paper work

 

W3: Paper

Graded Assignment:  Knowledge and Skills Paper

Paper Section 1: Reflection and Literature Review

Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 5 and 6.  This section of the paper should be a minimum of two pages. 

Paper Section 2:  Applied Learning Exercises

In this section of the professional paper, apply what you have learned from chapters 5 and 6 to descriptively address and answer the problems below.  Important Note:  Dot not type the actual written problems within the paper itself.

  1. Examine how new data-capture devices such as radio-frequency identification (RFID) tags help organizations accurately identify and segment their customers for activities such as targeted marketing. Many of these applications involve data mining. Scan the literature and the Web and then propose five potential new data mining applications that can use the data created with RFID technology. What issues could arise if a country’s laws required such devices to be embedded in everyone’s body for a national identification system?
  2. Survey and compare some data mining tools and vendors. Start with fairisaac.com and egain.com. Consult dmreview.com and identify some data mining products and service providers that are not mentioned in this chapter. One of my favorites to explore is RapidMiner found at https://rapidminer.com/ and an educational license option can be found at:  https://rapidminer.com/educational-program/
  3. Explore the Web sites of several neural network vendors, such as California Scientific Software (calsci.com), NeuralWare (neuralware.com), and Ward Systems Group (wardsystems.com), and review some of their products. Download at least two demos and install, run, and compare them.
  4. Important Note:  With limited time for a college class, perfection is not expected but effort to be exposed to various tools with attempts to learn about them is critical when considering a career in information technology associated disciplines.

Important Note:  There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.

Paper Section 3:  Conclusions

After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward.  This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.

Paper Section 4:  APA Reference Page

The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.

Literature Review

Make a SLR paper from the below search terms

Analyzing visualizing data  social  in google scholar use the below link to view the results.

https://scholar.google.com/scholar?hl=en&as_sdt=0%2C48&q=%22Analyzing%22%22Visualizing%22%22data%22%22social%22&btnG=

Requirements:

from those you found in your search, you will start looking for which ones to include in your results and which ones to exclude. For example, for sure some of those papers will not be relevant to what I am searching for, in our case, many you will not be able to even download, so I will say, just collect 50 papers on average that are relevant and start your summary of analysis.

If 50 papers, is too much, SLR is not about reading those papers but collecting some statistics about them.

Attached sample SLR papers format. You can make a similar paper with APA format and citations. NO plagiarism.

Images

Excel 2019 In Practice – Ch 5 Independent Project 5-4

 

Wilson Home Entertainment Systems monitors cash flow at their individual locations separately and consolidates data. After the summary is complete, you insert hyperlinks to each of the supporting worksheets.

[Student Learning Outcomes 5.1, 5.4, 5.6, 5.7, 5.8]

Files Needed: WilsonHome-05.xlsx (Available from the Start File link.) and WHES.png (Available from the Resources link.)

Completed Project File Name: [your name]-WilsonHome-05.xlsx

Skills Covered in This Project

  • Group and format worksheets.
  • Create a static data consolidation with SUM.
  • Insert a picture from a file.
  • Insert a hyperlink.
  • Copy a hyperlink.
  • Encrypt a workbook with a password.
  1. Open the WilsonHome-05 start file. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  2. Group all the worksheets.
  3. Edit and format grouped sheets.
    1. Select cells A1:B2 and click the Launcher in the Alignment group [Home tab]. Choose Center Across Selection from the Horizontal list and click OK.ImagesFigure 5-76 Consolidate dialog box for cash flow
    2. Click the Launcher in the Page Setup group [Page Layout tab] and click the Margins tab.
    3. Choose Horizontally from the Center on page list and click OK.
    4. Edit the contents of cell A10 to read Cash paid for marketing.
    5. Select cell A1 and ungroup the sheets.
  4. Select the CashFlow sheet.ImagesFigure 5-77 Image positioned as title
  5. Build a static data consolidation for the Cash flow from operations section.
    1. Select cells B4:B12.
    2. Use SUM to consolidate the data from the three location sheets without links. (Figure 5-76).
  6. Build a static data consolidation for the Cash flow from banking and investment section in cells B15:B21. Delete the references in the Consolidate dialog box and use SUM as the function.ImagesFigure 5-78 Hyperlink text to switch to Cash Flow sheet
  7. Build a static data consolidation for the Cash balance at the beginning of the quarter amounts in cell B24 with SUM as the function.
  8. Insert a picture from a file.
    1. Delete the contents of cell A1 on the CashFlow sheet.
    2. Click cell D2.
    3. Click the Pictures button [Insert tab, Illustrations group].
    4. Find and select WHES from your student data files.
    5. Click Insert. The picture is placed at a default size.
    6. Click the Height box [Picture Tools Format tab, Size group].
    7. Type 1.2 to replace the default height and press Enter.
    8. Format the height of row 1 to 86.25 (115 pixels).
    9. Point to the logo frame to display a move pointer.
    10. Drag the image to appear in cell A1 as a main label for the worksheet (Figure 5-77).
    11. Click cell D2 to deselect the image.
  9. Insert and copy a hyperlink.
    1. Click cell C3 on the Peoria worksheet.
    2. Create a hyperlink that displays Total Cash Flow and switches to cell A1 on the Cash Flow worksheet (Figure 5-78).
    3. Right-click cell C3 and choose Copy from the menu.
    4. Select the Champaign sheet tab and paste the hyperlink in cell C3.
    5. Select the Rockford sheet tab and paste the hyperlink in cell C3.
    6. Select the Peoria sheet, and press Esc to remove the copy marquee if it is still visible.
    7. Select cell C5 and then click the cell with the hyperlink to test it.
  10. Save and close the workbook (Figure 5-79).
  11. Upload and save your project file.
  12. Submit project for grading.

Week 5 Assignment

 

Please select a topic from the below list and create a one-page essay answering the question noted below.  Please use at least one reference and ensure it’s in APA format (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author’s work and use in-text citations were necessary.

1. List and briefly describe the process you would take to conduct test the security of a firewall?

2. How does the management of network security affect its implementation? What components are needed to ensure proper network security management of an environment?

3. Name two VPN deployment model and architecture? What is the best model/architecture for an on-perm environment, cloud environment, and hybrid environment (on-perm/cloud)?

** Do NOT write an introduction, rather just answer the question noted above **

Note: The essay should be one-page at most (double spaced) and should include an APA cover page and at least two reference (academic or professional literature) in APA v7 format.

CC Week 8 D

 Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter 9  (Jamsa, 2013).

Chapter 9 topics:

  • List the security advantages of cloud-based solutions.
  • List the security disadvantages of cloud-based solutions.
  • Define and discuss the data wiping process.
  • Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
  • Define and discuss hyperjacking attacks.
  • Define and discuss guest-hopping attacks.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.   

linux

1.  For this discussion topic you need to apply the things that you have read and come up areas of enterprise that docker would be most useful for. 

2. As you have learned from your reading Docker is available for many platforms and in many forms.  Your assignment is to research containerization solutions that are competitors to Docker and compare and contrast them.  You should find at least two competitors and investigate their features compare and contrast them and see where each of them have advantages. 

3. For this discussion topic you need to apply the things that you have learned throughout the course.  Consider all of the virtualization topics that have been covered and discuss how you see the role of virtualization moving forward in the enterprise. 

4. For this assignment you are going to research various orchestration options and evaluate them to see which ones you think would add value to a business.   You should as part of this assignment develop a method to objectively evaluate the platforms and the arrive at a conclusion using your method.  Make sure to justify the components of your decision making process while you explain them.  

5. you are expected to do research and post your findings on the pros and cons of cloud computing 

Ethical Hacking week 2

 

Wk 2 Research Assignment

Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.Your assignment should be 3-4 paragraphs in length. 

Assignment

Discussion 1 :   List and briefly describe the nine-step process in con-ducting a neural network project.

 Discussion #2: List and briefly explain different learning paradigms/ methods in AI.

 Discussion #3: What is representation learning, and how does it relate to machine learning and deep learning?