Presentation

  Make a presentation on project stakeholder management including below topics.

•Identifying stakeholders

•Planning stakeholder engagement 

•Managing stakeholder engagement

•Monitoring stakeholder engagement

Applications and recommendations on Information technology project management topic

Data management paper

This needed within 8 hours. It a computer assignment with lots of queries and tables. Only experienced writer needed to do this within 7 hours.

Preview the document

Data Science and Big Data Literature Review Test

 

Data Science and Big Data Literature Review Test

Submit Assignment

  • Due Sep 17 by 11:59pm
  • Points 11
  • Submitting a file upload
  • Available after Sep 1 at 12am

Data Science Literature Review Test

INF 160 Introduction to Data Science

About the test:

  • Total points: 100 (carries 11% of the final grade)
  • Each question worth 20 points 
  • Must answer all question to achieve a maximum of 20 points each
  • Each answer must contain a minimum of 300 words. 
  • Submit responses as a word document in Canvas Assignment page. 

Questions:

  1. Define data science and big data in your own words. Why data science and big data matters?
  2. Write down some applications of data science/big data in the real world.
  3. What are the five “V”s of big data? Explain those. What is the process of data science research/project?
  4. What are some challenges of big data research? Explain those. 
  5. How do you intend to prepare yourself as a data scientist? Explain some areas of data science you will use in your foreseeable professional life as a data scientist. 

Helpful Articles:

discussion

 

“Social Media and Behavior Interaction”  Please respond to the following:

  • Interacting and communicating with other people is part of daily life. This includes face-to-face conversations, conversations over the phone or other mobile devices, and conversations through social media. Read the article titled, “Is social media ruining our kids’ social skills?” Provide your opinion on the effect that texting and social media (i.e., Twitter, Snap Chat, Facebook, etc.) are having on individuals’ abilities to articulate a face-to-face conversation. Support your opinion with one (1) example from your personal experience or an incident in the media.
  • Emotional interaction is a behavioral reaction that is reflected by an individual’s feeling when interacting with technology. Examine the effect that the visceral design of a laptop has on an individual’s behavioral response compared to the effect that the visceral design of a smartphone has.

Forensics

1.Go online and research some tools that would be valuable in collecting both live memory images and images of various forms of media. Put together a shopping list for your manager that includes tools needed to be purchased. Include a price if applicable. (300 words) 

Chapter 7 ppt 

2. Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved. (300 words)

Chapter 8 ppt

Operational Excellence – Paper

ITS 631 Paper #1 (Chapters 1 – 5 Bourgeois)    Niccole Hyatt, PhD Professor

100 Points Possible  Open Textbook and Resources

Individual Effort Only!

APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique reference (per question) regardless of how many times it is used. All references should be from the years 2010 to present day.

Review the rubric that will be used to evaluate this paper. All work must be completed individually.

1. Explain the Internet of Things. Use at least three unique references. Length: 4-5 paragraphs. 

2. Identify three security risks of open source software. How can they be overcome? Use at least three unique references. Length: 4-5 paragraphs.

3. What are the advantages of using a data warehouse? What are the disadvantages? Use at least three unique references. Length: 4-5 paragraphs. 

4. Explain VoIP.  Use at least three unique references. Length: 4-5 paragraphs. 

5 Pages 

find two different recent (within 2 years) articles

  • Using search engines find two different recent (within 2 years) articles involving data mining. Describe the role of “data mining” in the story using your own words.

Be sure to list both of your references in correct APA format and cite each reference at least once, but as many times as you rely on it. Citations support each sentence relying on a reference, not an entire paragraph.

Initial posts need to be 250 words.

2 Replies need to be 150 words.

country Presentation to the Board of Directors

 

Assignment Content

  1. Based on readings in Rising Powers, Global Governance, and Global Ethics and related discussions, choose 1 of the countries or regions from the book into which your company might wish to expand. 

    Develop a 1-to 2-page table using either Microsoft Word, PowerPoint, or Excel that accurately compares your U.S.-based company’s ethics, based on classical ethical theory as well as its ethical stance on privacy, protection of intellectual property, and protection of PII to those within your country of choice. The column headings are “U.S.-based Company” and “Country of Choice.” The row headings are “Classical Ethical Theory,” “Privacy,” “Protection of Intellectual Property,” and “Protection of PII.”

    Create a PowerPoint presentation containing 8 to 10 slides for your corporate Board of Directors logically depicting at least 3 ethical challenges you might anticipate along with a policy statement for each. Include research concerning the country’s stance on issues, such as privacy, protection of intellectual property, corruption index, major religions, or indigenous tribal groups in the speaker notes.

    Include supportive graphics and appropriate backgrounds and styles. All references need to adhere to APA guidelines, and images should not be copied unless you obtain author permission or use copyright-free images.

    Note: You may use other applications like Adobe® Spark®,, Microsoft® Sway®, or Mix instead of PowerPoint.

    Submit your assignment.

Network Security

  

Questions for the Lab

1. Carefully read the lab instructions and finish all tasks above.

2. If a packet is highlighted by black, what does it mean for the packet?

3. What is the filter command for listing all outgoing http traffic?

4. Why does DNS use Follow UDP Stream while HTTP use Follow TCP Stream?

5. Using Wireshark to capture the FTP password.

Questions

 

Answer the following research questions (25 points each) using external references.  APA must be followed.  

1. What are the three sensing device categories and their specific purposes and how would you apply them based on your experience or expert recommendations?

Guidelines: Sensing device categories include those for perimeter protection, area/space protection, and object/spot protection.

2.  How is the type of alarm transmission/signaling system used in a particular application determined and how would you apply them based on your experience or expert recommedations?

Guidelines: The location  of the business or residence, the frequency of police patrols, and the ability of the customer to afford the cost all help determine what type of alarm transmission/signaling system is used.