How Cloud services are helpful in utility sector.
The document should be of min 400 to 500 words with references(Optional).
How Cloud services are helpful in utility sector.
The document should be of min 400 to 500 words with references(Optional).
In Problems 2, you will be reading input from a file; use the fscanf() function to do so. When reading input from a file, you do not need to verify its validity. You can assume that it has the expected type and the expected value(s). In Problem 1, you will be reading input from stdin; input verification requirements for Problem 2 are described therein.
In each of the three problems in this lab, you will be required to declare and define certain functions. Doing so is essential: code that compiles and runs correctly, but does not implement all the required functions will not receive full credit. You are also welcome to implement additional functions. While this is not required, it can make your code easier to write.
And you should not use any functions from the C standard library, except for those functions that are declared in the file , such as printf (or fprintf), scanf (or fscanf), fopen, fclose, etc. In Problem 1, you can also use the functions rand and srand declared in
You will need to ensure to use proper APA citations with any content that is not your own work.
Question 1
Suppose that you are employed as a data mining consultant for an Internet search engine company. Describe how data mining can help the company by giving specific examples of how techniques, such as clustering, classification, association rule mining, and anomaly detection can be applied.
Question 2
Identify at least two advantages and two disadvantages of using color to visually represent information.
Question 3
Consider the XOR problem where there are four training points: (1, 1, −),(1, 0, +),(0, 1, +),(0, 0, −). Transform the data into the following feature space:
Φ = (1, √ 2×1, √ 2×2, √ 2x1x2, x2 1, x2 2).
Find the maximum margin linear decision boundary in the transformed space.
Question 4
Consider the following set of candidate 3-itemsets: {1, 2, 3}, {1, 2, 6}, {1, 3, 4}, {2, 3, 4}, {2, 4, 5}, {3, 4, 6}, {4, 5, 6}
Construct a hash tree for the above candidate 3-itemsets. Assume the tree uses a hash function where all odd-numbered items are hashed to the left child of a node, while the even-numbered items are hashed to the right child. A candidate k-itemset is inserted into the tree by hashing on each successive item in the candidate and then following the appropriate branch of the tree according to the hash value. Once a leaf node is reached, the candidate is inserted based on one of the following conditions:
Condition 1: If the depth of the leaf node is equal to k (the root is assumed to be at depth 0), then the candidate is inserted regardless of the number of itemsets already stored at the node.
Condition 2: If the depth of the leaf node is less than k, then the candidate can be inserted as long as the number of itemsets stored at the node is less than maxsize. Assume maxsize = 2 for this question.
Condition 3: If the depth of the leaf node is less than k and the number of itemsets stored at the node is equal to maxsize, then the leaf node is converted into an internal node. New leaf nodes are created as children of the old leaf node. Candidate itemsets previously stored in the old leaf node are distributed to the children based on their hash values. The new candidate is also hashed to its appropriate leaf node.
How many leaf nodes are there in the candidate hash tree? How many internal nodes are there?
Consider a transaction that contains the following items: {1, 2, 3, 5, 6}. Using the hash tree constructed in part (a), which leaf nodes will be checked against the transaction? What are the candidate 3-itemsets contained in the transaction?
Question 5
Consider a group of documents that has been selected from a much larger set of diverse documents so that the selected documents are as dissimilar from one another as possible. If we consider documents that are not highly related (connected, similar) to one another as being anomalous, then all of the documents that we have selected might be classified as anomalies. Is it possible for a data set to consist only of anomalous objects or is this an abuse of the terminology?
Statement of Purpose
Provide a statement of your educational background, experience, and preparation relevant to a graduate program in computer science, and specify your research and career goals.
The statement of purpose is a short essay introducing the applicant and his or her
interests, goals, and reasons for pursuing graduate study in history. Applicants may wish
to share a draft of their statement with the individuals writing their letters of
recommendation. While every statement, like every prospective student, will be different,
applicants should devote special attention to the following items:
• Academic/Professional Background: Please give your academic credentials, with
degrees, dates, and relevant employment experience. You do not need to list every
job you have had, only those that bear directly on your desire to enter graduate
school.
• Motivations and Aims: Explain what motivates you to do graduate work in history
and what your goals are, both within the graduate program and after the
completion of your degree.
• Existing Expertise and Accomplishments in History: Discuss any areas of
expertise you may already have in your proposed area of interest. If you have
experience doing research, please describe the project and your work on it. If you
have any special talents or skills, such as a foreign language, please describe
them.
• Proposed Course of Study: Please identify planned major field and minor fields of
study.
• Other Relevant Experiences or Personal Qualities: Discuss any experiences or
personal attributes that may illuminate your commitment to the study of history
and to the successful completion of the graduate program.
Format: Your statement of purpose should be limited to no more than 750 words
(between 2 and 3 pages).
For this assignment, you will analyze the roles of information systems in business and create an IT Proposal. You will take on the role of an IT manager and apply the methods for developing information systems to address business needs by including aspects from the major elements examined during the course that comprise information systems.
As an IT manager, you will have an impact on the technology decisions made by your organization and will often be asked to put together business proposals to provide solutions for the organization, as well as for existing or prospective customers. For this assignment, you will create a proposal for the following scenario.
Scenario
ABC Corp is a software company with a staff of fewer than 50 employees and a very large client base. The company is currently using an in-house proprietary customer relationship management (CRM) system that is reaching its maximum capacity. Additionally, ABC uses a web portal for their sales team to enter contracts, and a product enhancement database to capture defects and enhancements requested by customers. The systems contain redundant customer data that needs to be centralized. The systems have many silos that have resulted in an inefficient work-flow process for users, missed sales opportunities, and poor customer experiences because of the inability to access all customer data in one place. The company is in search of a scalable solution that streamlines operations and improves customer relations.
Include the following information in your IT Proposal.
The IT Proposal
**THIS MUST BE A+ WORK. Diagram mentioned must be high level***WHAT IS BEING ASKED MUST BE IN PAPER IN A CLEAR CONCISE MANNER
**Plagiarism Tools**
I agree to submit my paper(s) to the Global Reference Database
Hello,
i need this paper by 10/28 afternoon.
Strictly No plagiarism please use your own words.
Describe three network security risks and how an administrator may be able to defend against them.
An initial post must be 300 words.
Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism
Describe a Graphical User Interface (GUI) and compare it with the command line interface (CLI).
Enter two CLI commands on your computer and take screenshots.
Take a screen shot that shows a GUI interface. Add the screen shots to your Word document.
Subject: Emerging Technologies
Book: Technology Ventures: From Idea to Enterprise
Research project in stages throughout the course, to include: selecting a topic, submitting an abstract/outline, and submitting final project (paper) for evaluation. Must support work by using at least six appropriate, properly cited sources in addition to your course textbook. Project (paper) will comprise 3000 to 3500 words (not including title and reference pages).
1st need project abstract/outline
2nd research paper 3000+
Project (paper) must be formatted according to APA guidelines as a Word document, double spaced, Times New Roman, 12-font, with one inch margins.
Question:
Many new clean tech ventures have relied on funding and partnership from established corporations. Select a recently funded clean tech venture with corporate venture involvement. Did the funding impact the structure of the new venture? What does the new venture expect to gain from the backing by the larger corporation? What does the larger corporation expect to gain from being involved in the new venture?
Research on the difference between Data Analytics and Data Science and describe in your words. Find 15 or more analytics / data science related job titles and write one sentence about the primary job responsibility of each of them. The post should be 500 words or more