Assigment

 You are the IT manager of a large corporation. You are planning to use Python to develop statistical models to aid in analyzing your sales data. You are preparing a report for management. Here are the basic requirements for your report:

  • Prepare in APA format
  • Include references
  • Report length: 500 – 700 words
  • Briefly describe your company
  • Briefly describe Python
  • Give overview of Machine Learning
  • Report on:’
    • Implementation plans
    • Technical training
    • Python libraries required
    • How Python will be used
    • Types of reports that will be produced

In addition, prepare a PPT presentation of your Research Project. You will be required to have this ppt prepared for presentation during residency. 
 

Excel

this assigment have to be done in Excel. I have uploaded two documents. The first one are the instructions and the second one is the format with Excel that I have to complete with the instructions mentioned. 

discussion

Research on the difference between Data Analytics and Data Science and describe in your words. Find 15 or more analytics / data science related job titles and write one sentence about the primary job responsibility of each of them. The post should be 500 words or more

Intro to data mining

Discussion: 

Consider the mean of a cluster of objects from a binary transaction data set.

1. What are the minimum and maximum values of the components of the mean?

2. What is the interpretation of components of the cluster mean?

3. Which components most accurately characterize the objects in the cluster?

Please clearly LIST your response out to all THREE (3) questions and ensure to cite the specific article with the binary transaction of data set. I will be examing this for myself and other students should verify this as well. Provide the Author, YYYY  and specific page number, with any content brought into the discussion.

Assignment: 

Answer the following questions in a point by point fashion.  NOT an essay. Please ensure to use the Author, YYYY APA citations with any content brought into the assignment.  

  1. For sparse data, discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values. When would such an approach not be desirable?
  2. Describe the change in the time complexity of K-means as the number of clusters to be found increases.
  3. Discuss the advantages and disadvantages of treating clustering as an optimization problem. Among other factors, consider efficiency, non-determinism, and whether an optimization-based approach captures all types of clusterings that are of interest.
  4. What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?
  5. Explain the difference between likelihood and probability.
  6. Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of connection (interconnectedness) of clusters.

Questionnaire on RFC

 

  • 8.1 What is the difference between RFC 5321 and RFC 5322?
  • 8.2 What are the SMTP and MIME standards?
  • 8.3 What is the difference between a MIME content type and a MIME transfer encoding?
  • 8.4 Briefly explain base64 encoding.
  • 8.5 Why is base64 conversion useful for an e-mail application?
  • 8.6 What is S/MIME?
  • 8.7 What are the four principal services provided by S/MIME?
  • 8.8 What is the utility of a detached signature?
  • 8.9 What is DKIM?

Data Washing Machines

(1) Give a working definition of Data Washing Machines (DWM) from your perspective. (2) Propose a conceptual framework on DMW’s. (3) Propose research directions or R&D approaches for DWM.

Urgent 2

 Assignment 1

Assignment Content

  1. The president and board of directors accept your proposal and are ready to adopt the cloud solution recommendation. You are asked to write a message for a dashboard publication on the company’s internal website. Your audience is a diverse workforce, and they will be reading the announcement about this new solution.

    Draft a 1- to 2-page announcement to be used for the dashboard.

    This message can be created as one of the following:

    • Website (provide a wireframe)
    • For introductory information on wireframing, refer to “Conceptualizing the Solution” from Wire Framing for Product Managers from LinkedIn Learning in the Wk 5 Learning Activities folder.
    • Microsoft® Word or Microsoft® PowerPoint® presentation
    • Another instructor-approved deliverable
    • Provide the following in your announcement:
    • A brief background of the problem
    • The solution to address the business’s needs
    • The business benefits to employees and the community
    • Key highlights of the service management and operation plan to roll out the cloud solution
    • A timeline for the implementation and the teams included in the project

Assignment 2

 

Assignment Content

  1. Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans.  

    In the final section of your Playbook, create a 3- to 4-page outline of backup policies for when the data center is inaccessible.  

    Complete the following in your outline: 

    • List the tools used for backup purposes. 
    • Explain the following: 
    • Where employees should work from that day 
    • How employees can get to their data 
    • The communication methods about updates 
    • Outline step-by-step instructions to recover your databases and telecommunications. 
    • Provide a step-by-step guide to recover and provide any additional company assets. 
    • Discuss policies for backup media storage. 
    • Discuss policies for encryption of backup data. 
    • Note: Numbered or bulleted steps or guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps or guidelines. 

      Cite at least 2 resources to support your assignment.

      Format your assignment according to APA guidelines. 

      Submit your completed Playbook for this assignment. 

       

    •  

research paper week 3

   When  law enforcement becomes involved, the need may arise to freeze systems  as part of the evidence. There is also the likelihood that the incident  will become known publicly. Do you think these issues play a significant  part in the decision to involve law enforcement? Why or why not? Can  you name some situations in which you believe that large organizations  have decided not to involve law enforcement?    ***Standard for all Research Assignments   Your paper should meet the following requirements:   

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support  your answers with the readings from the course and at least two  scholarly journal articles to support your positions, claims, and  observations, in addition to your textbook. The UC Library is a great  place to find resources.
  • Be  clearly and well-written, concise, and logical, using excellent grammar  and style techniques. You are being graded in part on the quality of  your writing.

network security layers

A best practice is to thoroughly document the lifespan of a firewall. A firewall implementation procedure should prescribe the systematic process to install and configure a firewall properly. Anytime the firewall is modified, the documentation should be updated accordingly.

Answer the following question(s):

Assuming you would rarely need to reinstall a firewall, why do you think such thorough documentation is needed for installation?

30/s2

  • Why is there a need for data access control?
  • What are the benefits and risks for using Smart Cards and PKI?
  • How do Smart Cards/PKI protect the data’s confidentiality, integrity, authentication, and non-repudiation?