Data analysis

Develop an APA-formatted paper that presents a detailed analysis and research-based information pertaining to ALL the following topics:

  • Describe the two key abilities brought by the data discovery technology.
  • List and explain types of data flaws and techniques and methodologies used to mitigate the risks that may be introduced by the flaws of the data and make data more meaningful to organizations.
  • List and demonstrate the types of the data applicable to different industries by looking at successful case studies of well-known organizations.

Discussion question

Discuss what is Network capacity Planning and how do you measure/determine the capacity of your network? Are there any tools to assist you in network capacity planning?

DSRT topic

Information technology in the workflow of business processes is the topic

In a minimum 5-pages, develop an introduction where you clearly explain the overall research topic, literature gathering process, and the scope and organization of the literature review. The introduction should conclude with a paragraph that describes the sequence of the literature you will include and the literature analysis process. After the introduction, you should incorporate possible headings/subheadings that you plan to cover and include at least 20 scholarly references.

Deadline is in 3hrs

everything should be in apa format

and can i have turnitin report

Executive Summary on Risk Mitigation

 Given the information presented in Lesson 1 and the materials from “Assignment: Executive Summary on Risk Analysis,” your task for this assignment is to:

  • Identify at least five risks to the IT resources.
  • Write an executive summary report that describes:
    • The importance of a security policy
    • Methodology to implement the policies to mitigate the identified risks

Required ResourcesMaterials from Assignment: Executive Summary on Risk AnalysisSubmission Requirements

  • Format: Microsoft Word
  • Font: Arial 10-point size, Double-space
  • Citation Style: Follow your school’s preferred style guide
  • Length: 500 words minimum

Evaluation Criteria and Rubric

  1. Incorporate the risk analysis executive summary from Lesson 1
  2. Support the importance of a security policy in the executive summary
  3. Suggest methodology to implement the policies to mitigate the identified risks

 

scheduler of a computer system

     

This Assignment is an implementation of a small simulation program. It is a simulation of a process scheduler of a computer system. This simulated scheduler is a very small, simplified version, which reflects some of the basic operations of a typical process scheduler. 

To successfully finish the program, you are expected to:
know how to define and use a user-defined comparator

knowhow to use Java’s PriorityQueue.
know how to write a small simulation program. 

Database Management ER Diagram and SQL workbench.

  

Part 2: – Project Implementation – due Nov 20st @ 11:00 pm:

Report 2 Contents:

1) Project goals.

2) Database description: A general description of the database, what data is stored in the database.

How the database will benefit the users.

3) Data model & design:

o Completed ER/EER diagram; 8 tables 

 MUST use https://www.draw.io to draw the ER diagram, and then take a

snapshot.

 Include a snapshot of the diagram in the report.

o Business rules.

o Data dictionary: For each one of the tables, list columns, data types, column restrictions,

column descriptions.

4) Implementation:

o Use MySQL Server and MySQL Workbench to create the database/tables.

 Include a snapshot of the SQL code in your report

o Populate the each table with a minimum of 20 rows of sample data. Make sure the

entered data is descriptive (not just random numbers and letters.

 Include a snapshot of the SQL code in your report.

o Use MySQL Server and MySQL Workbench to write/run the SQL queries below. For

each query, provide the following in Report 2:

 Snapshot of the code and the output in the report.

 In about 2 lines, explain what the query returns.

Queries:

 1 trivial query. Simple select with ordering.

 2 medium difficulty queries. Queries that use composite condition for selection,

computations, aggregate function and grouping.

 1 query that uses subquery.

 2 queries that uses join (1 inner join, 1 left or right outer join).

 1 view (query must use join – hint: you can use one of the queries from the

previous question).

 1 query that uses union.

 1 custom stored function.

 1 custom stored procedure.

Jaba programming

Ship, CruiseShip, CargoShip Classes, and Displayable Interface

Design an abstract Ship class that has the following members:

• A field for the name of the ship (a string).• A field for the year that the ship was built (a string). • A constructor and appropriate accessor and mutators.• A toString method that displays the ships name and the year it was built.

Design a CruiseShip class that extends the Ship class. The CruiseShip class should have the following members:

• A field for the maximum number of passengers (an int).• A constructor, a copy constructor, and appropriate accessors and mutators.• A toString method that overrides the toString method in the base class. The CruiseShip class’s toString method should display only the ship’s name and the maximum number of passengers.

Design a CargoShip class that extends the Ship class. The CargoShip class should have the following members:

• A field for the cargo capacity in tonnage (an int).• A constructor, a copy constructor, and appropriate accessors and mutators.• toString method that overrides the toString method in the base class. The CargoShip class’s toString method should display only the ship’s name and the ship’s cargo capacity.

In a driver program (shipDemo.java) 

• Demonstrate the classes in a Ship array. Assign various CruiseShip and CargoShip objects to the array elements. The program should then step through the array, calling each object’s display method. (polymorphism)• Create an ArrayList of Ship objects and add various CruiseShip and CargoShip objects to the array list. The program should then step through the array list, calling each object’s toString method. (polymorphism)• Test your copy constructors in both CruiseShip and CargoShip in shipDemo.java

Interface to your lab 3 (Ship implements Displayable).

public interface Displayable
{
 void display();
}

Resource: 

• UML• Sample Program (OOP_example_2)

Deliverables:

• Displayable.java (10%)• Ship.java (20 %)• CargoShip.java (15%)• CruiseShip.java (15%)• ShipDemo.java (30%)• Screenshot (10%)

Note: Sparingly comment your java source code, save all the files in your_lastname_lab_3 folder, zip it, and upload for grading.

Thank you!