4s week 15 assignment IA

4 pages of assignment and 8 slides of Powerpoint presentation

Topic: Internet and IoT marketing strategy

Recommend 4 pages, including a cover page and reference page, at least three references and in APA format. Include a summary of presentation slides with highlights and details of your project. 

No copy-paste strictly. Plagiarism results in course termination.

assign

Answer the following questions. Please ensure to use the Author, YYYY APA citations with any content brought into the assignment.  

For sparse data, discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values. When would such an approach not be desirable?

Describe the change in the time complexity of K-means as the number of clusters to be found increases.

Discuss the advantages and disadvantages of treating clustering as an optimization problem. Among other factors, consider efficiency, non-determinism, and whether an optimization-based approach captures all types of clusterings that are of interest.

What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?

Explain the difference between likelihood and probability.

Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of connection (interconnectedness) of clusters.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation been avoided?

 Please write 350 words essay. 

Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software – that will give them access to your passwords and bank information as well as giving them control over your computer.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation  been avoided?

Reference Article Link: 

https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Prof Writing & Proposal Devel

 

Do a little bit of research on grant writing versus academic (scholarly) writing. 

Then…

1) Write a one sentence statement that describes the difference in grant writing vs. scholarly writing.

2) Research a need in your community and write a 100-300 word needs section in an academic writing style, citing your references in APA format. Copy and paste into the discussion forum. 

3) Write a quick one paragraph describing the mock dissertation topic (see list of topics below) that you will write about in this class and include your research question. Use academic writing style and standard. There is no word limit. 

 

  • Students must choose from the listed topics of their school/program:

 IT Students:

  • Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning
  • Using Data Science Techniques To Enhance Data Security