BI

1. Discussion (Chapter 3): Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics. 

2.  How do you describe the importance of data in analyt-ics? Can we think of analytics without data? Explain. 

3. Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum? 

4. Where do the data for business analytics come from? What are the sources and the nature of those incoming data? 

5. What are the most common metrics that make for analytics-ready data 

6. Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to edu-cation, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-specific information and explanation provided on the site. Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations. 

Building Web Applications

 

Do a bit of research into File Inclusion Vulnerability.

  • What is it?
  • Why is it dangerous?
  • What is the difference between low and remote inclusion?
  • What methods can be employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Post between 100 – 300 words

Configuring a DSLAM and DCHP

 

In this graded practice you will add and configure a DSLAM (Digital  Subscriber Line Access Multiplexer) and configure a small network using  this DSLAM.  You will connect a router to the DSLAM and configure DCHP  via a router.  

A DSLAM (Digital Subscriber Line Access Multiplexer) is a network  device that receives signals from multiple customer Digital Subscriber  Line (DSL) connections and puts them onto a single Ethernet connection.

executive summaries

 1 page discussion

  1. Search the internet for sample executive summaries.
  2. From your research, describe 3 items that need to be in an executive summary and your reasons why.
  3. Include in your report the ways that you would ensure that your executive summary would get buy-in from the key stakeholders of this project.

Assignment

 

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

PLE 11

Please answer the below in 2-3 lines:

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Wk#6 Discussion And Research paper

 1. Discussion:

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?  (Write 350-400 words).

2. Research Paper:

 Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Web Development Timeline and/or Cycle COLLAPSE 1 page paragraph

 

Web Development Timeline and/or Cycle
COLLAPSE

No two websites are developed the same, but there are likely timelines and best practices. Phrases I would focus on would be customer-focussed, user-focussed, internal communication, and external communication.

This is NOT you casually talking about topics. 

You should be REPORTING EVIDENCE and EXAMPLES from what you read.

  1. Identify the topic for this week. The title of this discussion board thread lists topics 
  2. Find three high-quality sources of related information on the Internet. 
  3. Read your chosen high-quality sources of related information.
  4. state your three sources of information.
  5. DESCRIBE each of the three sources of information within a few sentences providing EXAMPLES.
  6. SUMMARIZE with three things about the topic that you want to remember forever.

Homework 1

Please find the attachment of home 1

Total words 600 excluding references and No plagarism