Data Mining Paper and Presentation

This written assignment will demonstrate the student’s ability to apply the theory of datamining to the manufacturing industries.

The fields of data science and mining are applicable to nearly all industries. This is especially the case with the manufacturing field. In this area, the different areas of the manufacturing process provide ample areas to collect the data. Within each step of the manufacturing process, there are also more opportunities to collect data. This provides a mountain of the data to review, clean, and analyze.

Assignments

Please pick a manufacturing industry (e.g. auto, steel, or book making) and apply data mining to an individual step in the process. Please also address decision tree classifiers as part of the research paper.

Requirements

There are two portions for this part of the residency. You will create a research paper and presentation.

Provide a 1,000 word or 4 pages double spaced research paper.

Use proper APA formatting. Do not plagiarize. Cite other people’s work; they have put much effort into getting their work published and deserve to be recognized.

Demonstrate your understanding of how this would be applied to your choice of industry and step, along with the presentation.

Also, prepare a presentation based on your research paper.

With the number of students in the class, not everyone will have the opportunity to give their presentation. There will be a random selection from the class roster. Your presentation will be a maximum of 5 minutes.

Please turn in your research paper and presentation for each separate assignment. Do not turn in both for either (i.e. upload your research paper in the Research Paper assignment, and presentation at the Presentation assignment).

Please let me know if you have any questions.

Thank you.

Ethical Hacking

 

Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.

Your assignment should be 3-4 paragraphs in length.

Lab 12 Flowcharting

 

  • Follow the instructions in the Word document
  • Download the “Flow Chart Assignment” file
  • Flowchart the processes using Word and its available shapes
  • You can view a tutorial for creating flowcharts here:https://www.youtube.com/watch?v=0VR7iBImDB4&feature=youtu.be
  • Refer to figure 11-4 in your book for help on this assignment
  • Use only the symbols listed on figure 11-4
  • Upload the finished flow charts to Canvas for grading

Emerging threats_6.2

Discussion:

 There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism? 

Note: Answer should be a minimum of 300 words

assignment Acceptable Use Policy (AUP)

 Acceptable Use Policy (AUP) (Information Technology)

For this assignment, you need to find three examples of an AUP from the Internet or other sources. Download these, or copy them and convert them into a PDF to attach to your submission. After reading/skimming these AUPs, attempt to write your own abbreviated AUP. Keep your AUP to a maximum of 5 pages and a minimum of 3 pages. You can cut and paste from your examples; however, be advised that this needs to fit the needs of the small marketing company weeks 5. Change text accordingly if you copy from other sources and make sure it is relevant. 

Submit your paper and the 3 PDF examples for this assignment.  

I attached the week 5 assignment just in case if you needed.

Analysis of Algorithms

 1. Describe how one can implement each of the following operations on an array so that the time it takes does not depend on the array’s size n. a. Delete the ith element of an array (1 ≤ i ≤ n).

 b. Delete the ith element of a sorted array (the remaining array has to stay sorted, of course). 

2. If you have to solve the searching problem for a list of n numbers, how can you take advantage of the fact that the list is known to be sorted? Give separate answers for

 a. lists represented as arrays.

 b. lists represented as linked lists.

 3. a. Show the stack after each operation of the following sequence that starts with the empty stack: push(a), push(b), pop, push(c), push(d), pop

 b. Show the queue after each operation of the following sequence that starts with the empty queue: enqueue(a), enqueue(b), dequeue, enqueue(c), enqueue(d), dequeue