data analytics, IT

 It is the aim of data analytics to produce accurate predictions that are of great value to clients or constituents . Sometimes however these predictions turn out to be wrong for a variety of reasons. Can you think of a case where data was analyzed and a prediction made that turned out to be a colossal mistake? 

Assignment

 

Complete the following assignment in one MS word document:

Chapter 1 –discussion question #1 & exercises 5, 15 (limit to one page of analysis for question 15)

question 1 – Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources. 

Exercise 5 –  

Go to http://analytics-magazine.org/issues/digital-editions and find the January/February 2012 edition titled “Special Issue: The Future of Healthcare.” Read the article “Predictive Analytics—Saving Lives and Lowering Medical Bills.” Answer the following questions:

What problem is being addressed by applying predictive analytics?

What is the FICO Medication Adherence Score?

How is a prediction model trained to predict the FICO Medication Adherence Score HoH? Did the prediction model classify the FICO Medication Adherence Score?

Zoom in on Figure 4, and explain what technique is applied to the generated results.

List some of the actionable decisions that were based on the prediction results.

Exercise 15:

Find information about IBM Watson’s activities in the healthcare field. Write a report. 

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

I have attached the pdf related to chapter one.

APA format cyber tool paper- 07/19/2020

Create a 2-3 page APA format paper on a cyber tool of your choice. Act as if you are apart of a security team and your task is to inform the rest of the team about a new cyber tool being implemented.

I need this back TODAY.

 Be sure to include:

– the purpose of the tool

-configuration requirements

-what data is gathered by this tool… it has to be useful to a security team

-how will the security team use the data

-why is the tool important to security team

-how is the data analyzed

Discussion and Assignment

 

WEEK 7 – DISCUSSION

In no less than 250 words, describe the difference between a fat AP and a thin AP. What is needed to deploy a thin AP? Are there any security considerations to think about between the 2 different APs?

Week 7 – Discussion

Have you or someone you know ever received a chain letter, phishing message, or some other fraudulent message via email? If so, please share this experience. Explain what type of message it was and what you did to get rid of it.(250 words)

Week 7 Assignment

  • 7.1 What is the basic building block of an 802.11 WLAN?
  • 7.2 Define an extended service set.
  • 7.3 List and briefly define IEEE 802.11 services.
  • 7.4 Is a distribution system a wireless network?
  • 7.5 How is the concept of an association related to that of mobility?
  • 7.6 What security areas are addressed by IEEE 802.11i?
  • 7.7 Briefly describe the five IEEE 802.11i phases of operation.
  • 7.8 What is the difference between TKIP and CCMP?

Methods of Analysis

 Have you ever felt that there is a disconnect between scholarly research and practical application? While this research took place quite a while ago, Parnin and Orso (2011) identified that in thirty years of scholarly research on debugging programming code there were five research papers that included participants to test the theories.

Think about that for a minute. How do you generate research results, without analysis? What constitutes testing the results?

  • For this week’s discussion find a scholarly research article available in the University of the Cumberlands’ library and less than 10 years old.
  • The article you identify must include research that is practically applicable. (The research article must not be theoretical in nature.)
  • The research must include everything you would need in order to repeat the research.
  • The research must include testing the research with participants, other than the authors of the article. For example, the five research articles Parnin and Orso (2011) identify in their research. The participants do not need to be people; they could be parts, equipment, or products.

Once you find this scholarly research article discuss the following in your post:

  • Briefly identify the objective of the research in the selected article.
  • How was the data tested? What are the assumptions of this test? Is that information in the article? Were there enough participants to make the results meaningful?
  • What about this research separates it from research that does not include participants?
  • In the context of the research article, did the use of participants reduce or increase the generalizability when compared to theoretical research? Is that good or bad? Why or why not?

Week 5 Research QUANTITATIVE VS QUALITATIVE

  

Qualitative vs Quantitative

Background: Quantitative data can be measured and documented with numbers. Additionally, quantitative data can be represented as quantities. On the other hand, qualitative data is not measured with numbers, but it is represented by qualities. For example, I use quantitative methods to conduct my PhD research because I like working with counts and measures.

Assignment: Write a research paper the contains at least the following using your own wording.   This must be your own wording.  Reword all the information you gather from all sources. 

Discuss Quantitative Methodology

Discuss Qualitative Methodology

Compare and contrast qualitative data vs quantitative data

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Section, Professor’s name, and Date.

Final Project – Network

Topic –  Network Access Control and Cloud Security 

 The project must be a Word document that is 4-5 pages (double-spaced). Please attach reference.