Category Archives: Computer Science

Compare the data quality issues involved in observational science with those of experimental science and data mining.

Discuss exercise 9 in chapter 2: “Many sciences rely on observation instead of (or in addition to) designed experiments. Compare the data quality issues involved in observational science with those of experimental science and data mining.

Text book link:https://s3.us-east-1.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/3932693?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27introduction-to-data-mining-pang-ning.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200123T050844Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20200123%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=78c1c0f955368b742a6ebbe69a69114119c1a095ef269044f70bdcb804a97cdb

Should Pass the plagarism and include the citation and reference

There are numerous resources related to R and Python. Choose 8 resources related to either R and/or Python to incorporate into an annotated bibliography.

This week’s assignment is not an essay, but an annotated bibliography. (An annotated bibliography is a list of citations to books, articles, or documents, each followed by a brief description. Its purpose is to inform the reader of relevance, accuracy, and quality of the cited source.)

There are numerous resources related to R and Python. Choose 8 resources related to either R and/or Python to incorporate into an annotated bibliography.

Requirements: a. 8 resources relative to R or Python with summaries written in your own words (do not copy published abstracts) b. Minimum summary length = 150 words b. Formatted according to APA standards Resource for formatting: https://owl.purdue.edu/owl/general_writing/common_writing_assignments/annotated_bibliographies/index.html

Google’s Handling of the “Echo Chamber Manifesto”

Students must read Google’s Handling of the “Echo Chamber Manifesto” and complete the questions at the end of the case study. To read click on the words “Google’s Handling of the Echo Manifesto” or copy to your browser.

Instructions

Questions must be answered fully and completely to receive full points (2 page minimum). Do not include the questions in your response, your response must be structured as an essay.

Write a description of the Priority scheduling algorithm, type of algorithm (category), how it works (goals) and some of the scheduling problems that are associated with the algorithm.

Write a description of the Priority scheduling algorithm, type of algorithm (category), how it works (goals) and some of the scheduling problems that are associated with the algorithm.

APA FORMAT (DUE is January 25th)

Prepare to visually demonstrate (PowerPoint, excel or draw on the whiteboard)

Type of Algorithm

· First come first serve

· Shortest job first

· Shortest Time Remaining

· Round Robin

· Shortest Process Next

· Multiple Queue

· Guaranteed

· Lottery

· Fair-Share

Compare the statistical feature of R to its programming features.

Compare the statistical feature of R to its programming features. In a table format, describe the programming features available in R, explain how they are useful in analyzing big datasets.

Describe how the analytics of R are suited for Big Data.

Assignment Requirements

2 pages, double-spaced. (Does not include title page or reference page)

APA format

At least 2 scholarly references

Cryptography

Introduction to Random Numbers

Random numbers are extremely important to cryptography. Let us understand why? They are unpredictable and the unpredictability makes it harder to decrypt. If the key was predictable then you would anticipate the key, which would make encryption easy to break.

What makes a number random? You do not know that is expected. Like I mentioned before, they are unpredictable.  What is also important, is the fact that each number is equally likely, it means that the random number n is equality likely to come up as the number m. In statistic, we call this property  UNIFORM DISTRIBUTION. An example of this scenario is the rolling of a fair dice. The chances of getting a 5 is the same as the chances of getting a 3.

In Cryptography, we need random….

Consider the importance of diagnosing business problems and determining analytical methods.

Consider the importance of diagnosing business problems and determining analytical methods. Review your Week One assignment where you described a business challenge within an industry of your choice and how it can be reframed as an analytical challenge..

This discussion has 4 parts –

a. Share a brief summary of your chosen industry, one business challenge, and your view of reframing it as an analytical challenge

b. Share one academic journal reference that supports your research.

1. Provide the APA citation

2. Attach a .pdf of the article

3. Provide a brief summary indicating the article’s significance to your research

Reminder: In your initial response and discussions with your peers, use your own words & share your own perspectives and findings

Select one of systems from the list and describe how you would create visualizations to display information that describes the system.

Select one of systems from the list and describe how you would create visualizations to display information that describes the system. In your initial post, please explain how to map objects, attributes, and relationships to visual elements.

1.Computer networks. 2.The use of computer resources, such as processor time, main memory, and disk, for a set of benchmark database programs. 3.The change in occupation of workers in a particular country over the last thirty years. 4.The distribution of specific plant and animal species around the world for a specific moment in time.

comment on whether you think there any special considerations that need to be taken into account with respect to how visual elements are displayed in the system mentioned.

Data base security

Question 1: Data base security–Discussion Board –500 words

Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework.

This paper will be evaluated through SafeAssign. Need plagiarism report mandatory.

Write an essay with APA format. Write an essay format not in bulleted, numbered or another list format.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered

Based on the “What if” case in Chapter 4 from the Book: Web Applications and Data Servers discuss the ethical aspects of what Regi did, and the possible ramifications of his actions.

“Cracking” Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph:

Based on the “What if” case in Chapter 4 from the Book: Web Applications and Data Servers discuss the ethical aspects of what Regi did, and the possible ramifications of his actions. Based on the “What if” case in Chapter 5 from the Book: Web Applications and Data Servers discuss the ethics of whether the company had an obligation to report or not, and why? What would you have done and why? Any current topic or article related to penetration techniques. The instructor insight.