Cluster Analysis and Decision Tree induction algorithm
Portfolio project
- The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.
The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.
Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems. Several challenges have already been associated with the use of this technology. Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.
There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.
Conclude your paper with a detailed conclusion section which discusses both limitations and emerging concepts.
The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
Your paper should meet the following requirements:- Be approximately seven to ten pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing
discussion
Annotation is a crucial component of a good dataviz. It can turn a boring graphic into an interesting and insightful way to convey information. Dataviz is often separated in two main types: exploratory
and explanatory
analysis. Annotation is used for the second type.
Our current attention span for looking at things online is, on average, less than five seconds. So if you can’t grab someone’s attention within five seconds, you’ve likely lost your viewer. Adding accurate annotation can greatly help to grab audience attention. Use keywords, shapes, colors and other visuals to help them go straight to the point.
Annotation is a general concept, and hundreds of different ways to annotate a chart exist, depending on the context
.
What are effective ways to leverage annotation in data visualizations? Provide 3 examples of how you would effectively use annotation in a data visualization. Describe how you would use them to keep viewers’ attention.
Discussion Length (word count): At least 250 words
References: At least three peer-reviewed, scholarly journal references.
Technology
Which data storage is the best option for CLOUD
Wk 4 – Comparing a Security Strategic Plan to a Security Policy and Aligning to Security Controls
2 Part Assignment
Assignment Content
- The information security strategic plan and security policies are strongly interrelated within an organization’s information security program. The security plan and security policies will drive the foundation and selection of security controls to be implemented within the organization.
Part 1
Write a 1- to 2-page summary of the comparison chart of strategic plans and security policies you completed in this week’s Learning Team assignment.Part 2
Review the control families described in this week’s reading, NIST SP 800-53a Revision 4, Assessing Security and Privacy Controls for Federal Information Systems and Organizations.Review the controls from this week’s reading, CIS Controls V7.1.
Develop a 2- to 3-page matrix using Aligning Security Controls to NIST Security Controls Matrix Template that accurately maps CIS controls to NIST security control families. Note that some CIS controls may map to multiple NIST control families.
Cite all sources using APA guidelines.
Submit your assignment.
Assignment
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Minimum of 400 words
What does a peer review process look like? When does an assessment require peer review? Who should perform the peer review?
federated architecture in cloud systems
Discuss in 500 words or more federated architecture in cloud systems. Remember that this is a cloud class, not a database class.
Cite your sources. Do not copy. Write in essay format, not in bulleted, numbered, or another list format.
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding the length of your post, and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested.
Issues/breaches the company has gone through
Pick a company to focus on for this assignment. Based upon the given information you can find on the company and any technology-related issues/breaches the company has gone through no older than 5 years, create Crisis Management Plan
- Introduction – brief background of company and any issues the company has had in the past such as data breaches
- Strategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company)
- Risk Analysis – political analysis, environmental analysis (more or less depending upon company)
- Crisis Management Plan:
- Purpose
- Committee for crisis management planning
- Crisis types
- Structure of the Crisis Management Team
- Responsibility and control
- Implementation Plan
- Crisis Management Protocols
- Crisis Management Plan Priorities
- Conclusion
- Divide the work on the plan amongst your group members.
References – APA format
Page Count Range should be 10 pages not including:
Title page, Table of Contents and References page
Data structure & algorithm
Use a two-dimensional array to solve the following problem: A company has four salespeople (1 to 4) who sell five different products (1 to 5). Once a day, each salesperson passes in a slip for each different type of product actually sold. Each slip contains:
a) The salesperson number,
b) The product number, and
c) The total money value of the product sold that day.
computer science
c++ program
Part A
use any web site and provide number of Dentists using the following format:
area codes included:
909
714
949
310
818
for each area code get 4 doctors to include the following data:
License number up to 5 digits
Name (last, first )
Specialities (General, surgeon)
Distance
write a menu to allow the user to search for
Enter 1 to search by area code
Enter 2 search by distance
Enter 3 search by speciality
Store data in a text file called “indata.txt”
store the result in a text file “outfile.txt”
Read data from text file
Write a function to search by area code, when the user enter the area code, such as 909, all Dentists with area code 909 will come up ( all data).
Write another function to search by distance ( in this function display all the data and smallest distance with data belong to smallest distance)
Write a search function to look for dentist with specialty ( if the user searches for surgeon), all dentists with surgeon specialty and its all data including, license number ,names, distance show up
Last function search by license number.
Write a function to display the result(s)
Use Binary search as a backbone search Function