Write a complete C

  

Write a complete C program that finds and lists each 4-digit postive integer, X, that has the strange property that X to any positive power will end in those same 4 digits.

Project on Tokenization (token vault, Tokenization of Payments)

 

  1. powerpoint presentation with at least 12 slides not including a reference list. If you use images, you must provide proper attribution. Be focused and provide something your peers will find useful not what we could find on a Wikipedia page.
  2. An annotated reference list of at least five references. Annotations are notes. In this case write two paragraphs about each source. The first is a summary of what the source informs and the second is why it is valuable.
  3. A one page single spaced summary of what you learned in this project. it should be written in essay format with no bullet or numbered lists. It must include quotes from your sources which must be surrounded by quotation marks and cited in-line. It must have an informative title which should not be too broad but should focus attention on your topic.

Data mining

Assignment 1

When thinking about different algorithms and AI tools in organizations, what is the danger of having multiple data mining algorithms in various systems within an organization?  What can occur and why can this lead to inaccurate or inconsistent data?  Answer in 50 words.

Assignment 2

  1. What is knowledge discovery in databases (KDD)? 
  2. Review section 1.2 (Page no 4)and review the various motivating challenges.  Select one and note what it is and why it is a challenge.
  3. Note how data mining integrates with the components of statistics and AL, ML, and Pattern Recognition.
  4. Note the difference between predictive and descriptive tasks and the importance of each.

Follow the APA 7 format and keep the headings for each answer.  Ensure there are at least two-peer reviewed sources to support your work. Word document of 2 pages (this does not include the cover page or reference page).

Textbook: Introduction to Data Mining

Poetry: Why it is Important: Scott Griffin at TEDxBishopsU

LIT101 week 7 B

Discussion 7B: Poetry In Business

Most people can see how poetry can highlight people’s creativity and allow people to express their emotions. However, many people many not see the connection of how a knowledge of poetry can apply to professional settings.

To prepare for this discussion board assignment, review the following:

The Benefits of Poetry for Professionals: https://hbr.org/2012/11/the-benefits-of-poetry-for-pro (Links to an external site.)

Why People Need Poetry: https://www.ted.com/talks/stephen_burt_why_people_need_poetry/transcript?language=en (Links to an external site.)

Poetry: Why it is Important: Scott Griffin at TEDxBishopsU:Poetry: Why it is Important: Scott Griffin at TEDxBishopsU (Links to an external site.)Poetry: Why it is Important: Scott Griffin at TEDxBishopsU

Initial Response

After reviewing the articles, discuss what skills are important to understanding and/or writing poetry. Then, give a specific example of how those skills can be used in a professional setting. While some of the readings may have an example, I want you to come up with your own example. Be as detailed as possible.

Responses to Others

Once you have completed your initial response, respond to at least two other persons. What did you learn from their post?

Employment challenge in the digital era

Paper Requirements:  Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges are present in the digital era.  Will things get better or more complicated as times goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?

The paper should be one-page in length and adhere to APA formatting standards.

**Remember the page length does not include the APA cover page or any references**

SE491 week 2 di

Week 2: Discussion

 1. What are the common errors to avoid in your program when using

a.  variables?

b. conditional if statements?

Use examples to explain.

________________________________________________________________________________

You are required to make at least two comments on the responses posted by you classmates with a minimum of 50 words. 

Computer and Information Networking

 Q1).  Hackers break into systems and disrupt website services:

Discuss are they criminals, or are they challenging computer specialists to discover faults within computer networks and systems?

                                             Please list your reference/s

Q2)  

In your opinion what is/are the most security threats that organizations will have to be prepared for 2020-2021 ?

Please list your reference/s

concept of risk modeling

 write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks. 

 

  • Be approximately four pages in length, not including the required cover page and reference page.

homework

The following question needs to be completed in two hours ? could always use you for future work alot of future work if this assignment is done correctly ?

  

ISEC 620 Homework 2

Think about a software development project that has been conducted for a hospital.  The product being developed is a frontend web portal and backend software that processes the patient data resides in the hospital database. The name of the frontend web portal is MyHealth. Patients will see their test results, diagnosis reports, prescriptions, past, and upcoming reservation information in MyHealth portal. They will also have the opportunity of chatting with their doctors. Answer the questions below based on this information. 

Question 1

What kind of technologies/methods should be used to ensure that the patients’ privacy will be guaranteed? 

Question 2

Review the top 10 web application security risk (https://owasp.org/www-project-top-ten/). Select 2 of them and explain the potential impact of those on privacy.

Question 3

Describe security practices that fall into the “Requirements” phase of the SDLC?  Explain the projection of these practices in the upcoming phase of the SDLC. 

Question 4 – Weekly Learning and Reflection 

In two to three paragraphs of prose (i.e., sentences, not bullet lists) using APA style citations if needed, summarize and interact with the content that was covered this week in class. In your summary, you should highlight the major topics, theories, practices, and knowledge that were covered. Your summary should also interact with the material through personal observations, reflections, and applications to the field of study. In particular, highlight what surprised, enlightened, or otherwise engaged you. Make sure to include at least one thing that you’re still confused about or ask a question about the content or the field. In other words, you should think and write critically not just about what was presented but also what you have learned through the session. Questions asked here will be summarized and answered anonymously in the next class.

Research paper outline in 6 hours

Step 1: Select ONE Topic: The Research Report, select one of the following research areas: i) Biometrics ii) Organizational Management during times of crisis. iii) Failures of Knowledge Management Systems. iv) Successes of Knowledge Management Systems. v) Social networking in the 21th Century. vi) Web sports vii) Search Eng