Two C program

 In Problems 2, you will be reading input from a file; use the fscanf() function to do so. When reading input from a file, you do not need to verify its validity. You can assume that it has the expected type and the expected value(s). In Problem 1, you will be reading input from stdin; input verification requirements for Problem 2 are described therein. 

In each of the three problems in this lab, you will be required to declare and define certain functions. Doing so is essential: code that compiles and runs correctly, but does not implement all the required functions will not receive full credit. You are also welcome to implement additional functions. While this is not required, it can make your code easier to write. 

And you should not use any functions from the C standard library, except for those functions that are declared in the file , such as printf (or fprintf), scanf (or fscanf), fopen, fclose, etc. In Problem 1, you can also use the functions rand and srand declared in and the function time declared in    

Intro to Data Mining

You will need to ensure to use proper APA citations with any content that is not your own work.

Question 1

Suppose that you are employed as a data mining consultant for an Internet search engine company. Describe how data mining can help the company by giving specific examples of how techniques, such as clustering, classification, association rule mining, and anomaly detection can be applied.

Question 2

Identify at least two advantages and two disadvantages of using color to visually represent information.

Question 3

Consider the XOR problem where there are four training points: (1, 1, −),(1, 0, +),(0, 1, +),(0, 0, −). Transform the data into the following feature space:

Φ = (1, √ 2×1, √ 2×2, √ 2x1x2, x2 1, x2 2).

Find the maximum margin linear decision boundary in the transformed space.

Question 4

Consider the following set of candidate 3-itemsets: {1, 2, 3}, {1, 2, 6}, {1, 3, 4}, {2, 3, 4}, {2, 4, 5}, {3, 4, 6}, {4, 5, 6}

Construct a hash tree for the above candidate 3-itemsets. Assume the tree uses a hash function where all odd-numbered items are hashed to the left child of a node, while the even-numbered items are hashed to the right child. A candidate k-itemset is inserted into the tree by hashing on each successive item in the candidate and then following the appropriate branch of the tree according to the hash value. Once a leaf node is reached, the candidate is inserted based on one of the following conditions:

Condition 1: If the depth of the leaf node is equal to k (the root is assumed to be at depth 0), then the candidate is inserted regardless of the number of itemsets already stored at the node.

Condition 2: If the depth of the leaf node is less than k, then the candidate can be inserted as long as the number of itemsets stored at the node is less than maxsize. Assume maxsize = 2 for this question.

Condition 3: If the depth of the leaf node is less than k and the number of itemsets stored at the node is equal to maxsize, then the leaf node is converted into an internal node. New leaf nodes are created as children of the old leaf node. Candidate itemsets previously stored in the old leaf node are distributed to the children based on their hash values. The new candidate is also hashed to its appropriate leaf node.

How many leaf nodes are there in the candidate hash tree? How many internal nodes are there?

Consider a transaction that contains the following items: {1, 2, 3, 5, 6}. Using the hash tree constructed in part (a), which leaf nodes will be checked against the transaction? What are the candidate 3-itemsets contained in the transaction?

Question 5

Consider a group of documents that has been selected from a much larger set of diverse documents so that the selected documents are as dissimilar from one another as possible. If we consider documents that are not highly related (connected, similar) to one another as being anomalous, then all of the documents that we have selected might be classified as anomalies. Is it possible for a data set to consist only of anomalous objects or is this an abuse of the terminology?

Statement of Purpose needed

  

Statement of Purpose

Provide a statement of your educational background, experience, and preparation relevant to a graduate program in computer science, and specify your research and career goals.

The statement of purpose is a short essay introducing the applicant and his or her

interests, goals, and reasons for pursuing graduate study in history. Applicants may wish

to share a draft of their statement with the individuals writing their letters of

recommendation. While every statement, like every prospective student, will be different,

applicants should devote special attention to the following items:

• Academic/Professional Background: Please give your academic credentials, with

degrees, dates, and relevant employment experience. You do not need to list every

job you have had, only those that bear directly on your desire to enter graduate

school.

• Motivations and Aims: Explain what motivates you to do graduate work in history

and what your goals are, both within the graduate program and after the

completion of your degree.

• Existing Expertise and Accomplishments in History: Discuss any areas of

expertise you may already have in your proposed area of interest. If you have

experience doing research, please describe the project and your work on it. If you

have any special talents or skills, such as a foreign language, please describe

them.

• Proposed Course of Study: Please identify planned major field and minor fields of

study.

• Other Relevant Experiences or Personal Qualities: Discuss any experiences or

personal attributes that may illuminate your commitment to the study of history

and to the successful completion of the graduate program.

Format: Your statement of purpose should be limited to no more than 750 words

(between 2 and 3 pages).

IT Proposal-Final Project 8-10 pages. MUST BE A+ WORK.

 

IT Proposal

For this assignment, you will analyze the roles of information systems in business and create an IT Proposal. You will take on the role of an IT manager and apply the methods for developing information systems to address business needs by including aspects from the major elements examined during the course that comprise information systems.

As an IT manager, you will have an impact on the technology decisions made by your organization and will often be asked to put together business proposals to provide solutions for the organization, as well as for existing or prospective customers. For this assignment, you will create a proposal for the following scenario. 

Scenario

ABC Corp is a software company with a staff of fewer than 50 employees and a very large client base. The company is currently using an in-house proprietary customer relationship management (CRM) system that is reaching its maximum capacity. Additionally, ABC uses a web portal for their sales team to enter contracts, and a product enhancement database to capture defects and enhancements requested by customers. The systems contain redundant customer data that needs to be centralized. The systems have many silos that have resulted in an inefficient work-flow process for users, missed sales opportunities, and poor customer experiences because of the inability to access all customer data in one place. The company is in search of a scalable solution that streamlines operations and improves customer relations. 

Include the following information in your IT Proposal.

  • Analyze the current information system in place at ABC Corp and its role in the current challenges identified.  
    • Describe the challenge(s) presented in the scenario and the impact of the challenge(s) to the organization. Include any potential data security issues that could occur as a result of the current information system.
  • Create an information system for implementation at ABC Corp that will solve the identified challenges.
    • Explain how the proposed information system solution will solve the problems.  Support your statements using the textbook and/or other credible sources.
    • Evaluate your proposed system and explain why the proposed solution is the best approach including issues of scalability, streamlining of operations, and cost effectiveness. Support your statements using the textbook and/or other credible sources.
    • Explain how the proposed information system solution will ensure data quality and security. Support your statements using the textbook and/or other credible sources.
  • Distinguish among the hardware components, operating systems, programming languages, programs, and applications your proposed solution will contain. 
    • Create a high-level diagram of the major elements that are required for implementing the solution.
  • Evaluate the systems development life cycle (SDLC) process as it relates to your proposed solution, and describe how you would implement it in the development.
    • Determine the approach you will use for implementing your proposed solution, by revising the SDLC diagram you created in Week Four.  Include the revised diagram in your proposal.

The IT Proposal

  • Must be eight to ten double-spaced pages (2,400 to 3,000 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
  • Title of paper
  • Student’s name
  • Course name and number
  • Instructor’s name
  • Date submitted
  • Must use at least four credible industry sources, in addition to the course text. 
  • Must document all sources in APA style
  • Must include a separate references page that is formatted according to APA style.

    **THIS MUST BE A+ WORK. Diagram mentioned must be high level***WHAT IS BEING ASKED MUST BE IN PAPER IN A CLEAR CONCISE MANNER

Research – TNS Vulnerabilities

  1. Research 13-1 – TLS Vulnerabilities.   500 words.  APA formatting is expected.  Research the evolution of Transport Layer Security (TLS) and the various vulnerabilities that have been discovered.  Discuss methods organizations have implemented to address the known vulnerabilities in various TLS versions. 
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

**Plagiarism Tools**

I agree to submit my paper(s) to the Global Reference Database

IA week10 DB

 

Hello,

i need this paper by 10/28 afternoon.

Strictly No plagiarism please use your own words.

Describe three network security risks and how an administrator may be able to defend against them.

An initial post must be 300 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Emerging Technologies Research Paper

Subject:  Emerging Technologies 

Book: Technology Ventures: From Idea to Enterprise 

Research project in stages throughout the course, to include:  selecting a topic, submitting an abstract/outline, and submitting final project (paper) for evaluation.  Must support work by using at least six appropriate, properly cited sources in addition to your course textbook. Project (paper) will comprise 3000 to 3500 words (not including title and reference pages).  

1st need  project abstract/outline

2nd research paper 3000+

Project (paper) must be formatted according to APA guidelines as a Word document, double spaced, Times New Roman, 12-font, with one inch margins.

Question:

Many new clean tech ventures have relied on funding and partnership from established corporations. Select a recently funded clean tech venture with corporate venture involvement. Did the funding impact the structure of the new venture? What does the new venture expect to gain from the backing by the larger corporation? What does the larger corporation expect to gain from being involved in the new venture?

Data analytics

 Research on the difference between Data Analytics and Data Science and describe in your words. Find 15 or more analytics / data science related job titles and write one sentence about the primary job responsibility of each of them. The post should be 500 words or more