executive summaries

 1 page discussion

  1. Search the internet for sample executive summaries.
  2. From your research, describe 3 items that need to be in an executive summary and your reasons why.
  3. Include in your report the ways that you would ensure that your executive summary would get buy-in from the key stakeholders of this project.

Research Paper – Info Tech Strat Plan

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Big Data Research Paper

While this weeks topic highlighted the uncertainty of Big Data, the author identified the following as areas for future research.  Pick one of the following for your Research paper:

Additional study must be performed on the interactions between each big data characteristic, as they do not exist separately but naturally interact in the real world.

The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.

New techniques and algorithms must be developed in ML and NLP to handle the real-time needs for decisions made based on enormous amounts of data.

More work is necessary on how to efficiently model uncertainty in ML and NLP, as well as how to represent uncertainty resulting from big data analytics.

Since the CI algorithms are able to find an approximate solution within a reasonable time, they have been used to tackle ML problems and uncertainty challenges in data analytics and process in recent years.

Your paper should meet these requirements: 

Be approximately four to six pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Apply Machine Learning Classification Models to Iris Flowers Dataset

Apply Machine Learning Classification Models to Iris Flowers Dataset 

Write a program to apply Machine Learning classification models to Iris flowers dataset. Follow the steps:

  1. Download the iris.csv file (example: https://gist.github.com/netj/8836201). From this file the label (target) is defined with the ‘variety’ column and the features with ‘epal.length’, ‘sepal.width’, ‘petal.length’, ‘petal.width’ columns.
  2. Preprocess the iris.csv file by label encoding the target ‘variety’ column.
  3. Apply the following Machine Learning classification models: K Nearest Neighbors and Random Forests
  4. Calculate the following classification metrics to validate the model: Accuracy Score, Confusion Matrix and Classification Report
  5. Explain how the program works and compare these two classification models

Requirements:

  • Maximum four to five pages in length is required.
  • You must include program code and results.
  • You must include an explanation about how the program works.
  • You must show your work for full credit.
  • You must include a minimum of three credible sources. Use the Saudi Electronic Digital Library to find your resources.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.

The Meat Lady Dilemma

 Mrs Parker owns and operates a meat shop that processes and packages parcels of minced meat that is being sold to schools in the US. Her scales are all calibrated to perform measurement in pounds, however when the parcels are packaged, they need to be labelled in ounces. Mrs Parker has established that 1 pound is equivalent to 16 ounces. In each production cycle, 250 packs of meat are processed and the weight in pounds varies for each package. Mrs Parker is also interested in knowing the total costs, the total revenue and the total profit of each production run, given that the costs to produce and package an ounce of meat is US $0.25 and that the selling price of an ounce of meat is US $0.55. Because you are a budding Software Engineer, she has sought your assistance in creating a software solution that can be used within the business establishment. 

Required: A. Specifically identify the type of control structure which is needed to process the meat in each production run and provide a reason for your choice (4 marks) 

B. Your solution needs to represent the meat packages which are to be processed, how would you represent this appropriately in your program and what has guided your choice?  (4 marks) 

C. Construct a C# program that will solve Mrs Parker’s dilemma by making use of the choices made above. 

i. Implementation of the control structure to process the meat (2 marks) 

ii. Implementation of the meat packages to be processed (2 marks) 

iii. Calculation of costs, revenues, and profits (6 marks) 

iv. Appropriate program outputs displayed to the user 

Emerging Information Tech

 

This week I would like you to write a 4-page reflective paper on what you have learned so far in this course and how you will be able to apply the lessons learned.

Paper Requirements 

  • 4 pages (including title page, 2 pages of content,  and reference page) 
  • 1 Inch Margins 
  • Running Header
  • 12 pt font
  • double spacing
  • References from the text
  • Use of outside references 

Some questions to consider to help you draft your response 

  • What are the main lessons that have resonated with me?
  • Why did these lessons resonate with me?
  • What concepts were easy to learn and why?
  • What concepts were more challenging to understand and why?
  • How could I use this in now and in the future?
  • What lessons do I have direct experience with and why?

emeging-discussion

 

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Final Project Paper

  

Topic: Home Automation Security and Vulnerabilities

Need to write 600-word paper (excluding References and Title page) written in APA format, showing sources/References and one page with bibliography

 Abstract:

We all recognize that the home technologies are designed such that it makes our lives easier, comfortable and also more convenient. But new conveniences should not mean to bring new problems but that indeed the case is in most of the cases in the current world. The issues of using automation in everything are most often discussed on social media or any blogs etc. For example, connecting home appliances/devices to the Internet makes you dependent on the connection quality and the servers they operate on. In parallel, cybercriminals are waiting on a poor link where they can use those points of entry gain control on the equipment that is open and vulnerable for attacks and use it to their own advantage in most cases. Many studies recently have revealed that number of ways are still there to take control of a smart home equipped and connected with smart devices. One such issue for example, could be a vulnerability in the cloud server with the help of which the home owner controls the house remotely using the controls that operates the devices, or even something seemingly innocuous like a smart light switch. In this paper, we will get in to more details of what devices are currently used as smart home safety/convenient devices and how vulnerable they are with some examples which happened in the real world. Safety measures that can be put in practice if equipped with this technology and other safety practices when decided to use this smart/convenient devices at home.