Into to data mining

 submit your topic and references, in APA format of preliminary  references that you will use when completing your final semester  research paper. 

 

Provide the title of your term paper (note: you may change the  wording in the official title in the final version however, you cannot  change the topic once you select one)

Include an introduction on the topic

A minimum of 3-5 references in proper APA format

2 pages and 3 presentation slides

It’s a paper on Kronos and my part is below:

I need 2 pages and 3 presentation slides on the same topic.

Why are their solutions good for consumers and the business? i. Describe any policies that they have for their customers, suppliers, shareholders, employees, and society at large. Are there any conflicting policies?

Let me know in case of any additional questions.

Java Assignment

Look at the file for complete instructions. You are basically making 3 java programs to get an intended outcome. Each program has instructions. 

Data visualization

 

Data: Basic Data Analysis in RStudio

Background: This course is all about data visualization. However, we must first have some understanding about the dataset that we are using to create the visualizations. A resource is provided to you to learn the simple commands in RStudio. You are also expected to locate appropriate available resources to learn the functionalities of RStudio. 

Assignment:

  • Use RStudio to generate a word document with basic data analysis of the following dataset:  dataset_price_personal_computers.csv  
  • Use the following video from Dr. Francis to learn the simple commands to conduct basic data analysis with RStudio:  Basic Data Analysis in RStudio.mp4
  • Questions/Requests:
  • Create a summary of stats for the dataset. (provide a screen shot)
  • Create a correlation of stats for the dataset. (provide a screen shot) (Hint: Transform may be needed)
  • What is the Min, Max, Median, and Mean of the Price? (provide a screen shot)
  • What is the correlation values between Price, Ram, and Ads? (provide a screen shot)
  • Create a subset of the dataset with only Price, CD, and Premium. (provide a screen shot)
  • Create a subset of the dataset with only Price, HD, and Ram where Price is greater than or equal to $1750. (provide a screen shot)
  • What percentage of Premium computers were sold? (provide a screen shot)(Hint: Categorical analysis)
  • How many Premium computers with CDs were sold? (provide a screen shot)(Hint: Contingency table analysis)
  • How many Premium computers with CDs priced over $2000 were sold? (provide a screen shot)(Hint: Conditional table analysis)

Your document should be an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

Submit your assignment on or before the due date.

final project objective alignment

   attached – 

Because this project is a demonstration of the skills that you have learned throughout your time here at Herzing University, your project should have addressed each of the program outcomes. Describe, in detail, how your completed project meets each of these specific course outcomes. Each objective should be addressed in one or two complete paragraphs. 

1. Apply industry standards to the implementation and support of network systems and computer devices. 

2. Demonstrate the principles of information technology security. 

3. Express relevant information to technical and nontechnical audiences

4. Design secure network infrastructures for physical and virtual environments

5. Create information technology solutions based on business needs or requirements. 

Test and Validation Scheme

 

Cybersecurity is a daily process. As an organization continues to evolve, making sure  the security is continuously protected effectively against the latest  threats is important. 

Create a matrix of requirements with pass/fail criteria based on the organizations framework controls. Make sure to include:

Refer  to “Cybersecurity Test and Validation Scheme Scoring Guide,”  prior to beginning the assignment to become familiar with the expectations for successful completion and please use your previous work to build off of for the following.

  1. Five  technical controls specified within your guiding framework. If your  guiding framework does not have technical controls enumerated, use NIST  Special publication 800-53 and select technical controls appropriate for  your organization.
     
  2. Using your design/architecture, create test cases for each of the five technical controls that are appropriate for your design.
     

cc

 

Write at least 500 words analyzing a subject you find in this article. Why is the future of computing in the cloud? Consider the concept of fractional ownership.  

Please use the article mentioned:  https://blog.turbonomic.com/blog/on-technology/cloud-elasticity-vs-cloud-scalability 

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due.