Data mining

 

Discuss the advantages and disadvantages of using sampling to reduce the number of data objects that need to be displayed.

Would simple random sampling (without replacement) be a good approach to sampling? Why or why not?

Discussion 1

 Analyze the role of the IT manager in business and create a job description for an IT Manager. Your job description can be for the organization for which you currently work, or one for which you have worked in the past. Your description should include a minimum of six skills that an IT Manager should possess and a minimum of six responsibilities the role will include. In a separate paragraph, explain whether or not you plan to pursue a career as an IT manager. Describe at least one factor that might prevent you from pursuing a management role.

Your initial post must be a minimum of 300 words.

4 pages Critical review except

Find one peer reviewed article pertaining to Blockchain and HR. Write a critical review of the article. The review should be at least 4 pages (1000 words) long from introduction through conclusion. Be sure to provide in-text citations when you paraphrase or directly quote from the article. Also include a reference page with an APA style citation of the article. Follow the writing requirements for this course when preparing the paper. Use the following format for the paper:

1. Introduction, including the purpose of your paper and a preview of your paper. Be sure to also provide the article’s title and author(s)’ name(s) in the introduction of your paper.

2. Discuss the purpose and problem the article is addressing.

3. Elaborate on the content of the article.

4. Discuss the findings and conclusion(s) drawn by the article’s author.

5. Discuss the author’s point of view and assumptions. Indicate whether unsubstantiated assumptions were made and whether there is bias that exists in the article.

6. Discuss the significance of the article. Why it is important? On what do you base your assertions?

7. Conclude your paper. Summarize the important aspects of the review.

8. References

Your paper should include 8 centered and bolded headings that correspond to each of the required sections (Introduction, Article’s Purpose and Problem, Content, Article’s Findings and Conclusions, Point of View and Assumptions, Significance, Conclusion, References).

Writing Requirements for all Written Work:

References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.

Always include a cover page and reference page with ALL submissions (even initial discussion posts)

Provide the EXACT web link on the reference page citations for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources

No abbreviations, no contractions – write formally

Write in the third person formal voice (no first or second person pronouns)

Write MORE than the minimum requirement of the word count assigned

As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper

Indent the first line of each new paragraph five spaces

Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.

Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Information Governance Week – 4 -1

 According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.   

For this discussion, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. 

 At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library

— 500 Words 

discussion_week5

Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?

What are the common business problems addressed by Big Data analytics?  In the era of Big Data, are we about to witness the end of data warehousing? Why?

Submission ○ For each problem below, submit file(s) electronically to Blackboard according to description.

 Grading Guideline ● Your code should execute. For code with errors executing, points will be deducted. ● Keep code clean, unclean code will get points deducted. Unused lines of code or debugging prints should be removed before submitting. Repeated lines or functionalities should be avoided. You may lose points if code has repeating lines. (for example, you may calculated “prices” already, but later you calculated it again, is considered repeating code) ● Variable Naming: use variable names that make sense, avoid built-in and reserved keywords. 

Assignment-Application Security

 

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. Describe operating system hardening
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment?
  2. Describe system restoration methods and procedures
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence
      1. Describe why evidence is collected,
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.