chryptography and BI

Q1.  Check out this website called  The 25 Best Data Visualizations of 2019. Select one data visualization            example that appeals to you the most. Using your own words, answer the following questions:

  • Why do you think it was identified as one of the 25 best?
  • How many dimensions of information were captured?
  • Do you find the data useful?
  • What do you like most about it?
  • What do you like least?

response should be 250-300 words.

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations

Q2. What are the privacy issues with data mining? Do you think they are substantiated?

response should be 250-300 words

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q3.Complete the following assignment in one MS word document.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

 1.How do you describe the importance of data in analyt- ics? Can we think of analytics without data? Explain.(150 to 200words)

2.Considering the new and broad definition of business
analytics, what are the main inputs and outputs to the
analytics continuum?(150 to 200words)

3.Where do the data for business analytics come from?
What are the sources and the nature of those incoming
data?(150 to 200words)

4.What are the most common metrics that make for
analytics-ready data?(150 to 200words)

5.Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to edu- cation, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-specific information and explanation provided on the site. Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.( 200-250 words)

6.Define data mining. Why are there many names and definitions for data mining?(150 to 200words)

7.What are the main reasons for the recent popularity of data mining?(150 to 200words)

8.Discuss what an organization should consider before making a decision to purchase data mining software.(150 to 200words)

9.Distinguish data mining from other analytical tools and
techniques.(150 to 200words)

10.Discuss the main data mining methods. What are the
fundamental differences among them?(150 to 200words)

11. Visit teradatauniversitynetwork.com. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling.(250to 300words)

Q4. analyze the history of the Caesar Cypher and its impact on cryptography.  Feel free to also include the impact of items such as the Scytale and the Polybius square.  All of these were used long before computers.You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.(250 -300WORDS)

Information System for Business

 

Chapter 2 – Study Questions 1-10, Exercise 2, Lab 2 (Information Systems for Business and Beyond) Submit the above homework in one document. 

5

Homework

Chapter 2 Paper: Discuss why the IT organizational structure is an important concept to understand.  Also, discuss the role of IT in the overall business strategy. (Information Technology and Organizational Learning Textbook)

The above submission should be one page in length and adhere to APA formatting standards.

**Remember the page length does not include the APA cover page or any references**  

Please find the below link for textbook reference: 

Chapter 2: Hardware

Blockchain IT Assignment

Blockchain Assignment:

Prepare a 3-5 page paper on the implications for voting, lotteries, certificate issuance, security auditing and enterprise. Discuss the impact on blockchain finance and how these functions will accelerate basic functions.

Your paper should be 3-5 pages long (excluding the title and reference pages) and formatted according to APA.

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3-5 page essay, you must include an APA-style title page and reference page.

Cyber security Research paper

  

The Research Report, select one of the following research areas:

i) Cyber Security and INTRANET Cloud Computing 

ii) Cyber Security and EXTRANET Cloud Computing 

iii) Cyber Security and Machine Learning

iv) Cyber Security and Artificial Intelligence

v) Cyber Security and Internet of Things (IoT)

vi) Cyber Security and Robotics

vii) Cyber Security and Medical Technology

Plagiarism report for document prepared

Requested help for my final project paper. But document prepared by writer was fully copied by another source. I was totally disappointed and it reflects on my grades. I reworked again to complete my project.

I lost my trust. Waste of time and money to deal

Operational Excellence Week -3

 In discussing Organizational Excellence, let’s start with an analysis of your organization or one with which you are familiar. Take the Organizational Diagnosis Questionnaire that is found above (attached)Provide a detailed analysis of what is working and what is not working. 

— 500 Words 

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Please write a 1000 words essay on the following and refer to the four attachmnets provided. 

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Technology Entrepreneurship

Que 1:  Discuss this statement: “Internationalization is a relevant strategic option for high-tech venture expansion and growth.” What makes this statement true? What facts support this statement? – Almost 1 page

Que 2:  Discuss this statement: “The application of financial theory to new venturing has uniquely defining characteristics that differentiates it from classical corporate finance.” What makes this statement true? What are the defining characteristics? – Almost 1 page

Que 3:  Read the attached case study and write 2 and a half-page summary analysis and answer the Case Study Questions.  

Note: My assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end.  Only use APA 7th edition. Que 3 needs to be in separate document. I have also attached APA 7th edition format for your reference. Please review and create the paper accordingly. 

research

Once you find the article, you will read it and write a review of it.  This is considered a research article review.Your paper should meet these requirements: 

Introduction to technology 1010

 We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly.