Summary of topics

There are TWO tasks that you would need to do( they are separate): 

Task 1:

Write a summary of the below points for a  total 300 words (100 words for each question with three research papers as reference)

 1.  What are the business costs or risks of poof data quality? Support your discussion with at least 3 references.

2.  What is data mining? Support your discussion with at least 3 references.

3.  What is text mining? Support your discussion with at least 3 references.

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index. 

Adding a Radius Server

 

In this lab you will be adding a Radius server for network security  that will prevent non-customers from tapping into your network by  requiring network authentication through a centralized network server  before a user can access your network. You will be continuing where you  left off with Unit 3 Graded Exercise: Cable/DSL ISP Network.

Download the graded exercise instructions. Type your class number:  10.___.0.0/16 in all of the underline ___ indicators, answer the  questions as you go through the steps and add the screenshots where  indicated in the instructions document. Save using the following file  naming convention YourFirst_LastName_U4_GE1.  Submit the document with  the screenshots using the upload instruction.  

Discussion help

 Please read the Journal Article in this Content Folder called “IT Doctoral Students with Completing Their Dissertations”. Create an initial post that shares your thoughts about what the major challenges are with pursuing a Ph.D. 

Note – uploaded the document.

Computer science

1.Enlist some commands of DDL, DML, and DCL.
2.Define DML Compiler.
3.What is DDL interpreter?
4.Enlist the advantages of SQL
5.Explain the terms ‘Record’, ‘Field’ and ‘Table’ in terms of database.

Opposing Shadow IT

Organizations do not always provide information systems that allow their staff to perform their responsibilities efficiently and effectively. Read the article, “Lifting the Veil Off Shadow IT.” Then, respond to the following:

  • Take a position favoring or opposing shadow IT.
  • If you are in favor, give one reason that shadow IT should be allowed. If you are not in favor, provide one way that the organization can reduce the risks of shadow IT.

information technology capstone

 Note: For this week only, you are only required to post your original reply to the discussion question for a total of 20 points.  No response is required.  Indicate at least one source or reference in your original post. You can use your textbook or current research articles. Please see the rubric for information on how I will assess your discussion post. 
QUESTION: Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service. (300words )

computer science

c++ program

Part A

use any web site and provide number of Dentists using the following format:

area codes included:

909

714

949

310

818

for each area code get 4 doctors to include the following data:

License number up to 5 digits

Name (last, first )

Specialities (General, surgeon)

Distance

write a menu to allow the user to search for

    Enter 1 to search by area code

     Enter 2 search by distance

   Enter 3 search by speciality

Store data in a text file called “indata.txt”

store the result in a text file “outfile.txt”

Read data from text file

Write a function to search by area code, when the user enter the area code, such as 909, all Dentists with area code 909 will come up ( all data).

Write another function to search by distance ( in this function display all the data and smallest distance with data belong to smallest distance)

 

Write a search function to look for dentist with specialty ( if the user searches for surgeon), all dentists  with surgeon specialty and its all data including, license number ,names, distance show up

Last function search by license number.

Write a function to display the result(s)

Use Binary search  as a backbone search Function

Apply: Signature Assignment: WebStore Implementation and Maintenance Plan

 

Imagine this scenario: Pine Valley Furniture’s board of directors is ready to review how to implement and maintain the new WebStore system. 

Create a 6- to 8-page implementation and maintenance plan for the new WebStore in which you:

  • Recommend an installation strategy for Pine Valley Furniture’s student furniture WebStore.
  • Justify your recommendation by stating the advantages and disadvantages in comparison to 3 other installation strategies.
  • Outline the documentation that you would suggest creating to:
  • Document the system
  • Train and support users
  • Outline the system testing plan.
  • Briefly describe the activities needed for the testing plan elements.
  • Summarize Pine Valley Furniture’s WebStore’s maintenance needs, including:
  • Alternate organizational structures
  • Quality measurement
  • Processes for handling change requests
  • Configuration management

Cite references used to support your assignment.

Format your citations according to APA guidelines.

Submit your assignment.