Assignment

On November 3, 2020, California’s Privacy Rights Act is on the ballot. As of the time this assignment is being written, we do not know whether it will pass or not. Please write a 250 word essay on what the Act contains, and if it passed the ballot or not. Please tell why it passed or did not pass.

Minimum 250 words. APA format

Systems Thinking Project Milestone using microsoft visio

 

  1. Define the following systems-thinking concepts in your own words:
    1. Systems thinking
    2. Collection
    3. Feedback loop
    4. Stock and flow diagram
    5. Causal loop diagram
  2. The following scenario describes the system used for fulfilling an online order at Lost Pines Outfitters, a medium-sized outdoor clothing store. Read this scenario and create a basic map of the system using Microsoft Visio.

  3. Once you have mapped this system, you will map relationships contained within the system. First, identify relationships within your system diagram that represent feedback loops, and represent those loops within your model. Then, identify a relationship within the system that could be modeled with a stock and flow or causal loop diagram, and model that diagram in Visio. 

4.Compose a brief, 250- to 500-word summary of the given system, as well as the relationships present in this system. In your summary, describe the system, feedback loops, and other archetypes you identified within the system.

WK-2

  

Assignment 1

Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.

Refer to Chapter 3 in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

Requirement: 

****Separate document for each assignment.****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add references separately for each assignment question.

Double Spaced and APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Assignment 2:

What are the privacy issues with data mining? Do you think they are substantiated?

Refer to Chapter 4  in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Requirement: 

****Separate document for each assignment.****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add references separately for each assignment question.

Double Spaced and APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Discussion

  

Discussion:

1. Explain the relationship among data mining, text min-ing, and sentiment analysis.

2. In your own words, define text mining, and discuss its most popular applications.

3. What does it mean to induce structure into text-based data? Discuss the alternative ways of inducing structure into them.

4. What is the role of NLP in text mining? Discuss the capa-bilities and limitations of NLP in the context of text mining.

security architecture and design

 Provide a reflection of at least 500 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of this course (security architecture and design) have been applied, or could be applied, in a practical manner to your current work environment. If you are not current working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.    

Cyber law

 On November 3, 2020, California’s Privacy Rights Act is on the ballot. As of the time this assignment is being written, we do not know whether it will pass or not. Please write a 250 word essay on what the Act contains, and if it passed the ballot or not. Please tell why it passed or did not pass. 

Service Delivery Models

 Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.  

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand-alone quotes will not count toward the 3 required quotes.

Write in essay format, not in bulleted, numbered, or other list formats

CASE STUDY

  

As a team, pick one of the following department in your organization: 

· Computer Operations 

· Accounting 

· Marketing 

· Payroll 

· Sales 

· Distribution

· Human Resources

· Purchasing 

· Service (i.e., Vehicle Maintenance)

· Administration (i.e., Executive Branch)

Requirements: 

Describe the services that your department provides to the organization, the types of disasters will most affect your department, and what you and your department can do to prepare for a disaster situation. Perform a limited risk analysis for your department (because any given department in an organization can be considered an organization on its own) for the types of disasters that will most affect your department.

After you conducted your limited risk analysis for your department, the company decided to make you the captain for your company’s disaster recovery team. You know that working as a team is important and therefore you’re trying to figure out how to build both the team and friendships within the new team. As a team, you should discuss why you need to create a contingency policy and plan. You should describe what you need to start the contingency planning process and finally, define business impact analysis and describe each of its components.

Now that you know what goes into making up your plan, you should discuss the relationships between the overall use of contingency planning and the subordinate elements of incident response, business resumption, disaster recovery, and business continuity planning. Additionally, you will describe the techniques used for data and application backup and recovery.

To conclude the project, you are going to describe the process you will use to organize the incident response planning process, explain the techniques that can be employed when formatting a security incident response team, and describe the processes used in making decisions about incident detection and escalation.

Deliverables:

Prepare a report to address all aspects of the case study. This report should be no less than 20 pages of content and no more than 25 pages of content. You need to include outside sources and properly cite and reference your sources. You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. The 20 pages of content, includes title page and a reference sheet. This report needs to be in proper APA format.