DM WA-5

 

1. Consider the data set shown in Table 5.20 (439 page). (Chapter 5)

(a) Compute the support for itemsets {e}, {b, d}, and {b, d, e} by treating each transaction ID as a market basket.

(b) Use the results in part (a) to compute the confidence for the association rules {b, d} −→ {e} and {e} −→ {b, d}. Is confidence a symmetric measure?

(c) Repeat part (a) by treating each customer ID as a market basket. Each item should be treated as a binary variable (1 if an item appears in at least one transaction bought by the customer, and 0 otherwise). Use this result to compute the confidence for the association rules {b, d} −→ {e} and {e} −→ {b, d}.

.

2. Consider the transactions shown in Table 6.15, with an item taxonomy given in Figure 6.15 (515 page). (Chapter 6)

(a) What are the main challenges of mining association rules with item taxonomy?

(b) Consider the approach where each transaction t is replaced by an extended transaction t_ that contains all the items in t as well as their respective ancestors. For example, the transaction t = { Chips, Cookies} will be replaced by t_ = {Chips, Cookies, Snack Food, Food}. Use this approach to derive all frequent itemsets (up to size 4) with support 70%.

(c) Consider an alternative approach where the frequent itemsets are generated one level at a time. Initially, all the frequent itemsets involving items at the highest level of the hierarchy are generated. Next, we use the frequent itemsets discovered at the higher level of the hierarchy to generate candidate itemsets involving items at the lower levels of the hierarchy. For example, we generate the candidate itemset {Chips, Diet Soda} only if {Snack Food, Soda} is frequent. Use this approach to derive all frequent itemsets (up to size 4) with support 70%.

3. Consider a data set consisting of 220 data vectors, where each vector has 32 components and each component is a 4-byte value. Suppose that vector quantization is used for compression and that 216 prototype vectors are used. How many bytes of storage does that data set take before and after compression and what is the compression ratio? (Chapter 7) 

Paper

 

1. The Physical Model was based on the idea that people did not really understand the work involved in the digital forensics world or how to treat it in court. With all the crime dramas on television, the average juror may now think that everything can be resolved in 60 minutes and is based on perfect DNA physical evidence and the digital “smoking gun” always found on the criminal’s computer.  

How would you tailor your approach and reporting to address the fact that the jury may now think that without 100% conclusive evidence, the person should not be found guilty?  Please avoid discussions about the presumption of innocence or a position that circumstantial evidence is never sufficient to find someone guilty.  This discussion is for you to consider how you would convince someone that your circumstantial evidence is sufficient and how to counter the idea that perfect evidence is always available.

Your word count should be between 250-300 Words

2.  Here is a case regarding computer forgery and how digital forensics was able to prove the underlying file was indeed forged.  https://nakedsecurity.sophos.com/2019/01/17/telltale-font-scuppers-bankruptcy-trust-claim/  

Basically, the document claimed to be created (and a printed copy signed and dated as proof, at a time before the fonts used in the document were available.

For this discussion, write 200-250 words on your opinion of this case.  Can you think of other digital artifacts that could be used to prove that a computer file is not what it claims to be?

Exp19_Excel_Ch04_ML1_Pet_Supplies

  

Project Description:

You are the inventory manager for Crafton’s Pet Supplies. You are currently preforming analysis to determine inventory levels, as well as the total value of inventory on hand. Your last steps will be to check the report for duplicate entries and format for printing.

blockchain implementation

Contrasting local and public test blockchains Contrasting local and public test blockchains.

In chapter 4, the author discusses different options for testing blockchain applications. For our course, we have chosen to use Ganache, a local test blockchain. Explore some of the advantages and disadvantages of using local and public blockchains to test apps and contrast the two options.  

Database homework

1Draw the corresponding ERD for the following Employee Database

2Normalize the following Schema with the given functional dependencies into BCNF
3Explain in your own words why the Student-Dept relation is not in 4NF. Then, convert the Student-Dept relation in 4NF. Also, provide the justification for each step you perform during normalization (4NF). Note: The SportActivity here means any sport a student is participating in. For example, a student with ID = 123 can participate in soccer and badminton
4In your own word, explain why do designers use Denormalization? What is the limitation of using Denormalization? Name and explain a better alternative approach than Denormalization.
Preview the document

read the articles and answer the following question.

1. Read the attached article “Why the Future Doesn’t Need Us”Preview the document by Bill Joy. Appeared in Wired, issue 8.04, April 2000;
2. Read a summary of Professor Peter Singer’s lecture on ethics and technology; (Links to an external site.)

3. Read Tech Ethics Issues We Should All Be Thinking About In 2019 (Links to an external site.).

4. Write a paper containing answer to the following questions. Your paper should present your understanding of ethical dimensions and unintended consequences of technology.

  • What do you strongly agree with in the articles? and Why? (20 points)
  • What do you disagree with in the articles? and Why? (20 points)
  • What kind of person Bill Joy seems to you, an idiot, a Luddite, or a genius? and Why? (5 points)
  • Are the assumptions in both the articles sound? (5 points)

Requirements:

Please make your analytic points specific; The paper cannot be just a collection of generalities and cannot contain too many direct quotes from the articles. Find something interesting to say. Reference any ideas that are not your own in APA format.

The paper should be at least 1 page but no more than 2 pages long, single line spacing, use a font size of minimum 10 points but no larger than 12 point. Set margins to 1 inch on all sides. Use correct grammar.

Save your paper in a Word document and name it as P4_FL.docx where FL are your first and last name initials. Use the link Assignments -> Project 4 to submit your document.

emerging threats and measures discussion

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

At least two scholarly sources should be used in the initial discussion thread. Use proper citations and references in your post.

Forensics

 A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all of these skills are necessary? Please explain. 

Tres

1.  BCP Scope – Submit a brief description for feedback (one page or less) of the topic areas to be covered in the BCP.

2.  Business Impact Analysis – use template 

3.  Key Resources and Stakeholders – use template

4.  Preventive Controls List – write a description of the preventative controls that you considered in the previous step

5.  Viable Recovery Strategies – to create a drawing or descriptive list that follows both options to each decision of “yes” or “no” or “success” or “failure” to the reconstructive effort.

6.  Contingency Plan – steps 9 thru 11

7.  Business Continuity Plan 5-7 pages