Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use.

 Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.  

 Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

R – Tidyverse – Dplyr – pipe %>% – Answer needed today

You will need to download the R studio, tidyverse, and associated packages if you don’t already have them.

Q3. 

In this exercise you’ll use R package tidyverse (see chapter 4 of Introduction to Data Science Data Analysis and Prediction Algorithms with R by Rafael A. Irizarry. You need to go through chapter 4 before attempting the following questions. Using dplyr functions (i.e., filter, mutate ,select, summarise, group_by etc. ) and “murder” dataset (available in dslab R package) and write appropriate R syntax to answer the followings: 

a. Calculate regional total murder excluding OH, AL, and AZ (Hint: filter(! abb %in% x) # here x is the exclusion vector) 

b. Display the regional population and regional murder numbers. 

c. How many states are there in each region? (Hint: n ()) 

d. What is Ohio’s murder rank in the Northern Central Region (Hint: use rank(), row_number()) 

e. How many states have murder number greater than its regional average (Hint: nrow() ) 

f. Display 2 least populated states in each region (Hint: slice_min() ) 

Use pipe %>% operator for all the queries. Show all the output results  

Data Science and Big Data Analytics – Bitcoin

  

For this week’s research paper, you need to search the Internet and explain the following:

1. Why are some businesses are accepting and other businesses are rejecting the use of Bitcoins as a standard form of currency? Compare and contrast this with other cryptocurrencies. Your paper needs to identify two major companies that have adopted Bitcoin technology.

2. Take a position, either 1) cryptocurrency is a fad that will fade, or 2) cryptocurrency is a legitimate representation of wealth that will persist and grow. There are rigorous resources available on either side of the argument to lend credibility to your case. Regardless of your choice, clearly state 2-3 factors succinctly.

Paper should meet the following requirements:

• Be approximately 4- 5 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations.

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

dmdis1

 

  • Using search engines and find two different recent articles involving data mining. Describe the role of “data mining” in the story using your own words.

Comparison Outline

 Software engineering tools for soft computing: MATLAB, R Tool and DTREG.  Comparison should focus on how they are able to model neural networks.  Also, pick criteria that compares things they all have in common. 

PS: The outline should look like the sample attached

Response

Your responses to other students must be more than a simple “Good job” or “I agree with your post”. They must also not just be “Let me add to your post…” Instead, your responses to each other should do three things:

1. Acknowledge the other student’s post with some form of recognition about what they posted
2. Relate their posting to something you have learned or are familiar with
3. Add to the conversation by asking additional questions about their post, or discussing their topic further

Remember, this is a discussion forum. Your engagement with each other should be similar to how you would speak with each other if you were seated at the same table talking. Plagiarism in the discussion will not be tolerated.

Ethical Hacking

Select one network scanning software tool (there is a list in your required reading slides) and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up.