Introduction to Data Mining

  

Write a 3-4 page APA formatted paper on a business problem that requires data mining, why the problem is interesting, the general approach you plan to take, what kind of data you plan to use, and finally how you plan to get the data. You should describe your problem, approach, dataset, data analysis, evaluation, discussion, references, and so on, in sufficient details, and you need to show supporting evidence in tables and/or figures. You need to provide captions for all tables and figures.

Your paper should include an abstract and a conclusion and a reference page with 3-5 references.

COMPUTER SECURITY Week 11

create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Discussion (course: Information security risk management)

 Discuss the difference between a Continuity of Operations Plan (COOP), a Business Continuity Plan (BCP), and a Disaster Recovery Plan (DRP).  You might want to start with the definitions from the NIST SP 800-34, located at http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-34r1.pdf.  Section 3.5 discusses the different types of Plan Testing, Training, and Exercises. 

Question 20201116

  

Your Research Project on “Cloud computing” topic the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.

Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software. 

Internet of things Article – Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things:

 For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 2 to 3 pages (600 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

ppt

select a disaster recovery case and summarize it in a PPT.  

 The last page should be references and The design and content will be judged. 

Power BI Competition

Topic:

  • Research at least 2 other products that compete with Microsoft Power BI (Business Intelligence).
  • Discuss some pros and cons of these competing products relative to the Microsoft offerings
  • Provide a comprehensive initial post with 3-4 well-developed paragraphs. They should include a topic sentence and at least 3-5 supporting sentences with additional details, explanations, and examples.
  • Website References

Discussion 6 cryptography

 Question: Analyze the advantages and disadvantages of digital signatures. 

You must use at least one scholarly resource. 

 – Every discussion posting must be properly APA formatted. 

– 400 Words

– No Plagiarism

– No References