Business Intelligence Assignment 2

  

Visit the AI Exploratorium at cs.ualberta.ca/~aixplore. Click the Decision Tree link. Read the narrative on basketball game statistics. Examine the data, and then build a decision tree. Report your impressions of its accuracy. Also explore the effects of different algorithms.

Discussion (Course — Digital Forensic Evidence)

 Mrs. Mary Winkler Murder Case.

Preamble

The modern approach of forensic of investigation is a combination of what we inherited, learned, documented from the past leading to rewarding and challenging life-time investment. Forensic investigation involves searching, penetrating, and analyzing items from several different fields of life, demands well-synthesized record-keeping and hard to accomplish. It is imperative for forensic investigator to understand the basic techniques of collection and preservation of evidence and cannot be completed with comprehensive and fundamental understanding of forensic science.

Pre-Assessment:         Mrs. Mary Winkler Murder Case.

In March 2006, Mrs. Mary C. Winkler, the wife of a Pastor in Tennessee town, shot and killed her husband, Rev. Matthew Winkler, in the back with a 12-guage shotgun while he slept. Throughout the ensuing trial, the suspect Mrs. Winkler, along with family and friends, claimed that her husband had mistreated her, and mistreatment had inspired the shooting. After the shooting, Mrs. Winkler was arrested in Orange Beach, Alabama, where she had fled with her three young daughters, and extradited to Tennessee. On April 20, 2007, Mrs. Winkler was convicted of voluntary manslaughter and a grand jury indicted her on charges of first-degree murder.

When Mrs. Winkler took the stand in her own defense two days before her conviction, she told the grand jury of her alleged abuse at the hands of her late husband, with whom she had frequent arguments. She asserted that the shooting was an accident and that she had actually been trying to reconcile with her husband at the time of the murder and further claimed that although the gun had discharged, she could not remember having pulled the trigger.

She alleged that her flight to Alabama affirmed her determined attempts to get away from her angry husband. Winkler was ultimately convicted of voluntary manslaughter and sentenced on June 8, 2007, to 210 days in prison, 5 months of which she had already served. She spent some time in a Tennessee mental health facility and then served the remainder of her sentence on probation. Eventually, she was awarded custody of her children.  At times, law recognizes, under circumstances most individual can be justification for the taking of human life (Montaldo, 2017).

Scenario 1

Mrs. Winkler, along with family and friends, claimed that her husband had mistreated her, and mistreatment had inspired the shooting

Question 1

1:1     As an investigator, do you passionately believe that Mrs. Winker, is justified in killing her husband?

Scenario 2

Rev. and Mrs. Winkler had three young daughters and she was awarded custody of her children. Based on overwhelming digital evidence in the case.

Question 2

 2:1.            As an investigator, do you ardently support awarding Mrs. Winkler the custody of the family three children?  

2:2.             If you were one of the three children, present an active plan of action to safeguard such dreadful, threatening, and bad-tempered episodes in the family?

Casey, Eoghan (2011). Digital Evidence and Computer Crime. Elsevier

            Science. Kindle Edition; San Diego: CA

Montaldo, Charles (2017). “The Trial of Mary Winkler.” Thought Co: Tennessee.

bi13 assignment

 

1. Some people say that chatbots are inferior for chatting.Others disagree. Discuss.

2. Discuss the financial benefits of chatbots.

3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.

4. Compare the chatbots of Facebook and WeChat. Which has more functionalities?

5. Research the role of chatbots in helping patients with dementia

6. Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.

APA format with 2 references.
2 pages

HomeWork Paper

Discuss how information is classified and how it can be used in a competitive situation.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

All paper are checked for plagiarism using SafeAssign, you can review your score.

Please use the attached APA template to get started.

ethics and cyber security

– ESSAY TYPE QUESTION (NOT AN ESSAY) (2 QUESTIONS GIVEN  ) 

 – INSTRUCTION ARE ATTACHED. 

– SHOULD STRICTLY FOLLOW THE INSTRUCTIONS. 

– 200 WORDS EACH QUESTION 

– NEED PLAGIARISM REPORT ALONG WITH WORK. *****

requirement: code must be done in C

Add a new built-in exit command that exits from your shell with the exit() system call. Also add support for signal handling and terminal control (Ctrl-C, Ctrl-Z). You do not want those signals to terminate your shell. Instead you need to handle them and terminate processes that your shell started if any. Be aware that forked processes will inherit the signal handlers of the original process.

Chat application demo (using Angular and spring)

 

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse

1. user can signup and login and chat with each other (one to one chat for example facebook)

2. web page design is not needed.

4. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.

3. it should be work in windows 10.

ETCM-Research-5

Need this research paper by Thursday USA time. (5 days from now).

5 pages without references and Title page. Follow APA 7 format and citations.

Topic:

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.