IT501 discussion 9

You are required to submit a 1,000-word, double-spaced  on: 

What are the threats to personal privacy posed by the Internet, and what actions can you take to safeguard user privacy?

You will use your textbook, the university digital library and online resources with proper citations.

Your paper must have three parts:

  1. Review of source(s)
  2. Opinion and commentary
  3. Citations

________________________________________

Case study

List and explain the new banking technologies and describe how fintech industries has transformed how banks operate

YouTube link:-
https://youtu.be/pPkNtN8G7q8
Answer the above question from the video

Research paper 1 or 2 page

    

  1. Research a cloud service model.
  2. In a Word document, identify the following and write a brief summary of what you learned in your research.
    • What the service model is and what advantages it provides
    • What kinds of scenarios the service model is commonly used for
    • The management responsibility associated with the service model—what the provider manages vs. what you manage
    • A brief description of at least three different service providers for the cloud service model selected
  3. Save your file, and submit it using the instructions below.

excel help

                

Write a single Excel formula that runs a quick VLOOKUP, and generate the difference of Two position – Client Position, Vendor postion.

Keep in mind the identifier format between Vendor and client sheet are slightly different so you will have to compensate for it in your formula to get the identifiers to match-up. Other Excel lookup functions are acceptable as well as long as it gets the job done.

Self Reflection

What did you learn about yourself this term?  What is your preferred style of leadership and how did it help you solve professional challenges? Be specific and provide at least three (3) examples. 

Role: Java Developer.

Completely on Matlab

1.  Download and install MATLAB. Develop the following function using MATLAB

a.  Write a script that loads data from a file and display the first five instances. Create a matrix from the loaded instances. 

b.  Divide the loaded instances into two sets with one set containing 70% of the instances and the other containing 30% of the instances. Save each set into a variable. Name the variables ‘TrainingSet’ and TestingSet’. 

c.  Save the two new variable to a ‘.mat’ file. 

2.  Implementing Fisher LDA method using MATLAB. 

a.   Write functions that take the provided data set and compute the optimal projection vector following the fisher criterion. 

b.  The output from the main function must be the identified projection vector.

3.  Write functions to evaluate the LDA method using MATLAB.

a.  Write a script to perform cross-validation and report the average accuracy, standard deviation, sensitivity, and specificity. 

NOTE: There is no requirement to develop a GUI to visualize the intermediate or the results.

A report that includes the following items is due in addition to the source code for the functions:

–  A description of each function,

–  How to run the functions to get the reported results, and

–  The experimental results.

Portfolio Project

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

500 words in APA format with 2 references

  • When should the architect begin the analysis?
  • What are the activities the architect must execute?
  • What is the set of knowledge domains applied to the analysis?
  • What are the tips and tricks that make security architecture risk assessment easier?