Social media Anlaytics

Question:

 What is social media analytics? How is it done? Who does it? What comes out of it? Unique answers only. 

Length:250 words

Format: MS word

Citations: Required

IT207 week 8

Please discuss/answer the following questions:

  1. How does the use of repetition and decision-making structures enhance your scripts?
  2. What is the difference between a peer-to-peer network and a client/server network?

For APA format, include a title page. Include an abstract statement on page two. Add the body on pages 3 & 4. Put your references on page 5. Use more than one reference for your information. Use Times New Roman 12 point font, double-spaced through the entire document. Indent paragraphs in the body. The abstract is not indented. 

You can use the APA template and References tab in MS Word for easier formatting.

Discussion

read and independently research an Article, Amendment, or Section of the U.S. Constitution of your choice. Consider how, as the supreme law of the land, it may have influenced or framed one of the laws or regulations that was discussed in the text and lectures. If at first you do not see how, for example, the Constitutional mandate about voting age relates to information security or privacy, think more critically. Did we discuss the various ages that the law views a “child” as? Every law, by definition, relates back to the U.S. Constitution in one manner. Countless civil and criminal lawsuits—car wrecks, contract issues in business, any crime, etc.—contain arguments that touch on the Constitution, even when the issue at bar seems far afield. It is because of that omnipresent and important function of the U.S. Constitution that this exercise will help you understand the entire course in its light.

Lab exercise

   

Payroll Lab

You will be taking in a file (payroll.txt) which details a number of departments (at least 1) and in each department are a set of employees (each department will have at least 1 employee or it would not appear on the payroll sheet). Your job is to read the file in separate out each employee and calculate the total values (hours, salary, number of employees) for each department and in each category (F1, F2, F3, F4). In your final submission please include the .cpp file which should work for any kind of payroll file I supply (which will naturally match the format of the examples below). Be sure to indicate in your submission text if you have attempted any of the bonus points .

   

An example file:

The IT Department
Bill 8 7 8 9 7 F1
Bob 205103 0.08 F3
Betty 8 8 7 8 8 F2
Brandon 10 10 9 6 9 F2
Brad 9 8 10 9 9 4 1 F4

The Sales Department
Kyle 88840 0.105 F3
Tyler 105203 0.085 F3
Konner 8 6 7 6 9 F2
Sam 309011 0.045 F3
Kent 9 8 9 9 9 0 0 F4
EOF

An additional example file:

The Sales Department
Mike 5 6 1 3 5 F1
Mark 98103 0.115 F3
Jill 8 8 8 8 8 F2

Frank 106101 0.095 F3

Mark 76881 0.091 F3

Department of Records
Konner 8 6 7 6 9 F2
Tammy 7 3 7 2 8 F1

Anika 8 8 8 8 8 F2

Marta 1 0 0 5 2 F1
Kent 9 8 9 9 9 0 0 F4
EOF

   

Last in the row after the hours comes the pay grade (F1, F2, F3, F4). The number of hours recorded is based on the pay grade of the employee. F1 and F2s will have 5 numbers for their hours. F3s are commission based where a sales amount and a commission percentage is given. F3s are also assumed to work 30 hours if their commission is 10% or below and 40 hours if their commission is above 10%. F4s will have 7 numbers (as they are on-call during the weekend). Each of the pay grades will also have different pay calculations which are as follows:

F1 = The total number of hours * 11.25
F2 = (The total number of hours – 35) * 18.95 + 400
F3 = The total sales amount * the commission rate
F4 = The first 5 hourly totals * 22.55 + Any weekend hourly totals (the last 2) * 48.75

Your output to the screen should start with the department name, followed by the total pay for all of the employees, then the total number of hours, and the total number of employees. After that you should have a breakdown of each category of employee: F1 total pay and total hours, F2 total pay and total hours…

Each department will have at least 1 employee and each department will contain the word “Department.”

The IT Department
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##
Roster: Bill, Bob, Betty, Brandon, Brad 

   

F1:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F2:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F3:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F4:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

   

The Sales Department
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##
Roster: Kyle, Tyler, Konner, Sam, Kent

   

F1:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F2:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F3:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F4:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

   

Before coding your solution, take the time to design the program. What are the possible things that the file can have that you need to anticipate? What are the actions that you need to take (read the file, add up hours…)? Are those actions things that could be placed in separate functions? What about the function – can you guess some of the things that will happen? Such as, using substring to pull out part of a line in the file maybe using stoi to convert a string to an integer to add it to the total or creating variables to hold the employee type you find before passing it to another function. Finally, how are these functions called, what is the order and what information is passed to and from? 

Scoring Breakdown

25% program compiles and runs
30% program reads in and calculates the figures for output
10% the program is appropriately commented
35% outputs the correct information in a clear format 

5% bonus to those who can output the F# responses in a columned output like that shown above.

5% order the employees in the roster according to their F status, F1’s first, then F2’s and so on.
5% bonus to those who do a chart comparing the data at the end to show the relation between the pay grades and the amount of salary spent in each (they style of chart is up to you and more points may be given for more difficult charts (like a line chart):

   

B Department
F1 – 00000000
F2 – 000000
F3 – 00000
F4 – 000000000000 

K Department
F1 – 0
F2 – 0000
F3 – 0000000000
F4 – 0000000 

  

Or event something like this instead:

0
0 0
0 0 0
0 0 0 0
0 0 0 0
F1 F2 F3 F4

SQL

 

Start with the solution schema for Assignment 1 (see solution files under Assignment 1).

  1. Create an ‘inventory’ table that stores the number of items available for each seller. How would you modify the ‘item’ and ‘seller’ tables to store this information?
  2. Pre-populate ‘seller’, ‘item’, ‘item_category’, and ‘inventory’ with data.
  3. Write a SQL script to create a new order. This script should do the following:
    • Create the customer if they don’t exist
    • Place an order for an item or items
    • Store the shipping address 
    • Reduce the count of the number of items left in the inventory based on this order, e.g. if there are 10 Levi’s Jeans from seller Levi’s, and an order is placed for 2 of them, the inventory count goes down to 8
    • The order should have ‘Open’ status
  4. Write a SQL script that cancels an open order. This script should do the following:
    • Uses an input order_id representing an order that is ‘Open’
    • Sets the order status to ‘Canceled’.
    • Update the inventory of reset the number of items to its original amount prior to making the order

Make up your own data for this assignment, or use the existing data from Assignment 1 as a start.

Case Study 4.1 M

 Paper on Designing and Implementing GIS Unit within ANY organization of your choice.

“Design and Implementation of GIS Technology” within any fictional or real agency, as School, University, Environmental Agency,

It is recommended to contact a GIS practitioner – GIS Manager or GIS professional involved in running GIS facility.

heuristic evaluation

 Instructions Part 1: User and Task Analysis (This task is worth 11 marks/50) a. Identify and describe One primary Persona for your application. Include all components of the persona description, as discussed in the lectures. Note: This application can serve a wide variety of users and as such, may have multiple primary personas. The persona you choose will guide your consideration for the subsequent steps in this exercise. (3 marks)) b. Identify and describe one primary and one secondary tasks/use cases in the system (primary tasks are important and frequently used functions by your primary persona, secondary tasks are desirable but are of less importance to your primary persona than primary ones). Provide a brief (text) description of the task/use case and the outline of the steps in the basic flow scenario and TWO alternative flow scenarios of the use case. (4 marks)  Note: Tasks such as Register/Login should not be used as an example of any use case. These supplementary functions are designed to allow a user to access the main functions of the system. c. Produce Two State Transition Networks (STNs) to describe the interaction flow in your use case scenarios (for both the basic and two alternative flows in each use case). Use an abstract depiction of the screens with no detail on design elements of the interface. Your STNs need only depict states and user actions between states in the use case scenarios. (4 marks) Note: Generally speaking, an interface state changes when an event occurs. For example, an entry of text in a text field, a click of a button, etc. Your STNs need to depict all possible states of interaction in the use case scenarios. Part 2: Interface Prototype (This task is worth 24 marks/50) Design and prototype a user interface for your application that demonstrates clearly the two use cases you defined. The interface should include enough user interaction to allow it to be demonstrated to a user. For each use case scenario, you need to produce the following. a) Detailed screen design(s) for every state in the STN. (Snapshots of the screens (or photos) from the interface you built for your prototype are sufficient). Indicate the mapping between the screens you include and states/actions on your STN – (ensure you have a complete set of screens for your STNs). b) For EVERY screen/state, i. Describe the interface elements chosen. ii. Justify the layout used, e.g. by an appropriate choice of design pattern, or to satisfy a specific usability principle. iii. Indicate which features you used to provide feedback. iv. Indicate how the design deals with user error. Axure and Balsamiq are the prototyping tools supported by our Teaching Associates. Interface designs produced using these tools are sufficient for this exercise. You are free to choose other toolkits or programming languages to develop the interface. However, no additional marks will be awarded for using more sophisticated tools or programming languages. (12 marks for every use case- a total of 24 marks) Part 3: Heuristic Evaluation (This task is worth 15 marks/50) For every use case, do a heuristic evaluation of the individual states of the interface, identifying all usability issues. Report on the usability issues in an objective manner and present the issues in a systematic and standard format using the templates (Excel spreadsheet) provided and discussed in the lectures. Your report should include, a) the usability problems you identified with some justification of the severity score assigned to the problems and your suggestions for addressing the issues you identified in subsequent revisions of the interface, and, (8 marks) b) the good design features that should be maintained in any subsequent revision of the application. (7 marks) 

CyberSecurity IT

 

Your assignment will be to first to identify and conduct investigation using (Google, news report, government report, and any other valid source) into a data breach incident of an organization in the past several years. *** NO CASE That was reviewed during class will be accepted! Ensure you select new case, not one covered in class. Assignment done on cases covered in class will get immediate zero***
Then, develop a written paper that will provide the following sections:

  • Data Breach Overview: Provide an overview of the data breach incident you selected, the organization that it occurred in, and indicate if any prior data incidents occurred in that organization previously (Use references to support your claims).
  • Cybersecurity Failures: Analyze the cybersecurity failures and identify the specific dimension(s) of cybersecurity and their related principles (Hint: McCumber Cube and it’s dimensions + relevant principles on each dimension!) that have been violated during the identified data breach incident (Use references to support your claims).
  • Cyber Risk Management: From recent industry and/or government reports (i.e. less than three years old) and in your own words (no quotes, but use references to support your claims) identify the cyber risk management factors (Likelihood – also known as ‘rate of occurrence’ + estimated impact) associated with the specific cyber incident that occurred for the organization you’re investigating. (Use references to support your claims). Include a simple table to highlight the cyber threat, risk description, likelihood, impact, and actions proposed to mitigate that cyber threat in the future.
  • Business Continuity Plan: In your own words (no quotes, but use references to support your claims) describe appropriate measures that the organizations should take to mitigate the risk of another data breach incident in the future.
  • Conclusion: In your own words (no quotes!!!), provide a conclusion that summarizes the whole paper.

In particular, you will need to develop a 5- to 7-page document (not more!) that outlines each of the section above and provides the details to address the points above.

 All text in the proposal should be word-processed (letter or correspondence-quality font), New Times Roman or Calibri, 12 point, double space and standard margins. The body of the proposal should be 5- to 7-pages long (not including title page, Table of Contents, Reference List, & Certificate of Authorship). 

   

The report should also be done professionally and should include:

  • Table of Contents (with sections & page numbers identified – Ensure the context text starts on page 1, frontmatter shouldn’t be counted in page numbers)
  • Page numbers on all pages
  • Clear and consistent headings of all sections
  • No running heads
  • Reference List following APA (At least seven different references)

Please read attached article and then write the paper

The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Project Proposal ( DATA Mining )

 

page project proposal should include

(1) Title;

(2) Briefly describe the problem/task (Classification, Clustering, Association Analysis, Anomaly Detection, etc) and the domain (text, image, etc).

(3) What is/are the datasets you are using? Where can we get them (publicly available (URL) or company data)? Describe the data (i.e., what is the size? what are the attributes?)

(4) Which methods do you plan to compare?

(Optional) Reference website or papers you are reading.