Machine Learning Classifier using Weka

Section 1 — Upload final data file

Section 2 — Business/research questions

1. Using BRFSS data set, state the three business or research questions that you have attempted to answer through your analysis, and justify why they are interesting (300 words maximum)

Section 3 — Processing the data

1. Describe how you explored the data, why you did it that way, and what conclusions you drew about it (300 words maximum)

2. Describe the cleaning/fixing you did on the data, and why (300 words)

Section 4 — Data analysis

3. Explain what analysis techniques you used to answer your business/research questions, and why (300 words maximum)

4. Summarise the results of your analysis (300 words maximum)

5. What do the results say in answer to your business/research questions? (300 words maximum)

6. Describe the most salient threats to validity that remain in your analysis (300 words maximum)

Section 5 — Dealing with large data sets

7. Describe how you could represent the data in a relational database — give a suitable schema, and describe a mechanism for converting it to a suitable input form for WEKA (300 words maximum)

8. Describe a way that you could use appropriate technologies to spread the load over multiple computers, and justify why this would be a good approach (300 words maximum)

Section 6 — Privacy

9. List the three most salient privacy issues related to this analysis, and give strategies you could use to address each of them (300 words maximum)

Section 7 — Report references

10. Provide a correctly structured list of references to all the resources used for this development and report (no word limit)

Executive Summary on Risk Analysis

  

Refer to the Case Scenario: Premiere Collegiate School” text sheet provided. Use the scenario and the table discussed below to create an asset list with quantitative values to be used in the analysis. Quantitative values are arrived at by examining numerical, measurable characteristics such as original cost and cost of replacement. Students should rank the importance of each asset, based on the importance to the school, and justify their ranking.

See the attached file

Discussion 300 words

 What is the weakest link in the security of an IT infrastructure?  What are some of the strategies for reducing the risks? 

BIG DATA & ANALYTICS

  

BIG DATA & ANALYTICS – MapReduceGiven the dataset provided:
– Create a MapReduce job to compute the number of times each bike station ran out of bikes. Sort the stations by decreasing number of ran outs.
Note: A bike station is ran out of bikes if:
status == 0 and bikes_available == 0See attached for full description and relevant files.

enterprise content managment

Key Assignment

Part 1: Enterprise Content Management and Data Governance Policies and Procedures Manual ( 25–30 total pages)

In the last few weeks, you have prepared the foundation for the enterprise content management manual by writing the Project Outline and Content Requirements, Implementation Life Cycle, Information Infrastructure Evaluation, Information Infrastructure Improvements, and Data Governance Evaluation sections. The final step in developing the enterprise content management manual is to document the changes that are necessary to improve the governance in the areas of data quality, data management, data policies, business process management, and risk management. In addition, you will prepare an implementation plan for the ECM and data governance policies and procedures you have defined. You will also further refine the document to produce the final version for the project. Updates may be based on peer and instructor feedback.

The following are the project deliverables:

  • Update the Enterprise Content Management and Data Governance Policies and Procedures Manual title page with a new date and project name.
  • Update the previously completed sections based on instructor feedback.
  • Data Governance Improvements
    • Data Quality
      • Document the changes that are necessary to improve the governance currently in place related to data quality in the organization.
    • Data Management
      • Document the changes that are necessary to improve the governance currently in place related to data management in the organization.
    • Data Policies Management
      • Document the changes that are necessary to improve the governance currently in place related to data policies in the organization.
    • Business Processes
      • Document the changes that are necessary to improve the governance currently in place related to business processes in the organization.
    • Risk Management
      • Document the changes that are necessary to improve the governance currently in place related to risk management in the organization.
  • Implementation Plan
    • Define the team required for the implementation of the ECM and data governance policies and procedures.
    • Identify the key tasks required for implementation, including time and resource requirements.
    • Assign key tasks to implementation team members.
    • Develop a project timeline.
    • Establish key implementation milestones.

Complete the Enterprise Content Management and Data Governance Policies and Procedures Manual final version, by doing the following:

  • Review the entire document for any changes and improvements you would like to make.
  • Ensure that this final version of the document is sufficiently detailed to meet the requirements of the assignment.
  • Any previous instructor feedback should be addressed with appropriate changes.
  • Be sure to update your table of contents before submission.
  • Name the document “yourname_IT621_IP5.docx.”

Worked Example

Please refer to the Worked Example below for an example of this assignment based on the Problem-Based Learning Scenario. The worked example is not intended to be a complete example of the assignment but will illustrate the basic concepts required for completion of the assignment and can be used as a general guideline for your own project. Your assignment submission should be more detailed and specific and should reflect your own approach to the assignment rather than just following the same outline provided in the worked example.

Note that the worked example includes material from previous worked examples. The new material will be found under the Week 5 sections of the Table of Contents.

The worked example is provided here to help with this assignment.

Part 2: Argumentation PowerPoint (5 slide, excluding Title and References slides)

Envision that you now have to present your solution to your client. You need to make a formal presentation to a group of stakeholders, and you need to be prepared to answer their questions. As a final step in the project, you will create a PowerPoint presentation in which you provide the following:

  • In the Notes pages of each slide and based on the context of the information on that slide, provide a narrative of 2–3 paragraphs of your rationale for the data governance improvements that you are recommending.
  • On each slide, identify the evidence that you have to support the argument(s).
  • All sources used to support your argument and solution should be cited both in-text (on slide or in Notes section) and on a References slide in APA format.
  • Name the document “yourname_IT621_IP5.pptx.”

Operational Planning and policy Management.

  

Written Assignment #1 – Apple’s Strategy 

Refer to Assurance of Learning Exercise #1 (Apple) in Chapter One of your Thompson (2022) text. Read “Apple Inc: Exemplifying a Successful Strategy” in Illustration Capsule 1.1.

Incorporate our course (Thompson text) work for the week and Develop your analysis by responding to the following questions:

  • Does      Apple’s strategy seem to set it apart from rivals?

  • Does      the strategy seem to be keyed to a cost-based advantage, differentiating      features, serving the unique needs of a niche, or some combination of      these? Explain why?

  • What is      there about Apple’s strategy that can lead to sustainable competitive      advantage?

  • Your      analysis should be 500 words.

  • Incorporate      a minimum of at least our course Thompson 2022 Text and one      non-course scholarly/peer-reviewed sources in your paper to support      your analysis.

  • All      written assignments must be formatted ini APA, and include a coverage      page, introductory and concluding paragraphs, reference page, and proper      in-text citations using APA guidelines.

Business Intelligence Chatbots, FB, weChat.

1. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.

2. Discuss the financial benefits of chatbots.

3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.

4. Compare the chatbots of Facebook and WeChat. Which has more functionalities?

5. Research the role of chatbots in helping patients with dementia.

Answer above questions in APA format, plagiarism-free, Times New Roman Font, 12 Font Size, with 6 Latest References, In-Text Citations must for every paragraph, atleast 1250+ words i.e 5+ pages excluding Title, and Reference pages..

Computer system

 

identify the most appropriate computer systems architecture for a specific type of business (you might need to project out 1-2 years for what the business will ultimately need). Follow these steps to complete your CLA 2 assignment:

  1. Identify a business.
  2. What data structures are needed to support this business? (Examples, databases, Web presence/apps, etc.)
  3. What types of data are recommended for use with each data structure object? 
  4. Which classes contain which data structures, and what methods should you use?
  5. What data storage approaches would be appropriate?
     

Cybersecurity

 

Discuss application security, select four antivirus products, one of which is a free product, and compare their features. Create a table that lists the features. How do they compare with the AV software you currently use? Which would you recommend to others? Why?

Now, analyze how secure are the host computers at your school or workplace? Perform an analysis of the physical security to protect these devices. Make note of any hardware locks, proximity readers, video surveillance, fencing, etc. Then look at the hardware security around the hosts themselves. What are the strengths? What are the weaknesses? What recommendations would you make for improving host security?

Write a one-page paper on the anti-virus comparison, and the analysis of the physical security at your school or workplace.