Business Intellegence

Discussion: Examine Alexa’s skill in ordering drinks from Starbucks. 

Discussion Questions: 

1. Some people say that chatbots are inferior for chatting. Others disagree. Discuss. 

2. Discuss the financial benefits of chatbots. 

3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are. 

Exercises: 

1.  Compare the chatbots of Facebook and WeChat. Which has more functionalities? 

2.  Research the role of chatbots in helping patients with dementia. 

3.  Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done. 

Presentation Computer Science(( must complete in 6hrs ))

Instructions

Explain and provide example when it is possible that will cover chapter 4 subjects:

Data Link Layer

Media Access Control•

Controlled Access•                         Contention Access–                  ErrorControl•                                Prevention•                                     Detection•                                     Correction–                                      Protocols•                                            Async•                                                   SDLC•                                                Ethernet•                                                 PPP–Transmission Efficiency and Throughput

Additionals resources

https://www.csus.edu/indiv/m/millerd/Ch4%20Ed7%20Notes.ppt

5s week 8 assignment PL

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

include references. do not copy paste.

Business intelligence Discussion Questions

Question 1

Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.

Question 2

 What are the privacy issues with data mining? Do you think they are substantiated?

-each question with at least 500 words and 2 references in apa format.

Biometric Techniques – Cybersecurity

Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits  and the  vulnerabilities associated with that method in 3-4 paragraphs.

– No Plagirism

– References required

Project Management

   

 You are working on a project to develop a new or enhanced system to help people at your college, university, or organization to find jobs. The system must be tailored to your student or work population and be very easy to use.

  • Write a two page paper describing how you would collect requirements for this system, and include at least five requirements in a requirements traceability matrix

 

  • A minimum of 500 words excluding the title page and references is required.
  • Use APA format – Refer to APA Style 

cis 500 week 4

Please respond to the following:

You may have noticed that when you look at products on a search engine, that same product appears as an advertisement in your social media and other sites you visit. Many search engines provide advertisers with tools for evaluating the impact of different keywords or phrases. These tools typically “track” user behavior patterns and associate products for sale by companies that subscribe to and pay for their services to help identify potential customers. On the other hand, there are also ad blockers that block this type of communication.

  • What constraints, if any, should be applied to this practice? Do not repeat ideas that have been posted by other students.
  • How might your feelings toward the technology be affected if you are the CIO or an executive manager at a small company that depends on this type of advertising to generate revenue?

300 words

1. List Outcomes from the  Course – List the outcomes (objectives) as written in the course syllabus from the course.
2. Apply Your Work Experiences to The Course – Correlate your job responsibilities with the  course outcomes listed above.
3. Length of Assignment –350 words, double-spaced using Times New Roman, 12 pt. font.