Case Study

Ready the attached case study and answer the 5 Discussion points at the bottom. Each discussion point should be answered with a minimum of 150 words with two references attached. There should be no plagiarism- attach a plagiarism report with 0% similarity index.   

Debug and Fix Four Compile Time Errors

 

Debug and Fix Four Compile Time Errors

Review the resources and instructions in the Discussion Prep Study before completing this discussion.

For this discussion, you practiced debugging a Java program that does not compile and fixing it so that it compiles without errors. The program is to read in an integer value and then determines if the value is a multiple of 5 number, an even number, or neither. But the program has four compile errors.

  • Identify these compile errors and propose remedies for each compile error. Note that these errors are compile errors and are not runtime or program logic errors.
  • Provide a screenshot of your result of your work. (See the example in the “Four Compile Errors Results” resource.)
  • Explain, briefly, how you completed this exercise, the major issues you faced, and how you solved them.
  • Reflect on your experience and what you learned.

Assignment -4

 

This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:

How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations? How does this impact data management within organizations? 

How does servant leadership assist with transferring knowledge in an organization? 

When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

• PROJECT QUESTION (Subject : Introduction to data mining ) (deadline : 15 hours)

  

  • PROJECT QUESTION (Subject: Introduction to data mining ) ( Summarize and write the paper ***(APA formatting, ~2000 words ABOVE )****
    • The Process to be followed:
      • Decide what will be the research topic ( paper sources        provided below )
      • Find online 4-5 papers: you have to read the Abstract section only.
      • Narrow them down to 2 papers: you have to read the        Introduction section only
      • **((* Select only 1 Paper: and read the        whole paper
      • summarize:
        • What is the problem of the paper
        • Previous solutions
      • summarize:
        • Proposed Solution 
        • Model
      • summarize:
        • Testing / Proves / Experiments
      • summarize:
        • Results analysis
        • Conclusion ))*** 
        • Note:** (if possible try to Include         Tables and Pictures with *proper references where ever is needed in the         whole paper ))**
    • Read the whole paper 
    • Follow/read references to other       mentioned papers
    • Go through it thoroughly
    • Plan/Tasks
    • Summarize and write the paper ***(APA formatting, ~2000 words ABOVE )****

(( PPT PowerPoint Presentation : 12 slides including Conclusion )).

Papers Sources:

· https://www.kdd.org/kdd2019/accepted-papers

· https://www.kdd.org/kdd2018/accepted-papers

· https://www.kdd.org/kdd2017/accepted-papers

· https://scholar.google.com/scholar?start=10&q=data+mining+papers&hl=en&as_sdt=0,24&as_vis=1

· https://storm.cis.fordham.edu/~gweiss/selected-papers.html

· http://www.academia.edu/Documents/in/Data_Mining

· https://www.kdnuggets.com/2017/04/top-20-papers-machine-learning.html

Cyber Security planning&mgmt week 11

 

Internet Research – Wk 11

In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.

HIPAA

 

Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.  

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

Discussion

 After reading chapter 6, analyze the structure of advanced encryption standards and why it makes them so strong. You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted