Show the results (using screenshots) of executing each SQL statement against the database you created . Do not highlight your SQL statement in MySQL Workbench before taking the screenshot (this makes it difficult to read the output). For the VIEWs create in exercise-3, also show the results of executing a SELECT * … statement against the VIEW. All screenshots and text must be submitted as a single Word document.
Assignment
Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator?
Post between 200 and 300 words.
IA FP
In 750 words.
Describe two cryptographic applications and how they are used in Information System Security.
Should include
1. summary- one page
2. 3 References
Research paper Summary
There are TWO tasks that you would need to do( they are separate):
Task 1:
Write a summary of the below point for a total of 300 words
1. Read four (4) academically reviewed articles on Cyber Security and Risk Management.
2. Summarize all four (4) articles in 300 words or more. Please use your own words. No copy-and-paste
3. Base on your article review and the assigned reading, discuss the relationship between cybersecurity and risk management.
4. As an IT manager, discuss how you will use the concepts discussed in the four articles in the management of IT risks within your company
TASK 2:
Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each.
There should be no plagiarism. Attach a plagiarism report with 0 % similarity index.
week 1 discussion
see details
Question based on a book from Kirk, Andy. Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications
Kirk (2016) tells us that all requirements and restrictions of a project must be identified. Select 1 key factor below and discuss why Kirk (2016) states it will impact your critical thinking and shape your ambitions:
- People: stakeholders, audience.
- Constraints: pressures, rules.
- Consumption: frequency, setting.
- Deliverables: quantity, format.
- Resources: skills, technology
Reference: Kirk, Andy. Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications
essay
- Select a company of your choice and perform a case study similar to the Telenor case study described in the above article.
- You may not have direct access to the company you select, which means you may not be able to conduct interviews, and you may not have access to all the information you would like access to.
- Your case study must follow APA guidelines (see my guide in Week 1)
- Your case study paper must be organized with the following level two headings. Use level one and level three headings as needed).
- Company Background
- Company Business Strategy
- Company IS/IT Strategy
- IS Strategy Triangle (Read Shanardi and find other resources before arriving at the Friday meeting)
- Strategic Alignment Model (Read Henderson and Venkatraman and find other resources before arriving at the Friday meeting)
- Strategic Alignment Maturity Model (Read CIO wiki and find other resources before arriving at the Friday meeting)
- Strategic Grid (Read McFarlan, McKenney, and Pyburn and find other resources before arriving at the Friday meeting)
- Limitations (Cover the limitations of your study and paper)
- Conclusions
- Your paper must include at least five scholarly sources beyond the resources provided on Blackboard
- Your paper must include a cover page with the names of all team members.
BI Week 16 Assignment
Complete the following assignment in one MS word document:
Chapter 14–discussion question #1, #3, #4 & exercise 2
APA in-text citations) to support the work this week. All work must be original (not copied from any source).
Discussion 1. Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view.
Discussion 3. What are some of the major privacy concerns in employing intelligent systems on mobile data?
Discussion 4. Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.
Exercise 2. Search the Internet to find examples of how intelligent systems can facilitate activities such as empowerment, mass customization, and teamwork.
CV 3
please see attached.
Analysis of algorithm
1. There are n marble balls, one of which is made of a different material. You have access to a Comparator that can compare two inputs (of an arbitrary number of marble balls) and determine if the two inputs are the same or not. The problem is to find the single marble ball that is different from the others while minimizing the number of times you access the Comparator. Design an efficient algorithm based on prune-and-search to solve the problem. Derive the time complexity of your algorithm.
2. Show how to maintain a dynamic set Q of numbers that supports the operation MIN-GAP, which gives the magnitude of the difference of the two closest numbers in Q. For example, if Q ={1, 5, 9, 15, 18, 22}, then MIN-GAP.Q/ returns 18 – 15 = 3, since 15 and 18 are the two closest numbers in Q. Make the operations INSERT, DELETE, SEARCH, and MIN-GAP as efficient as possible, and analyze their running times.