Data midis-1

Using search engines and find two different recent articles involving data mining. Describe the role of “data mining” in the story using and why the data mining is important your own words (at least 200 words for each URL). Be sure to cite your sources. 

on time delivery.

plagiarism free.

Database Exam due tommorow

Final Exam Summer 2020:

This exam consist of 3 parts. This is Part 1. Write your answer in one pdf or docx format or type them here.

I. Assuming the schema for a database,

employee (employee-name, street, city)
works (employee-name, company-name, salary)
company (company-name, city)
manages (employee-name, manager-name)

give SQL queries for the following questions, assuming a person can have more than one job and a company can exists in more than one city:

1) A list of the names of those employees who work for the Google.

2) A list of the names and cities of residence for those employees who work for Google.

3) A list of the names, streets and cities of residence for those employees who work for Google and earn more than $250000 a year.

4) A list of the names of those employees who live in the same city as the company for which they work.

5) A list of the names of those employees who live in the same city and on the same street as their managers.

6) A list of the names of those employees who do not work for Google.

7) A create statement for the table works, including the keys.

Part 2

Final Exam Summer 2020:

This exam consist of 3 parts. This is the 2nd part Write your answer in one pdf or docx format.

II. Write a 1200-2000 words essay about the attribute closure algorithm studied in slides, reproducing the algorithm and describing it line by line with its logic and applications to the detection of candidate keys. The essay should contain the following sections:

a) Motivation

b) The algorithm reproduced from slides

c) A line by line description of its logic and complexity

d) Exemplify computing the attribute closure (C,D)+ for the following problem:

  R=(A,B,C,D,E)

  F={B->A; C->A; DE->AC; E->B }

e) Exemplify the process of finding  and proving a candidate key for the problem at (d)

f) Describe applications of the algorithm to other problems

part 3 

Final Exam Summer 2020:

This exam consist of 3 parts, this being the 3rd part, and is personalized. Write your answer in one pdf or docx format.

III. Write a 1000 word essay, reproducing the corresponding algorithm or definition and describing it line by line with its logic and applications, for the following personalized topic (find the topic associated with your name).

*Functional Dependencies closure*

week-2

 

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).

In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

 

Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Cloud Computing week 4

Discussion Topic:  

Define and describe both SSO and IDaaS(Identity as a service).

Paper:  

For week 4, you will write a paper on SAML and FIDM. The following are the items to discuss in the paper:

  • Define SAML and describe its purpose.
  • Define and describe provisioning.
  • Define and describe FIDM.
  • List factors that make mobile ID management difficult.

Paper requirements:

  • Minimum 900 words (excluding title page, table of contents, and references pages)
  • Minimum of 3 references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitted as an attached MS Word document.

 

Required Reading

1. Jamsa – Chapter 5

2. Erl – Chapter 10 (Sections 10.5 through 10.8 Only)

References:

Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.

Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.

Business Intellegence

Discussion: 

Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report. 

Discussion Questions: 

1.Compare the IoT with regular Internet. 

2. Discuss the potential impact of autonomous vehicles on our lives. 

3. Why must a truly smart home have a bot? 

4. Why is the IoT considered a disruptive technology? 

Exercises: 

1. AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary. 

2. It is said that the IoT will enable new customer service and B2B interactions. Explain how. 

3.Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities. 

Dissertation on IoT

1. Discuss the gap for your problem to be addressed in your dissertation and continue to include new articles(4). 

2. Using the additional articles you have retrieved from the library, revise your topic submission clearly identifying the gap in the research that this topic addresses. 

Exception handling in Java

Write a method that accepts two integer prime numbers and returns their product. If either argument is not prime, throw a custom PrimeNumberException and report the number(s) that are not prime. Your custom exception should be a checked exception. In addition to the above, write some code to show how your method works when called with the following arguments:

  • Two prime numbers
  • One prime and one non-prime number
  • Two non-prime numbers

Data structure (Python)

Please following the requirement which is in the PDF file(cs261 assignment instruction), and give the same output as the PDF file shows. 

Then, answer the 4 questions which I give in word file and I also provide the pdf files which the questions required.

Research paper 6

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

Article readings: Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43. http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=93598603&site=eds-live

For your week 6 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

NO plagiarism at any cost. 

Due on Sunday (10/04/2020)