The questions are in the word, you need use materials from the pdf which i have provided to answer it
Business Intelligence Assignment 2
Visit the AI Exploratorium at cs.ualberta.ca/~aixplore. Click the Decision Tree link. Read the narrative on basketball game statistics. Examine the data, and then build a decision tree. Report your impressions of its accuracy. Also explore the effects of different algorithms.
paper writing
NO PLAGIARISM
Research Paper
“There should be no plagiarism. Attach a plagiarism report with 0 % similarity index“
Task 1:
Any one of the below topics:
1. Cloud Computing
2. Big Data Analytics
3. Database Security
4. Enterprise Architecture
5. Data Warehouses
6. Ethics in IT
7. Web 2.0
8. E-Commerce
The research paper must be at least 10 pages but no more than 12 pages.
• The paper needs to be supported by evidence (citations from peer-reviewed sources).
• A minimum of four (4) peer-reviewed journal citations are required.
• No references should be more than 5 years old.
Task 2:
- Your PPT should reflect a summary of your Individual Research Report.
- You should have 12-15 slides.
Methodology used on topic
Try to find a quantitative, a qualitative and a mixed-method dissertation that may be closely related to Cloud migration and data security as key indicator in e-commerce and business success topic. Describe the method used, the sample, the population chosen, was there a survey involved, or a set of questions asked as in a qualitative study. Finally, can you identify the problem the dissertation tried to examine.
Mitigation Plan Creation
- As the HU Investment Firm cybercrime expert, you are required to create a Cybercrime Mitigation Plan. The overall cybercrime mitigation plan should be written with a minimum of two to three sentence description of what the outline will cover under each section.
- COPY THE CONTEXT FROM UNIT 5
- Use the following website as a guide to creating your Risk Mitigation Plan
Keep the following structure in mind as you develop your mitigation plan. You want to avoid or transfer as much serious risk as possible and have a detailed mitigation plan for the remaining risks.
Write your formal Mitigation Plan and ensure you include the following components:
- Understand the users and the needs of the users
- Research what the experts say about the needed mitigation for every element. Include that support in your report.
- Identify and evaluate recurring risks and explain in detail the plan to mitigate those risks
- Identify and explain opportunities to improve the system in order to reduce the negative impacts of some events
- Propose a plan to promote collaboration and dialogue about risk management and mitigation planning
- Ensure that your writing is professional, well-supported, and easy to understand for non-IT people
Computer Science Assignment
Need in 7 hours.
Research paper: COSO Framework
The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.
Your paper should meet the following requirements:
• Be approximately four to six pages in length, not including the required cover page and reference page.
• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
NO plagiarism at any cost.
Due on Friday (10/02/2020)
Course textbook:
Title: Managing and Using Information Systems
ISBN: 9781119560562
Authors: Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta
Publisher: John Wiley & Sons
Publication Date: 2019-12-05
Project Management
You are working on a project to develop a new or enhanced system to help people at your college, university, or organization to find jobs. The system must be tailored to your student or work population and be very easy to use.
- Write a two page paper describing how you would collect requirements for this system, and include at least five requirements in a requirements traceability matrix
- A minimum of 500 words excluding the title page and references is required.
- Use APA format – Refer to APA Style
Final Project – IoT Security Research
Securing IoT Devices: What are the Challenges? Read through attached documents to start on your research activity:
Security practitioners suggest that key IoT security steps include:
1) Make people aware that there is a threat to security;
2) Design a technical solution to reduce security vulnerabilities;
3) Align the legal and regulatory frameworks; and
4) Develop a workforce with the skills to handle IoT security.
Final Assignment – Project Plan (Deliverables):
Address each of the FOUR IoT security steps listed above in terms of IoT devices. Explain them in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.
This research paper must be in at-least 1000 words along with conclusion with no inline citations. Provide at-least 3 reference at the end with hyperlinks enabled.
Note: Use your own words. Plagiarism score must be less than 15%. Please attach plagiarism report along with answer document while submitting.