4s week 15 assignment IA

4 pages of assignment and 8 slides of Powerpoint presentation

Topic: Internet and IoT marketing strategy

Recommend 4 pages, including a cover page and reference page, at least three references and in APA format. Include a summary of presentation slides with highlights and details of your project. 

No copy-paste strictly. Plagiarism results in course termination.

assign

Answer the following questions. Please ensure to use the Author, YYYY APA citations with any content brought into the assignment.  

For sparse data, discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values. When would such an approach not be desirable?

Describe the change in the time complexity of K-means as the number of clusters to be found increases.

Discuss the advantages and disadvantages of treating clustering as an optimization problem. Among other factors, consider efficiency, non-determinism, and whether an optimization-based approach captures all types of clusterings that are of interest.

What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?

Explain the difference between likelihood and probability.

Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of connection (interconnectedness) of clusters.

discussion api

 Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them? 

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation been avoided?

 Please write 350 words essay. 

Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software – that will give them access to your passwords and bank information as well as giving them control over your computer.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation  been avoided?

Reference Article Link: 

https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Prof Writing & Proposal Devel

 

Do a little bit of research on grant writing versus academic (scholarly) writing. 

Then…

1) Write a one sentence statement that describes the difference in grant writing vs. scholarly writing.

2) Research a need in your community and write a 100-300 word needs section in an academic writing style, citing your references in APA format. Copy and paste into the discussion forum. 

3) Write a quick one paragraph describing the mock dissertation topic (see list of topics below) that you will write about in this class and include your research question. Use academic writing style and standard. There is no word limit. 

 

  • Students must choose from the listed topics of their school/program:

 IT Students:

  • Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning
  • Using Data Science Techniques To Enhance Data Security

Project Assignment

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • What are the principles and limitations to an individual’s right to privacy?
  • What are the trade offs between security and privacy?
  • What is the issue of freedom of speech versus the protection of children online?

Due: Assignment is due on the day stated in  the Course Schedule

  • Provide three articles to substantiate the above three questions.
  • Use APA format to provide a citation for each of the articles you read.
  • Suggestion: Use a search engine (Google) and keywords.

Wireless

 What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.