Computer Science
Data Interpretation
Pages: 20 References: use as many as you like Instructions: Organize and analyze all the data you need with keeping in mind the main purpose of your and the objective of your research. Use clear statements to identify the aim of your research. Explain your methodology and how will you interpret the data within your chosen framework of the research. Compare and Cross examine different kind of data collected by different methods. Present some case studies and interpret, analyze and compare them in relationship with your topic. Link all different pieces together from literature review, data analysis and case studies in a critical manner to produce a conclusion. Make predictions and recommendations based on the data analyzed and interpreted. State exceptions if exist and propose relevant areas of future research in the same field. Always remember to cite your work and write your references. Research Contents: Cover page. Abstract. Introduction. Methodology. Topic definitions. Literature Review. Data Analysis. Discussion and findings. Conclusion. References. my suggestion that i prefer is to focus on the intentions behind ornaments: and discuss what were the reasons for ornament creation in buildings. There are various cultural, religions. political ….ect reasons that explain why ornaments thrived or declined and the form of the ornaments changed based on these intentions. Comparing between ornamentation in different eras should not be limited to a chronological presentation it should show why ornaments appeared in this form or that form or even neglected (what was the intensions) Classical Architecture, Renaissance, Islamic, Christianity, Baroque: they all have different languages for the ornaments used and your research is trying to reveal why they were different and what was the intentions. I added some references that might help.
Analytic Hierarchy
INSTRUCTIONS 1. This is an open book exam 2. All answers are to be typed and submitted in PDF document named with student id and name on Moodle platform (gtuc-cu.net) by the deadline. kindly navigate to the Decision support systems Module and click the submission link. 3. The document title page should include the student id, name, cohort and program and name of course 4. Failure to do so will attract a 10% after 2 days and 20% after 3 days. 5. Failure to submit after the 4th day will be deemed as non-submission 6. A Turnitin link will be provided for the submission of the assessment Answer all question Students will be provided a case study in the form of an article. Having read the case study please read and provide answers for the questions below. 1. Identify the types of models used in the DSS in this case study and summarize your understanding of them. [10 marks] 2. What other model types of models can be applied to the problem of ranking described in the case study provided. Explain the reason for the potential application of the suggested model. [10 marks]. 3. Your multinational company is considering a shopping centre in Ghana. List typical activities in each phase of the decision (intelligence, design, choice, implementation) whether to open or not open. 4. In the case study above customers are ranked according to specific criteria (section 4.1). identify and analyse 5 key criteria to aid you rank cities for siting a new shopping centre in a new city. [20 marks] 5. Using the analytic hierarchy process draw a hierarchy tree for the question above and explain how the stages AHP might be applied to selecting the most optimal city in Ghana for the new shopping centre [30 marks] 6. Explain how this process might benefit your organization in their decision-making. [10 marks].
Internet Flexibility
The Internet allows us to complete tasks quickly, with the greatest amount of flexibility. We use social media sites for personal and professional communication, use Strayer University online resources to attend further our education, and use email as a basic communication tool in todays world. However, there are people on the Internet who have ulterior motives for connecting with us. The goal of this week’s discussion is to help you spot when you are interacting with suspicious characters on the Internet. Click on the below video or use this CHOOSE A SCENARIO You received an email from what appears to be Strayer University requesting you to login using a link and change your username and password because your account was compromised. You are on a social media website chatting with a friend, but your friend starts to ask questions that they should know the answers to and the conversation seems strange or off. You received a text from what appears to be your bank stating that your account may be compromised and they need key information to verify your identity with your last five transactions. ADDRESS THESE POINTS Welcome: Please provide a greeting to begin your post (e.g. Hello Professors and Peers!). Paragraph 1: What scenario did you choose? Why? How do you know if the communication in your scenario is legitimate? How do you respond to the communication in your scenario (i.e. identify the correct steps to take)? Paragraph 2: What are the repercussions of taking an incorrect action in your scenario? Are the repercussions irreversible? Why or why not? Do you have personal experience with the type of scenario you chose? If so, describe what happened to you and what you learned. If not, did you learn anything new from walking through the scenario you chose? Closing: Sign your post with your preferred name so that my team knows how to address you in the discussion forum. ORGANIZE YOUR POST Make sure that you always organize your post into paragraph format with 200+ words. Create a conversational flow (e.g. talking to someone) with a scholarly tone (i.e. no text talk or slang, spell and grammar check always using a tool such as Grammarly, etc. PEER REVIEW RE: Week 10 Discussion COLLAPSE Overall Rating: 1 2 3 4 5 1 2 3 4 5 Greetings! Facebook has been the center of many accounts being hacked and taken over by seemingly nice strangers that appear to be a friend. If I was chatting with a friend and they started to act strange by asking questions already known or asking/inviting me to participate in Forex or a money scheme I would immediately know someone is impersonating my friend. Recently, on Instagram I received a friend request from someone I was already friends with. I accepted the friendship and reached out to my friend to ask if they created a new page. When it was discovered they didn’t, I immediately reported the fake profile and the profile was deleted. Had I not suspected or known it was fake, the person could have stolen valuable information. Fortunately, the person’s who’s profile that was stolen was my ex husband. After the fake profile was removed, we both had a great laugh; however, we learned a valuable lesson. It’s important to change your passwords often; and, oftentimes, people create fake profiles from downloading someones’ pictures and replicating their information without ever accessing their personal profile. Had the intrusion been Facebook, sensitive information could have been stolen. Therefore, we both decided we would no longer share updated information about our whereabouts, locations and family vacation pictures.
Components Of MIS
Describe 5 components of MIS and apply them to a specific context in your field of study. What risks do you think need to be managed? How?
In-house Development
Congratulations. Your project has been staffed and you are about to meet with the team for the first time. Initial impressions are important and youll need visuals for your presentation. Create a slide show (in PowerPoint or similar software) in which you address the following, in this order: Goals: What the project hopes to accomplish. Critical Success Factors: Identify at least four different stakeholders; for each, list at least two things that the stakeholder requires in order to deem the project successful. Acquisition strategy: Should the system be built in house, created by a contractor, purchased off the shelf and customized, or leased as a service? Explain your rationale. Resources: For in-house development, what people and skills are required and what development life cycle do you recommend? Otherwise, identify three candidate organizations that can deliver the system. System functions: In a table format, summarize the types of users for the system; the business reason(s) each would use the system; the ways that the system supports each of these needs and how this support differs from the current system. Connectivity: Provide a diagram that shows how the system will connect to the other information systems and what data flows among them. Security: List the most serious cybersecurity threats and vulnerabilities of the new system. Suggest strategies to address them. Mobility: Identify the systems capabilities for mobile use. Include a title and summary slide. Use one slide for each of the preceding eight points. Include speaker notes or audio narration that explains each slide more fully.
Technology Reliance
In this assignment, you will write an argumentative essay on the following topic: Technology has become an essential component of our society. Some people feel that we have become too reliant upon technology to help us accomplish day-to-day tasks. From spell-check in a word processor to an artificial intelligence performing a Google search, there is little doubt that our culture, as well as our future, is almost completely overshadowed by technology. While some people feel uneasy about such a reliance upon technology, others embrace the digital future and feel we should go even further. What is your position? Do you feel that technology reliance is beneficial or detrimental to individuals, families, and society as a whole? Write an essay that supports your position. Your essay should total about 800-1000 words. Argumentation is a rhetorical style which calls for a change in the attitude and/or conducts on the part of the reader. An argumentative paper attempts to change the readers mind and to convince the reader to agree with the point of view or opinion of the writer. Make sure that you avoid the logical fallacies. Here is the suggested format for your essay: Introduction Logical proof of your position Acknowledgment and refutation of opposing views Conclusion The essay should adhere to the following requirements: Be double-spaced Use at least three sources, Follow MLA documentation style Be at least 800 to 1000 words Utilization of the citation feature in MS Word to generate references and Works Cited page is highly recommended Must addressing the essay prompt. Write an essay that argues about technology over-reliance. Addresses topic with enthusiasm and conviction and shows knowledge of subject matter. Writer narrowed discussion to one or two specific technological topics and reasoned from that point.
IT Investments
Discuss how healthcare organizations can ensure that their IT investments deliver value to the organization. What is the importance of the alignment with the organization’s mission, vision, and strategic goals? Are the right people selected to work on the project to achieve so that it will be successful?
Analyzing Data
Option 1: For anyone new to Excel 1. Complete this screenshot tutorial introductory_excel.pdf using this sample data: data.xlsx . NOTE: There’s been some confusion in the past because the first few pages of the PDF document are all explainer, without directions. Keep reading and at page 6, it will start having directions for things you should do in the Excel file. 2. Save your Excel sheet and submit your work. 3. Submit a brief reflection. I haven’t used this assignment before and I want to know what you thought of it – was it easy/hard? What aspects of it were useful? What aspects of it were not? What pieces needed more explanation? Were there pieces that felt too basic? Do you feel like you will use what you learned here? Approximately how long did it take you? Any thoughts you have on it, please share them. Note: I’ve provided what I hope are helpful comments throughout on the PDF in blue. Some of them are general; some of them are specifically to redirect Mac users, since this guide was created from a PC. If you are using a ChromeBook, and therefore Google Sheets, several elements of this assignment won’t work for you. Contact me for an alternative. Option 2: Some experience with Excel This option is intended for folks who have a little experience with excel. If you are already comfortable with basic excel navigation this option takes you into a little more detail not just the mechanics of where to click, but also thinking about why you do what calculations when (and how). It provides two data from which to chose to analyze, guided by the questions provided on a worksheet. 1. Read Herzog – Analyzing Data.pdf and Herzog – Visualizing Data.pdf Note: If you’d like to work along with the readings, the data sets being used can be found here: https://study.sagepub.com/herzog 2. Select which of these sample data sets you’d like to work with: 2018 NCAAF Coach and Asst. Coach Salaries.xlsx federalelections2016.xlsx If you’d like to use a different data set, let me know. 3. Download the Data Analysis & Visualization Worksheet.docx 4. Work through the questions on the worksheet for your analysis. Submit your completed worksheet & the spreadsheet with your analysis via Blackboard. 5. Also submit a brief reflection on your experience with this assignment. Im always playing with this assignment to figure out what works best so I want your feedback! What aspects of it were useful? What aspects of it were not? What pieces needed more explanation? Were there pieces that felt too basic? Do you feel like you will use what you learned here? Approximately how long did it take you? Any thoughts you have on it, please share them. Option 3: For anyone who is a pro in Excel, or who wants more experience and practice coding There are several coding languages that are frequently used for data analysis. If you are already a pro in Excel, or just interested in getting some more experience with coding, you can use this option to learn R for data analysis. Python is another frequently used language for data analysis, but it requires a little more work to get situated, so I’ve opted for R here. If you are curious, here is an infographic about Python vs. R. If Python is it for you, talk to me and we can discuss what that option might look like. There are several steps to this assignment 1. Complete lessons 1 & 2 of the R codecademy course. (Note, there are Pro/paid elements skip those). 2. Download RStudio, and R. A few notes about these steps: For RStudio, I did Desktop because I didn’t notice Server. I can’t speak to how Server is different. Just make sure you are using the open source one, not one of the paid options) For downloading R: yes, I realize the site looks like a strange relic of the 90s, but don’t let that cause dismay. It’s legit. 3. Watch the three BasicBasics Videos from R-Ladies Sydney (in BasicBasics 1, BasicBasics2, and BasicBasics 3), to get to know RStudio, and get up and running. (I recommend you follow along with her to import the packages. Everything else is up to you if you want to just watch or work with her. Note: The first half of the third video is really important, but the second half isnt as relevant to what we are doing so you dont have to keep watching. 4. Download the DiscoveryTechnologyR Zip folder below. In this folder you’ll find an R Studio project, a data set and a script file. Open the project file in RStudio and complete the directions provided in the script as #comments with your code. 5. Save the project, zip your project folder and upload it to Blackboard. 6. Submit a brief reflection on your experience with this assignment. This is a new option for this assignment so I want your feedback! What the documentation provided sufficient to accomplish the assignment? Approximately how long did it take you? Would you have liked to see more covered (like data visualization)? Would you have liked to see less covered? Any thoughts you have on it, please share them DiscoveryTechnologyR.zip A few notes: I am new to R too, which means that any challenges you encounter, I probably encountered them too while getting situated, so ask for help! Many many times the reason my code didn’t work was because of a typo I struggled with piping cause I was doing it wrong. To save you from the trouble I had let me share what I figured out now: When they teach variable naming its always at the beginning. I put it after the piping but that doesn’t work, you gotta do it before the piping. For example chosen_cols <- artists %>% select(-country,-year_founded,-albums) head(chosen_cols)
Computer Network Security
write 4 complete sentences in your own words for each of the 5 questions asked. 1. Bill installed Firesheep on his computer and went to the coffee house with his computer. What kind of trouble can he get into if he goes online? 2. People are talking about a USB attack? What is a USB attack? 3. In computing, what is whaling and why is it dangerous for a company? 4. What is Vishing, not phishing, but Vishing? 5. What is dumpster diving and how can companies protect themselves from it? Please answer each question with four sentences of your own words. 6.1. What is ROT 13 ? Please spell Klingon in ROT 13. 6.2. What is a Man In the Browser Attack and why is it bad? 6.3. Please discuss the cross site scripting (XSS) web application attack and how it could harm you. 6.4. Please discuss the difference between steganography and cryptograhy. 6.5. Please discuss one new thing that you learned in unit 2 and discuss why you thought it is important.
Department Of Defense
1. According to the Presidential Policy Directive 41 US Cyber Incident Coordination and the NCIRP (2016), how would cyber incident response be handled for another breach into the Office of Personnel Management? How would it be handled for a private company that owns part of the US critical infrastructure? Your answer should include an explanation of what it means to be in charge and what coordinating authority means and can include other references from the Department of Homeland Security or the Department of Defense. 2. Should additional laws or policies be passed to allow the US Government to assist the US private sector when a major breach occurs? What current laws or policies currently support US Government assistance or intervention into private sector breaches? 3. Do you believe that laws are needed to hold companies more accountable for cybersecurity, why? Are current laws sufficient, if so, what are some of them that would apply?
Use Promo Code: FIRST15