intro to datamining

This written assignment will demonstrate the student’s ability to apply the theory of datamining to the manufacturing industries.

The fields of data science and mining are applicable to nearly all industries. This is especially the case with the manufacturing field. In this area, the different areas of the manufacturing process provide ample areas to collect the data. Within each step of the manufacturing process, there are also more opportunities to collect data. This provides a mountain of the data to review, clean, and analyze.

Assignments

Please pick a manufacturing industry (e.g. auto, steel, or book making) and apply data mining to an individual step in the process. Please also address decision tree classifiers as part of the research paper.

Requirements

There are two portions for this part of the residency. You will create a research paper and presentation.

Provide a 1,000 word or 4 pages double spaced research paper.

Use proper APA formatting. Do not plagiarize. Cite other people’s work; they have put much effort into getting their work published and deserve to be recognized.

Demonstrate your understanding of how this would be applied to your choice of industry and step, along with the presentation.

Also, prepare a presentation based on your research paper.

Questions 1: Classes and Pointers

Instructions

This question set covers material on C++ classes (regular and templates) as well as pointers and references (readings from Chapters 1-3 in your book).  Use the lecture slides, your notes, textbook, and other resources to research questions.

When given a choice, always choose the best answer.  Answers such as “None” or “All”, maybe be listed in any order.  For short essay questions, answer in a cohesive paragraph in your own words. If you research any answers in your book or elsewhere, do not copy wording from those sources.

To better understand how any code works: create a C++ project in Visual Studio and test the code.  Include any needed header files.

4 Questions for IT managers to be answered and analysed

You should answer 4 questions about IT technologies and its application in management and business, the important point is there must be no similarity and plagiarism  Questions must be answered two pages for each question. Questions and instruction have been attached.

Security controls

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. Describe operating system hardening
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment?
  2. Describe system restoration methods and procedures
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence
      1. Describe why evidence is collected,
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

4s week 4 assignment EH

In 350 words

There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10 attached). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices? 

Include references, No copy paste.

Data Mining Assignment

Provide a real world example of a probability distribution based on your readings for the week. Consider the data instances that is different from uniform (i.e., equal probability).

Instructions for participation: You must post an INITIAL POST and then respond to at least ONE POST. In both postings, you MUST provide citable academic literature to defend your use case. Please do not use the same source over again, especially when most times there is absolutely no applicability from one post to the next.