diss16

Please note what you have learnt in the course data mining and how will you apply it in your work life. Anything else of importance regarding the course overall

Topics covered in datamining:

Key concepts of data mining

Knowledge discovery in database

data preprocessing

clustering classification

nearest neighbor and naïve bayes classifiers

Opinion mining, NLP framework

association rule in data mining

k-means, various types of clusters

prototype based, density based and graph based

cluster analysis concepts, an0moly, false discoveries

Discussion 3- Project Risk & Quality Mngnt

Chapter 4: Project Risk Management SystemsInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Explain each of the following steps in risk evaluation and remediation.
    • Risk identification
    • Risk evaluation for chance of occurrence
    • Risk evaluation for impact if the risk takes place.
    • The four types of risk remediation,
    • What is a project risk owner,
    • What is a risk threshold.
    • What is a risk matrix.

Text

Title: Managing Project Risks 

ISBN: 9781119489733 

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards 

Publisher: John Wiley & Sons 

Publication Date: 2019-08-13

FRP

1) Introduction Enterprise Risk Management 

2) Discuss at least one real organization that has been effective with implementing an ERM framework or /application. 

3) Conclusion, final thoughts for future research

4) Recommendation

Cryptography project proposal

 

Provide a half page proposal for your project. The topic must be in the field of Cryptography. For example, you can choose to study one of the many post-quantum cryptographic schemes, visual cryptography, RSA encryption, ECC encryption, quantum cryptography, how SSL works, how the Heartbleed attack worked, any of the digital signature schemes, bitcoins, what is DNSSEC, IPSEC, SSH, etc. These are just suggestions. Think out of the box and come up with unconventional topics, but related to Cryptography.

In the proposal, give a clear motivation of why you want to study that particular topic, and what you hope to learn out of it. It must also contain at least five relevant references that you used to form your opinion and will likely study as you work on your project.

Use 12 point, Times New Roman font, with 1 inch margins on US Letter page.

Activity to do

 

(NOTE: must create in Word because that’s the file extension to SUBMIT it).

Identify help desk job stressors.

Based on your on your understanding of help desk operations and job stress, make a list of 12  different factors in a help desk environment that can increase or decrease the job stress experienced by agents. Define in a sentence or 2 sentences what EACH OF THOSE factor is and means.

Google websites for ideas. Visit: www.cdc.gov/niosh/docs/99-101 (Links to an external site.)

www.helpguide.org/mental/work_stress_management.htm (Links to an external site.)

managementstudyguide.com/employee-stress.htm (Links to an external site.)

Then, Organize the stressors into  3 large categories (separate into paragraphs).

Support Queue Case Study

 Instructions

For this project, you will apply the CompTIA 6-Step Troubleshooting Process to explain how you would tackle Hudson Fisher Associates Help Desk Tickets. There are three groups of tickets, Level 1, Level 2, and Level 3. You will pick two tickets from each group.

As you prepare to analyze and hopefully solve these typical IT help desk tickets, keep in mind that for this course, it is more about the process and less about finding the “correct” answer. You may not always find an exact answer from the information given. The problems are structured to approximate what you will find in the workplace. Use a logical and repeatable process (e.g., the CompTIA 6-Step Troubleshooting Process) and eliminate the improbable as you work your way through each scenario.

CompTIA 6-Step Troubleshooting Process:

  1. Identify the problem.
  2. Establish a theory of probable cause.
  3. Evaluate the theory to determine the actual cause.
  4. Establish a plan of action to resolve the problem and implement the solution.
  5. Verify full system functionality and if applicable implement preventative measures.
  6. Document findings, actions, and outcomes.

How Will My Work Be Evaluated?

As you progress in your information technology and cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. For this assignment, you should articulate your findings from the six support cases.

But the challenge you face is in expressing a technical solution to a nontechnical audience. Avoid jargon and acronyms. Find a way to relay your solution (and challenges) in language that your audience will find easily relatable.

Communicating in this manner will not always be easy. You may struggle to find the right analogy or metaphor. But if you can master the skill of summarizing your results and recommendations to management in an effective presentation, you will demonstrate how you use your technical knowledge to convey your ideas to others in a professional setting. You will also earn the respect and trust of your peers, your supervisor, and upper management as an effective communicator. You will be viewed as an employee ready for advancement.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 12.7.2: Explain the process of analyzing IT incidents.
  • 13.1.1: Create documentation appropriate to the stakeholder.

Your deliverable for the project is an annotated PowerPoint Presentation covering the following:

  • List of the six tickets you selected (two each from Level 1, Level 2, and Level 3)
  • One to two slides for each ticket, in which you:
    • State the problem.
    • Describe the steps taken to troubleshoot/analyze the problem.
    • Propose a brief resolution.
  • One summary slide: What did you find challenging or interesting about one or two of the support cases (opinion-based)?
  • One reference slide (two to six IEEE references). Include references for materials you consulted in TestOut or on the internet.

If you haven’t already done it last week, download the Support Queue Case Study Presentation Template to get started.

Delete the instructional text from the template before you submit.  

When you are finished, click “add a file” to upload your work, then click the Submit button.

Due DateJul 6, 2021 11:59 PM 

week-9

 Cybercriminals use many different types of malware to attack systems. , explain how to defend  yourself against Spyware.  

Topic:Spyware

IT 472 week 3 assignment

Week 3 Assignment:

  • Identify the different kinds of project stakeholders. Explain their interests, roles, and contributions to a project.
  • During the Requirements phase of SDLC, the stakeholders’ requirements are captured in a document. Describe some of the methods and questions used  to understand the interests, needs and requirements of each stakeholder.
  • Explain “User Stories” and “Use Cases”. Include a chart to show examples of user stories and use cases.
  • Submit a full two to three page paper in APA format. Include a cover page, abstract statement, in-text citations and more than one reference.

Research Paper

Please refer to the attachments. Also, the Question is in the attachment  under name question project is mainly focused on EBAY sell button as attached in Attachment and please go through paper provided research has to be a continuation of attached paper. I need 5 pages along with citations and references.Follow APA format.