+1(316)4441378

+44-141-628-6690

Archive for the ‘Information Systems’ Category

Essay

Write an essay on the following video, Link is below:


https://www.youtube.com/watch?time_continue=1&v=2Cg2So2js5k&feature=emb_title


Title: Introduction to Basic Cryptography: Hashing

In this essay, you will provide a real-world example of how cryptography/hashing can be used in order to secure data transmission across a network. Provide a scenario and explain how data is secured using the plaintext and ciphertext process that was discussed last week.. In addition to the video, choose one other scholarly reference to support your discussion.

Requirements:

  • Submit in a Word document.
  • Include cover page
  • Must be a minimum of two pages (excluding references and cover page)
  • Appropriate APA format is required.
  • Properly cite and reference any borrowed resource(s)


CIS 524 Discussion Reply

"Electronic Ballots" 


Statement: A voice interface can also be important as it is the voice that will be required for them to cast their vote.


Question 1: 

How does a voice interface meet privacy requirements? Will voting booths need to be soundproof?


While you are pondering that, consider Florida. Remember the "hanging chad" or unproperly punched paper ballots in Florida several elections ago? According to: https://www.accessthevote.org/voting-in-florida/where-do-i-vote/florida-voting-machines/ ,


Florida uses voting machines from at least six different vendors and they consist of everything from DRE (direct recorded entry) using touchscreen, to optical scanners that read marked paper ballots. The question on voting is designed to provoke thought. 


Question 2: 

If the HCI designer tries to meet the objectives of universality in voting then should that really require a

Discussion

 

Consequences of Incorrect Information

People make mistakes; we are human, after all! However, workplace errors may have far-reaching consequences that affect the company, customers, or others. These errors may have simply been a missing comma in a legal document, a missing or misplaced semicolon in code, or a misspelling. 

Do an online search for an example of a specific instance where a writing error caused problems. For easy access here in the discussion, look for Web sources instead of library articles or books.

For the initial post, provide the following:

  • In your first paragraph, provide a summary of the incident. Citation is not required.
  • In a second short paragraph, provide your reaction. This could be an explanation of what you think could have been done to avoid the problem in the first place, how you would have handled people in this situation if you were the manager or company owner, or ho

Writing Assignment

Writing for the Client 


Outcomes addressed in this activity: 


Unit Outcomes: 


Formulate ideas for a non-technological audience using cause-and-effect writing techniques.

Explain issues to a technical audience using compare-contrast writing methods.

Show ideas in a professional business format.

Discover the requirements of publishing in professional journals.

Interpret real-world consequences of incorrect information.

Apply time-management skills. 

Course Outcome: 


IT513-4: Synthesize solutions to clients' technology problems using research, appropriate writing styles, and a suitable business format.


Purpose 


This Assignment will focus on different audiences/readers and two subtypes of expository essays: compare/contrast and cause-and-effect. Each essay will synthesize ideas from two sources and be presented in a work-

Need min of 600 words and please find the diag attached in file

  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?



Data Science_W3

 

Initially summarize the questions attempted

Q1: ISLR Textbook chapter review questions

Review the following sections in Python

Q2 Textbook Theory Questions 3.7 Exercises

1. Describe the null hypotheses to which the p-values given in Table 3.4 correspond. Explain what conclusions you can draw based on these p-values. Your explanation should be phrased in terms of sales, TV, radio, and newspaper, rather than in terms of the coefficients of the linear model.

Q3 Applied Textbook Questions with Python 3.7 Exercises

Hint several github sites have the complete solution in python e.g.

8. This question involves the use of simple linear regression on the Auto data set. (a) Perform a simple linear regression with mpg as the response and horsepower as the predictor. Print

Potential topics and titles for Journal article

 

Last week you started researching and writing annotated bibliography. As you are doing so, you are starting to think about a topic, preferably related to your dissertation expertise, to write a journal article on for publication. In this weeks discussion I would like for everyone to start sharing their potential topics and potential article titles.

You must do the following:

1) Create a new thread. As indicated above, please provide potential topics for your journal article and potential titles.

Introduction to data mining

 

1) The rule-based classification can be used to refer to any classification scheme that make use of IF-THEN rules for class prediction. Discuss the rule-based classification schemes and what is Rule Pruning in data mining?


2) Bayesian classification is based on Bayes' Theorem. Bayesian classifiers are the statistical classifiers. Discuss what is Bayesian classification in data mining? How do Bayesian networks work? What do Bayesian networks predict?

Research Paper

  

Self-Driving Cars: Autonomous vehicles require incredible data processing capabilities and system speeds needed to mimic the timing of human reflexes. Companies like Ouster are developing light imaging, detection, and ranging applications that are the key to standard improvements like lane control and adaptive cruise control. But are also turning fully autonomous vehicles into mobile data centers, allowing driverless cars to make real-time, complex decisions. Is this a good thing? Will society ultimately benefit from these technologies? Or will this trend put hundreds of thousands of Americans out of work who drive for a living?



Format

  

Components: Each Residency Project Paper will require that several parts be submitted in whole. 

PART 1: INTRODUCTION Your team must write an introduction section that introduces your topic 500 to 800 words

PART 2: HISTORY -

Business Intelligence-Discussion

 

Data mining is a complex subject dominated by emerging technologies and privacy regulations, and consumers gained better control over their personal data when the General Data Protection Regulation became enforceable on May 25, 2018. Under GDPR, profiling is determined to be any kind of automated personal data processing that analyzes or predicts certain aspects of an individuals behavior, socioeconomic situation, movements, preferences, health and so forth.

In your initial post, describe two major impacts that GDPR has on the process and practice of data mining.

Respond substantively to at least two other students' posts. Comment on how GDPR has changed the way in which every business stores, processes, transfers, and analyzes its data based on the impacts discussed in your classmate's initial post.

*please remember to include at least one credible scholarly reference with