numerical computation project

 This is simple project about numerical computation of Computer Science. It is going to be not heavy work. Read the Project.pdf and do the work and fill the Word Template and Lab report files what I attached.  

Final Research Project

  

Data Analysis and Data Mining

As more and more people are becoming connected over the internet and are also becoming more and more dependent to technology, the level of data that happens to be developed over time has been on a gradual rise since the internet and tech boom in 2002*. This sudden increase in data has resulted in various forms of data being developed. One of these forms is known as data analysis where as the other happens to be data mining. These two concepts can closely be assumed to relate, however, this is never the case since these two concepts happen to be rather different in a large number of ways.

For instance, data analysis happens to deal with the extraction, cleaning, transformation, remodeling, visual representation and grouping of data into information that can be consumed and used in making decision or coming up with a particular conclusion. Thus, this does point out that data analysis is mainly used for the main purpose of making sense of complex data that is yet to be processed into understandable information (Zaki & Meira, 2014). Data analysis also happens to be used in testing hypothesis, this results in placing data analysis in being used in statistics, mathematics as well as computer science based structures as a means of deriving a set of findings or conclusions from collected data. 

On the other hand, data mining does happen to follows some principles of data analysis and can be grouped under data mining, however, data mining happens to be the extensive exploration and evaluation of large amounts of data with the purpose of retrieving or identifying a hidden pattern in a large data set. Data mining is also used in developing machine learning and AI system models that happen to be used in conducting effective data analysis. data mining is also known as information discovery since it ends up looking at various sets of data and attaining a fixed finding from the data set presented (Zaki & Meira, 2014). Data mining is also used in a large structure of data that contains immense complexities since it does not require visualization as a result of its initial purpose of making data usable, that is, turning raw data into valuable information.

References

Zaki, M. J., & Meira, W. (2014). Data mining and analysis: fundamental concepts and 

algorithms. Cambridge University Press.

Digital forensics and how it could be used in a risk management program?

  

Articles:

 

Montasari, R., & Hill, R. (2019). Next-Generation Digital Forensics: Challenges and Future Paradigms. 2019  IEEE 12th International Conference on Global Security, Safety and  Sustainability (ICGS3), Global Security, Safety and Sustainability  (ICGS3), 205. https://doi.org/10.1109/ICGS3.2019.8688020

Sahinoglu, M., Stockton, S., Barclay, R. M., & Morton, S.  (2016). Metrics Based Risk Assessment and Management of Digital  Forensics. Defense Acquisition Research Journal: A Publication of the Defense Acquisition University, 23(2), 152–177. https://doi.org/10.22594/dau.16-748.23.02

The readings this week expand on investigation and of digital  forensic analysis and investigations. Organizations, especially those in  the public, health and educational areas are bound by legal and  statutory requirements to protect data and private information,  therefore digital forensics analysis will be very beneficial when  security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

 A substantive post will do the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC  Library) that applies to the topic, along with additional information  about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial  discussion thread. Be sure to use information from your readings and  other sources from the UC Library. Use proper citations and references  in your post.

Discussion

 MIT computer science professor Harold Abelson has said, “In today’s online world, what your mother told you is true, only more so:  people really can judge you by your friends.”  Have you ever been upset or embarrassed by what your friends posted on Facebook or other social media sites?  Are you concerned that people (other friends, colleagues, employers or potential employers, etc.) are going to judge you based on what your friends are posting? 

Research Paper & Discussion

1. •• Research paper **

 Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

What is penetration testing

Testing Stages

Testing Methods

Testing, web applications and firewalls

Your paper should meet the following requirements:

Be approximately four to six pages in length, not including the required cover page and reference page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

2. ** Discussion post **

 There is much discussion regarding Data Analytics and Data Mining.  Sometimes these terms are used synonymously but there is a difference.  What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used. Also explain how you may use data analytics and data mining in a future career. Lastly, be sure to utilize at least one scholarly source from Google Scholar. 

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

Ask an interesting, thoughtful question pertaining to the topic

Answer a question (in detail) posted by another student or the instructor

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

essay

 Choose one of the aphorisms listed above.  Who first wrote/spoke the aphorism or where does it originate?  What does the aphorism mean?  What is the author’s truth?  Why do you agree or disagree with the aphorism and how if at all has it made you rethink what you thought about the topic before researching the aphorism?  How could you apply this “wisdom” to your life?   
 

 1. “The rich stay rich by acting poor.  The poor stay poor by acting rich.”

2. “If you want a friend get a dog.”

3. “It takes 20 years to become an overnight success.”

4. “Nothing is certain but death and taxes.”

5. “This too shall pass.”

6. “Trust but verify.”

7. “Genius is one percent inspiration and 99 percent perspiration.”

8. “Failure to prepare is preparing to fail .”

9. “If you want something done right do it yourself.”

10. “There’s nothing new under the sun.”

11. “Simplicity is the ultimate sophistication.”

12. “Less is more.”

13. “Buy land.  They’re not making it anymore.”

14. “Misery loves company.”

15. “Be careful what you ask for.  You might get it.”

16. “Work smart, not hard.”

17. “To everything there is a season and a time for every purpose under heaven…”

18. “Brevity is the soul of wit.”

19. “A rose by any other name smells as sweet.”

20. “Carpe diem.”
 

 For composition exercises two and three please write:
1. (format) a 500-word composition.  Use Courier New, 12-point font and double space. 

2. (content) Your composition needs a main idea, major points and specific details.  Respond to the topic/aphorism in your first paragraph.  Present your main idea in the first paragraph.  Then use the rest of your 500-word limit to support your main idea.  You must cite from the material you’ve read to support your ideas. As Abraham Lincoln wrote, “It is a pleasure to be able to quote lines to fit any occasion.”  Use two-three quotes from the sources in your composition to “fit” your interpretation of the aphorism.

3. (focus) Stay focused on the topic.  Everything you write should have a connection to the topic and your main idea. 

4. (clarity) When you proofread check for common errors like fragments, run-on’s, commonly confused words, tense shift, subject-verb disagreement, spelling, etc.  Try to adhere to the KISS Principle.  Keep your sentences short and simple and divide your composition into paragraphs. 

positive rights table

Complete a 1- to 2-page table using the Positive Rights Table Template provided comparing your opinion of the rights listed below to a corresponding ethical theory:

  • The right to a higher education
  • The right to private phone conversations
  • The right to health care
  • The right of a presidential or government candidate to receive time on television

List 1 ethical challenge that could impact a U.S. company that wants to acquire a non-U.S.-based company.

Information system Assignment

Chapter 3 – study questions 1-8, Exercise 2, 4, & 5 (Information Systems for Business and Beyond) Submit the above homework in one document

Title Page

Chapter 3 – Complete the two essay assignments noted below: (Information Technology and Organizational Learning)

Review the strategic integration section.  Note what strategic integration is and how it ties to the implementation of technology within an organization.

Review the information technology roles and responsibilities section.  Note how IT is divided based on operations and why this is important to understand within an organization.

The above submission should be two -pages in length (one page for each question) and adhere to APA formatting standards.

**Remember the page length does not include the APA cover page or any references**