Discussion Forum 2 (LO1) , Discussion Forum 1 (LO3)

In the video, “What is Data Mining and Why is it Important?” the presenter uses the statement “patterns in data help answer business questions,” a broad statement. Consider a small business that is a computer store. How would data mining help expand their business? (LO1)

Essential Activities: 

  1. Watching “What is Data Mining and Why is it Important?” will assist you with the discussion forum.

Notes:

  1. Please refer to this assignment’s discussion forum rubric on the start here tab.
  2. To earn total points on the discussion forums each week, include outside sources to support your discussion.

Discussion 2 

In the article, Why Business Analysts Are Essential to Your Operations Team, September 3, 2019 by Paul Crosby, the following 5 reasons are listed. 

 1.     Business Analysts Improve Operational Productivity

2.      Business Analysts Need to Prove Their Value to the Operations Team

3.      Business Analysts are Problem Solvers by Nature

4.      Business Analysts Drive Value By Wearing Many Hats

5.      Every Operations Team Will be Data and Analysis-Driven

Briefly discuss your view on the necessity of each.  Can you think of additional reasons? If so, please share. 

APA Stylesingle spacedTimes New Roman font of size 12, and references must all be cited. 

No divergence, no sidetrack, but focus on the question!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

help needed

It is time to show off all of your incredible talent and all that you have learned by programming a simple card game, we will use the concept of poker, but without actual cards.  You will have three separate, or internal classes that will:

  1. Instantiate a Card
  2. Instantiate a Deck of those Cards, and shuffle and deal them.
  3. Play the game.

In this project you will simulate the playing of a simple card game. You are given a Card and Deck class to use. The Card class should not be changed or renamed, I will use my own Card class when testing your files. 

This assignment should be submitted in two classes; Main+lastName, Deck+lastName, or using internal declared classes, but will not be referenced in this manner henceforth. The first class, Deck, will be a modification of the class I have provided. You will need to implement the shuffleDeck method in order for this class to be usable, which has already been written for you in a method.

The second class, Main, will use the Card class and your modified Deck class to create a shuffled Deck object and deal the two hands. The hands should be dealt in alternating order, starting with the first hand. As the cards are dealt into each hand they should be removed from the deck.

For example, each hand is shown for the following Deck.

seven of spades    <-- Index 0, top card
queen of spades   <-- Index 1, etc.
ten of spades
eight of spades
three of spades
king of hearts
queen of hearts
jack of clubs
four of clubs
eight of clubs
king of diamonds
seven of hearts

Hand 1:  Hand 2:seven of spades queen of spadesten of spades  eight of spadesthree of spades king of heartsqueen of hearts jack of clubsfour of clubs eight of clubs

Each of these cards should be removed from the deck.

After dealing the hand, Main should use the point value attribute of each card to calculate the total point value of each hand. The hand with the highest point value wins. In the case of a draw, the second hand wins. In this game ace = 1, jack = 11, queen = 12, and king = 13. In the deck the card in the first position (index 0) is the top of the deck.

Lastly, Main will declare the winning hand. See the following sample run for the exact format that will be expected.

Sample Run of Main:

Hand 1: Total points 22
three of clubs (point value = 3)
two of clubs (point value = 2)
six of hearts (point value = 6)
ten of hearts (point value = 10)
ace of spades (point value = 1)

Hand 2: Total points 27
four of spades (point value = 4)
ten of clubs (point value = 10)
three of diamonds (point value = 3)
eight of diamonds (point value = 8)
two of hearts (point value = 2)

Hand 2 wins

Play again (y/n)?

To plan for the program, you should review the given classes. Knowing which methods are available to you will be very helpful in designing your game. Then, you should plan the algorithms that you will design.

Use the following table to plan your program.

Card/Deck Methods & VariablesMain

Card – Methods & Variables

  • String suit, String rank, int pointValue
  • public Card(String cardRank, String cardSuit, int cardPointValue)
  • public String suit()
  • public String rank()
  • public int getPointValue()
  • public boolean matches(Card otherCard)
  • public String toString(); use to print each card with a for each

Deck – Methods & Variables

  • private ArrayList<Card> deck;
  • constructor method; instantiate deck ArrayList object, populate elements with cards by calling initialization method, and shuffle it by calling shuffleDeck() (written for you).
  • method to initialize the deck with 52 cards and set their point values; Ace of Clubs through King of Spades. 
  • method to return the top card from the deck and remove it from the stack; return type should match what you are returning.

Main.main

  • instantiate a new Deck object based on Card element types
  • establish two arrays, one for each hand to be dealt
  • deal 5 cards to each hand calling the getTopCard() method from Deck{}
  • total up the values for each hand using getPointValue() from Card{}
  • display the cards and their point values for each hand
  • determine the winning hand and display

You do NOT need to hand in Card, nor customize the class or the instantiation usage of Card in Deck or Main! But you still need to change Deck and Main to include your last name.

PLAGIARISM will earn a ZERO!  Copying someone else’s code online, or another student is also considered plagiarism

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database – Assignment

Summary:To apply all acquired knowledge in the last Project Assignments to create a Database Scheme. For this project, the ERD is provided to you.Deliverables:

  • SQL Script with your name as follows: YourLastName_Project_Ph3.sql.
  • MS Word Document with your OUTPUT, named as follows: YourLastName_Project_Ph3_Output.doc.
  • ZIP file to include the two files mentioned above.

Required Software:

  • MySQL DBMS by Oracle. MySQL Community Server and MySQL Workbench.
  • Follow Step 1-3 for your Course Project Phase phase 1, to install the required software components.

Lab Steps:Step 1: Analyze the ERD for a student information system provided below. Be alert for the specifications provided for: 1) Entities, 2) Attributes, 3) Primary Key, and 4) Relationships.  You will need to have a clear understanding for these components to create your database using MySQL. Step 2: Create a New Database in MySQL, Produce SQL File, Drop Table

  • Create a new Database, as you did in your Course Project Phase 1 deliverable and you already created a database using the MySQL DBMS.  Reference the attached video (Course Project Ph1 Video.mp4), for a demonstration to create a new Database using MySQL. This video was initially presented to you for phase 2 of your project.  Also, reference the supplemental text: Available for Free download as part of our UC Library.  MySQL Database Usage & Administration. (2010). By Vaswani, Vikram. McGraw Hill. ISBN: 978-0-07-160550-2.  Link to UC Library: http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=nlebk&AN=291311&site=eds-live&ebv=EB&ppid=pp_ii
  • Utilize the SQL dialect you learned so far in this course for MySQL.  Use the file supplemental textbook:  MySQL Database Usage & Administration. (2010). By Vaswani, Vikram. McGraw Hill, as supplement your knowledge of the MySQL dialect. 
  • Create your SCRIPT file to be named: YourLastName_Project_Ph3.sql.

Step 3: Include the following commands at the tops of your scripts:

  • SET FOREIGN_KEY_CHECKS=0;
  • DROP TABLE IF EXISTS STUDENT;
  • DROP TABLE IF EXISTS CAMPUS;
  • DROP TABLE IF EXISTS ROOM;
  • DROP TABLE IF EXISTS COURSE;
  • DROP TABLE IF EXISTS INSTRUCTOR;
  • DROP TABLE IF EXISTS APPROVED_INSTRUCTOR;
  • DROP TABLE IF EXISTS CLASS;
  • DROP TABLE IF EXISTS STUDENT_GRADE;
  • SET FOREIGN_KEY_CHECKS=1;

Step 4: Create Tables in your database

  • Create a new Table for each of the entities provided to you in the ERD diagram in Step 1.
  • Add a column to represent each attribute addressed in the ERD diagram in Step 1.
  • Designate Primary Key, as noted in the ERD diagram in Step 1.
  • Designate a Foreign Key relationship between the tables, as noted in the ERD diagram in Step 1.
  • Enable referential integrity on the relationships, as needed.
  • Enable cascade updates as needed on the relationships.

Step 5: Designate Data Types. Update the data type as needed to enforce the domain constrain of the data. This needs to be completed for every column for all tables.

  • Dates: they should have a date data designation type.
  • Surrogate keys: shall be auto-numbered
  • Character type: shall have a character data designation type.

Step 6: Column Constraints Designation.

  • Grade designation must be of one of these values as follows: A, B, C, D, E, F, W, E (E=enrolled, and W = withdrawn).
  • Student’s first and last names are not to be designated as NULL.
  • Course Credit hours shall be BETWEEN one and four.
  • The instructor first and last name must NOT be NULL
  • Course name designation has to be UNIQUE and must not be NULL type.

Step 7: Data Table Addition

  • Use the INSERT operator to add minimum 2-3 rows of data per each database.
  • You are free to use any values you might like for each of the columns.
  • NOTE/ Reminder: you are required to add data to the parent table prior to adding any data to child tables, as referential integrity is enabled.

Step 8: Executing your SCRIPT

  • Must incorporate the COMMIT command at the end of your Script
  • Must incorporate the SHOW TABLES command, to display the table you created. At the end of the script created.
  • Must incorporate the SELECT statement to show data allocated for each table. This would be added at the end of the script.
  • EXECUTE your SCRIPT.
  • Copy and paste your OUTPUT into your MS Word file as follows: YourLastName_Project_Ph3_Output.doc

Step 9: Upload your work

  • Upload ZIP file to include the two files as follows: 1) SQL Script with your name as follows: YourLastName_Project_Ph3.sql, and 2) MS Word Document with your OUTPUT, named as follows: YourLastName_Project_Ph3_Output.doc.

Rubric:

  • Tables Created: create a table for each entity as noted in the ERD diagram in Step 1. 5 points
  • Columns Created: create a column for each attribute as noted the ERD diagram in Step 1. 5 points
  • Primary Key designation: primary key addressed for all tables with unique constraints specified as column properties. 5 points
  • Data Types: Addressed for each attribute. Should include: 1) Date data type incorporated, 2) Surrogate Key Automated, 3) Numeric data shall be numeric type, 4) Character data shall have a character type. 5 points
  • Relationships Created, as noted in the ERD diagram in STEP 1. Relationships shall be enabled for referential integrity and cascade updates. 10 points.
  • Data Added per row: 5 rows of data for each table. 10 points
  • Column Constraints Added: As noted in the description for the project. Checked by adding rows with invalid values. Should take into consideration constraints as follows: 1) student name cannot be NULL, 2) course credit hours are restricted to allocations between 1-4, 3) course name is unique and NOT NULL, 4) instructor last name and first name can NOT be NULL, and 5) grade restrictions to the following values: A,B,C,D,F,I,W, E. 10 points

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Privacy Law on Information Security in Government

Privacy Law:  You have been hired as the new CISO of an organization with offices in the United States and will soon expand into the European Union EU.

With an organization that will span both the U.S. and the EU, your company will be impacted by the General Data Protection Regulation(GDPR).

The CEO needs to brief your stakeholders on the expansion and wants you there to answer questions about the privacy and security issues of adhearing to the GDPR.

Write a four pages research paper of statement on GDPR, the benefit of the regulation and possible consequences if the company is not properly prepared.  Identify the applicable governance issues you must consider. Identify at least three benefits and three risks of reporting to either and explain why they are a concern to you. 

Note: The format should be in APA style and plagiarism check free.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Please use all 600 words to summarize the following topics (be specific and use

 Please use all 600 words to summarize the following topics (be specific and use terminology from the class):https://youracademichelper.com/please-use-all-600-words-to-summarize-the-following-topics-be-specific-and-use/anthropology/
Evolution:
Explain Darwin’s theory of evolution. What is natural selection? What makes an organism naturally fit?
Primatology:https://reliableacademichelpers.com/learning-goal-im-working-on-a-health-medical-question-and-need-an-explanatio-4/health-medical/
Why do we study non-human primates? What are some distinctive features of primate evolution?
Human Origins
Define Punctuated equilibrium and Phyletic gradualism. What are advantages of being bipedal?
Prompt:
Why is Homo https://ultimatehomeworkhelpers.com/writing-prompt-write-a-response-to-the-article-helping-students-use-textual-so/english/ Erectus being a big game hunter a debated fact? Why is it important?
Format:
The document MUST be 600 or more words, and typed in Times New Roman 12-point font, being either single or double-spaced. In the header please include https://youracademichelper.com/test-1-december-1-2021-20-of-course-grade-four-questions-5-marks-each/sociology/ your name, date, and class (ANTH 37). Failure to do this will result in an immediate 5-point deduction. https://reliableacademichelpers.com/learning-goal-im-working-on-a-business-discussion-question-and-need-support-to-5/business/ DO NOT USE ONLINE RESOURCES. Use information provided to you through the textbook and powerpoints. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research Paper on Operational Excellence

how to improve company operations using SAAS legacy to  – cloud computing models(SAAS) – benefits of SAAS in cloud.

Title

how to research

design/methodology/

outcome

list of iteams

introductions

summary

references

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Field of Cyber Crime

The assignment should result in an APA paper with a minimum of four pages given to its Main Body, and no more than eight. The page requirement does not relate to Title Page, Abstract, and References pages. The paper should address the following: 

1. From the course Section II: Field of Cybercrimes, select one area of cybercrime that frames your work. 

2. Discuss it by describing any comparative traditional crime—e.g., trespass as compared to DDoS. 

3. Next, create a digital forensics investigation plan that may be applied to solve your selected cybercrime. Ensure that it is detailed enough to prove your knowledge of the discipline as a tool to help solve a crime, while being general enough that, perhaps, it could serve as a template for a law enforcement division. 

4. Lastly, discuss a legal case, criminal law (state or federal), and/or an article from a legal journal that relates to your chosen area of cybercrime.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Dell’s Environmental Sustainability

  

Company Name: Dell

Environmental sustainability is defined as responsible interaction with the environment to avoid depletion or degradation of natural resources and allow for long-term environmental quality. The practice of environmental sustainability helps to ensure that the needs of today’s population are met without jeopardizing the ability of future generations to meet their needs.

Within our Thompson text, read Chapter 9 Assurance of Learning Exercise #1 related to Dell.

Now, click on the website link provided in the learning exercise description from our Thompson text, which will provide you with information to respond to the following:

  • Prepare a list of 5 specific policies or programs that help Dell achieve its vision of driving      social and environmental change while still remaining innovative and      profitable.
  • Describe how Dell’s environmental sustainability strategies provide valuable social benefits?
  • Finally, explain how Dell’s strategies fulfill customer needs in a superior fashion while      simultaneously sustaining competitive advantage?

Submission Details: 

  • Your analysis should be between 1000 to 1500 words.
  • Incorporate a minimum of at least our course text and one non-course scholarly/peer reviewed source in your paper.
  • All written assignments must include a coverage page, introductory and concluding paragraphs,      reference page, be double-spaced, and proper in-text citations using APA guidelines.

Dell Website Link: https://corporate.delltechnologies.com/en-us/index.htm

References:

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Sports blogging website

 

Each team collectively prepares and one team member (for the entire team) submits one set of POWER POINT SLIDES that contains the following, and a video presentation:

1.      The following documents:

Project Charter:  (see Slide 24, CH03.ppt) Project name, purpose, and key participants are important. You can list for example what each member brings into the table (who has expertise or interest on what?). You can also include other relevant information. Make sure that every member has enough exposure to all phases of software development.

Project Scope Document: (see Slide 28, CH03.ppt) The project description must include functional requirements: list of functions the system will perform for the users. Also, list system capabilities, and other relevant information. The project scope must be proportional with the team-size. It should include non-trivial functions that require use of advanced data structures, algorithms, and/or new technology.

Project Schedule:  Present your schedule in a Gantt Chart with milestones. You need to be realistic. You start your project today, you complete planning and analysis phases by the end of this semester. You continue your project in Spring 2022 in CSCI 440 course. You will complete design and implementation phases in Spring 2022. Please note that we set the date for project completion the first week of May 2022 (if your team plans to take CSCI 440 in Summer 2022, change dates accordingly).

MILESTONES (including but not limited to):
a) Analysis Review
b) Design Review
c) Integration Testing (Start, and Completion)
d) User Manual
e) Project Presentation (Tentatively set for lecture on First Week of May 2022)

2.      Object-oriented UML models for your project’s REQUIREMENT ANALYSIS that includes the following (see CH05 slides 45-56, and CH07): 

a)      Domain Class Diagrams.

b)      Use Case Diagrams

c)      Activity Diagrams.

d)      System Sequence Diagrams.

e)      State Machine Diagrams (if applicable).

3.      Present your entire power point slides in a video of length not exceeding 20 minutes. Allocate more than half of the time on your UML diagrams in your systems analysis phase. Ideally all team members participate in this video presentation. It can be a recorded ZOOM meeting, for example. Any other similar video presentation is fine.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

MIS433- Module 5: Developing Reports & Forms

Database Project Phase 4 Instructions

Following are instructions for Phase 4 of your Database Project. Remember that each phase is built on the instructor-approved outcome of the previous phases and reflects all recommended changes and corrections.  Please follow all submittal instructions listed below.

Phase 4:  Create Reports and Forms: In Phase 4 you will continue to work on your project using MS Access creating reports and forms as follows:

  • One form with a subform.
  • One form (or more) that facilitates data entry.
  • Minimum of two different reports. Incorporate features like columnar or tabular layout, grouping, summary, themes, etc.
  • Submit your MS Access database file (in Module 4).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now