discussion

 

Which role do you feel is more important in the organization – being the data administrator or the database administrator? Explain the difference as well as explain your selection. Provide a business use case example that exemplifies this choice clearly. 

 

Instructions

  • This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 
  • You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.
  • Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

Practical connection assignment with Data Science and Big data analytics- Please write 500 words and APA format with plagiarism free.

Hi, 

Please relate the below topics and what I learnt from this course and how I am currently using this course to software field in current project. 

Please relate below topics : 

Big Data and the Internet of Things

Title: Big Data Analytics for Manufacturing Internet of Things: Opportunities, Challenges and Enabling Technologies 

 Data Visualization (Storytelling)

 Big Data Mining vs Analytics 

Block chain and bitcoin economics

 Application of Blockchain in Industry and Business 

Limitations of blockchain 

FUTURE of blockchain

Please let me know if you have any questions

Would You Pay the Ransom

 Ransomware is malicious software that encrypts files and requires a key to decrypt the files. To get the files decrypted, the company or organization must typically pay the hackers a large fee, often in Bitcoin or another cryptocurrency. It is important to note that cryptocurrency payments are one-way transactions that are impossible to trace. There is risk, too. If the hackers do not provide the organization with the decryption key after payment, there is no refund 

3/1 Devote

During the COVID-19 stay-at-home requirements, many people worked from home. To carry on business, companies utilized various web-based meeting tools (such as Zoom). Some of these tools lacked robust security. A company, being proactive, sought to assure security against those attempting to take over such sessions.

In Christianity, God brings to mind those things we need to ensure protection against, including issues related to computer security. We again look to the word of God for Scripture that tells us that safety can be found in the Lord. Psalm 140:4 says, “Keep me safe, Lord, from the hands of the wicked; protect me from the violent, who devise ways to trip my feet” (NIV). We find in the Bible the admonition to seek the Lord in our activities as protection from those that would trick us.

  1. Review the material in the Getting Started section, including the specific Bible passage.
  2. Be sure to address to the following prompts in your paper:
    1. How do you see this verse applying to the attackers’ attempts at social engineering?
    2. How would you apply the principles of these verses in your workplace?
  3. Your paper should be at least 250 words in length.
  4. Submit your assignment by the end of the workshop.

D1

Organizations are struggling to reduce and right-size their information foot-print, using data governance techniques like data cleansing and de-duplication. Why is this effort necessary?  Briefly explain and support from your readings, using APA style citations. Remember to appropriately respond to two other learners for full credit.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.