Discuss the best practices for implementing an access control system.

Length, 2 – 3 pages.

All papers are written in APA formatting, include title and reference pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

Discussion (Chapter 6):

 List and briefly describe the nine-step process in con-ducting a neural network project.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.

Your response should be 100-300 words. Respond to two postings provided by your classmates.

discussion

 What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents. 

Digital Forensics Tools&Tech

 

Week Nine Assignment

Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved.

Use your own words and do not copy  the work of another student.

Attach your WORD document here.

Assignment

FORENSIC DESIGN ASSESSMENTS

This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the composition choices:

  1. Start by identifying all the applications of colour deployed, listing them under the headers of 1) project composition, and 2) chart composition
  2. How suitable are the choices and deployment of these composition properties? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential composition approaches, what would you do differently or additionally?

Assignment Link: http://book.visualisingdata.com/chapter/chapter-10

Assignment Requirements: At least 500 words in length

References: At least two peer-reviewed, scholarly journal references.

Cloud computing and digital forensics – Week 8

Week 8 Discussion(500 words)

Discuss in 500 words or more  federated architecture in cloud systems. Remember that this is a cloud class not a database class. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Week Eight Assignment(250-300 words)

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.