Using search engines and find two different recent articles involving data mining. Describe the role of “data mining” in the story using and why the data mining is important your own words

 Grading Rubric for Assignment #1

  • Comprehension of Assignment (Addressed the question completely and thoroughly): 40 percent
  • Clearly presents well-reasoned ideas and concepts: 40 percent
  • Mechanics, punctuation, sentence structure, spelling, APA reference formatting: 20 percent

Question

      Using search engines and find two different recent articles involving data mining. Describe the role of “data mining” in the story using and why the data mining is important your own words (at least 200 words for each URL).  Be sure to cite your sources.

Here is an example of an article:

12:00 AM, January 07, 2018 / LAST MODIFIED: 12:00 AM, January 07, 2018

New police unit to check cyber crime

– Social media users to face stringent watch; police can detect users quickly ~~~~…

Link- (This is just an recent example. We need to provide other two recent articles involving data mining)

 https://www.thedailystar.net/frontpage/new-police-unit-check-cyber-crime-1515997

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 3 : Loops and functions

 

Week 3 : Loops and functions

Grade Details

GradeN/AGradebook CommentsNone

Assignment Details

Assignment Instructions

# This is the flower box and it should at the beginning of each assignment

# You must add comments to your code
# Program name   : Wk3_firstname_lastname.py
# Student Name   : Ymmas Azaba
# Course              : ENTD220
# Instructor         : My Instructor
# Date                 : Any Day

#  Description           : This code will …..     

# Copy Wrong      : This is my work

You are going to enhance the prior assignment by doing the following:-

1) Create a function for each math operation (add, div, mult, sub)
2) The application will run forever, you will ask the user to continue or not.3) create a function IsinRange() to test a value  between two ranges like this;     Here is the spec in pseudo code      IsInRanhe(lr, hr, n)           lr=low range                                                       hr=high range                                                       n=number      if n between ln and hn         return true     else        return false  
 

Hints 1) For practice please see lab exercises in the lesson section
        2) See Sample output for messages
Sample output

Enter your Lower range   —> 10
Enter your Higher range  —> 20
Enter your First number  —> 15
Enter your Second number —> 17

The Result of 15.0+17.0=32.0
The Result of 15.0-17.0=-2.0
The Result of 15.0*17.0=255.0
The Result of 15.0/17.0=0.882352941176
 

Continue Looping Y/N Y

Enter your Lower range   —> 20
Enter your Higher range  —> 30
Enter your First number  —> 25
Enter your Second number —> 50
 

  • The input values are out side the input ranges
  • Please check the numbers and try again
  • Thanks for using our calculator

Submission Instructions:

Make sure that you save your code in a text file in this format;

W3_firstname_lastname.py

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Monolithic Cipher Discussion Response

Provide a 150 words response for the discussion below. Include a APA reference on the response provided. Must be able to meet deadline. The sooner the delivery of the paper the better.

DISCUSSION:

A Caeser Cipher is one of the easiest ciphers to use.  It is used by simply shifting the alphabet a predetermined number of letters.  For example, if the shift was one: a would be b, b would be c, and so on.  Because the alphabet only has a certain amount of letters, there can only be as many variations of this cipher.  With that being said, if someone was determined enough, they could try all variations until they cracked the code.  However, there are faster ways to break it than using brute force.

One of the ways that would be used to break this code faster than brute force is by using letter frequency.  There have been numerous studies on which letters appear more frequently than others.  Some of the results of these studies are that the letter e is the most common letter used.  The letters t, a, o, i, n, s, r, h, l, d and c are found in about 80% of the words in the English language.  Also the letter h appears more in everyday speech and writing than it does in a list of dictionary words.  By using this method, you should be able to look at the letters used and compare them to the most common letters used and be able to find a match.

Another way to possibly break this code is by using short words.  If the code has a two or three letter word, the possibilities are few.  If you could figure out the word you will be able to break the code for the rest of the message fairly easy.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

attribution theory and how it influences the implementation of innovation technologies.

 

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Project Management Assignment

One of the most important documents within a project is the project charter. Review the research to learn more about what is commonly found within a project charter. Using your research, evaluate the project charter below.

Project Title: SIS Implementation Date: April 7, 2000

Scope and Objectives: Everywhere University is undergoing rapid growth resulting in an urgent need for a more efficient access to internal and external policies related to the student experience and programs. To this end, we are implementing a new p Student Information System Portal that will satisfy both these needs and will enhance communication across the organization.

Defining Conditions, Constraints, and Assumptions: The SIS must be operational on the last day of the Spring semester.

Staffing: The project manager will determine the skill requirements for the project and provide them, along with specific team member names, by June 1 to the appropriate functional managers. The project manager is authorized to have one clerical person to assist. Because of other campus priorities, the project team is limited to no more than 2 technical members without specific authority from the President.

Communications: Status reports will be provided to the President, the Deans, and the Project Sponsor bi-monthly.

> What sections are missing from this document?
> Why are they important?
> Recreate this project charter to include those sections and offer suggested wording.
> What are the remaining areas which may need to be refined to prevent “scope creep”?

Outline your plan addressing these issues and other issues.

Need 8-10 pages in APA format with minimum of 9 peer-reviewed citations. Must include introduction and conclusion.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cover letter

(a)Cover letter for cybersecurity and network engineering job. 

(b)write 150 characters or fewer, tell us what makes you unique for the cybersecurity job. Try to be creative and say something that will catch our eye!  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

internet

Write a reflection discussing how the internet is being used to wage a cyberwar that affects corporate privacy.

Make sure to support your reflection with at least 2 scholarly resource

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

coding

write a program that prompt the user to input radius of a circle. The program should then calculate the area and print computation on the screen. Using oop.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Comparison and contrast between TCP/IP and the OSI model

The Individual Midterm Report will entail the development of a detailed report related to the topics below. Students are required to complete and submit this report. You may use the course resources for some of your resource material. It is expected that you will do research outside of the content posted in this course.   As such, the Individual Midterm Reportmust be unique and should not be a restatement of items from the course materials. The use of APA is required for formatting for your report, citing your in-text citations, and providing full references at the end of the report.

Note: All papers will be run through Turn-it-in. Any plagiarized papers or papers with a 20% or greater ‘similarity score’ (indicating that 20% or greater of the paper was copied) will receive a 0.

Individual Midterm Report Topics (pick one for your focus):

  1. Comparison and contrast between TCP/IP and the OSI model

Requirements for the Individual Midterm Report include:

  • Write a 4 to 6-page paper (1400 to 2100 words at 350 words per page/average) on the selected technology topic. The required 4 to 6 pages of your report does not include the page count for the cover page, front matter (Table of Contents), Back matter (appendix items), and reference page.
  • A minimum of THREE outside references is required for your work.  Use peer-reviewed work (e.g., journals, conference proceedings, industry papers, etc.).  Peer-reviewed work refers to articles written by experts, which are reviewed by several other experts in the field before the article is published in the journal in order to ensure the article’s quality.  Please DO NOT use popular press items (e.g., Time Magazine, Forbes Magazine, etc.), which are not aligned with academic work.
  • Use APA formatting in your paper.
  • AVOID direct quotes. Instead, paraphrase and cite (see APA regarding this). Remember, direct quotes are typically done for seminal research, so limit the use of quotes in your submission.
  • In addition, provide an introduction and a conclusion in your paper.
  • The paper must follow a logical flow, so working from an outline is strongly recommended.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

citation style

 

  • What citation style does your program of choice use? APA
  • After researching this citation style, what types of challenges will you face when using this citation style?
  • How does collecting other people’s research help when trying to synthesize information for your own academic endeavors (CO8)?
  • What are the ethical ramifications of not quoting, citing, or referencing other people’s research in your academic work (CO4)? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now