Data Mining

 

Question 1

Suppose that you are employed as a data mining consultant for an Internet search engine company. Describe how data mining can help the company by giving specific examples of how techniques, such as clustering, classification, association rule mining, and anomaly detection can be applied.

Question 2

Identify at least two advantages and two disadvantages of using color to visually represent information.

Question 3

Consider the XOR problem where there are four training points: (1, 1, −),(1, 0, +),(0, 1, +),(0, 0, −). Transform the data into the following feature space:

 Φ = (1, √ 2×1, √ 2×2, √ 2x1x2, x2 1, x2 2).

Find the maximum margin linear decision boundary in the transformed space.

Question 4

Consider the following set of candidate 3-itemsets: {1, 2, 3}, {1, 2, 6}, {1, 3, 4}, {2, 3, 4}, {2, 4, 5}, {3, 4, 6}, {4, 5, 6}

Construct a hash tree for the above candidate 3-itemsets. Assume the tree uses a hash function where all odd-numbered items are hashed to the left child of a node, while the even-numbered items are hashed to the right child. A candidate k-itemset is inserted into the tree by hashing on each successive item in the candidate and then following the appropriate branch of the tree according to the hash value. Once a leaf node is reached, the candidate is inserted based on one of the following conditions:

Condition 1: If the depth of the leaf node is equal to k (the root is assumed to be at depth 0), then the candidate is inserted regardless of the number of itemsets already stored at the node.

Condition 2: If the depth of the leaf node is less than k, then the candidate can be inserted as long as the number of itemsets stored at the node is less than maxsize. Assume maxsize = 2 for this question.

Condition 3: If the depth of the leaf node is less than k and the number of itemsets stored at the node is equal to maxsize, then the leaf node is converted into an internal node. New leaf nodes are created as children of the old leaf node. Candidate itemsets previously stored in the old leaf node are distributed to the children based on their hash values. The new candidate is also hashed to its appropriate leaf node.

How many leaf nodes are there in the candidate hash tree? How many internal nodes are there?

Consider a transaction that contains the following items: {1, 2, 3, 5, 6}. Using the hash tree constructed in part (a), which leaf nodes will be checked against the transaction? What are the candidate 3-itemsets contained in the transaction?

Question 5

Consider a group of documents that has been selected from a much larger set of diverse documents so that the selected documents are as dissimilar from one another as possible. If we consider documents that are not highly related (connected, similar) to one another as being anomalous, then all of the documents that we have selected might be classified as anomalies. Is it possible for a data set to consist only of anomalous objects or is this an abuse of the terminology?

You will need to ensure to use proper APA citations with any content that is not your own work.

with zero plagiarism needed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

InfoTech Import in Strat Plan

 

After you have read Chapter 1 and listened to the Chapter 1 lecture read Case Study 1-2 Google. Answer question 2. How does Google’s information systems strategy support its business strategy?

Note:  All posts are required to have in-text citations and scholarly references per our syllabus.  Failure to do so will result in increasing points off as we progress! Do not plagiaries. Do NOT copy anything from Course Hero or similar site

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

operations security quiz

 

1) Employee behavior in an organization is 

a)usally far from optional

b)prone to create secure work environments

c)not subject to policies and guidance

d)similar to machines

2)Which of the following statements is true regarding organizational policy and security awareness training?

a)Employee attitudes toward security awareness training can range from indifferent to eager.

b)Employees’ willingness to work and learn is universal across different organization.

c)Employees’ adherence to security policy is solely dependent upon the organization’s structure.

d)You can only create an organizational policy framework to define policies in flat organizations.

3)Executive management, IT security policy enforcement monitoring, and human resources, all must have a unified front regarding the:

a)size and structure of the organization.

b)management structure and advancement opportunities.

c)issuance of executive orders within the organization.

d)disciplinary treatment of policy violations.

4)Which of the following areas of the organization is responsible for establishing the policy commitment and implementation for the entire organization?

a)Executive Management

b)Supervisory-Level Management

c)Human Resources

d)IT Security Policy Enforcement Monitoring

5)Which of the following areas of the organization conducts system logging, content filtering logging, and e-mail filtering logging with automated reporting for monthly or quarterly policy compliance reviews?

a)Executive Management

b)Supervisory-Level Management

c)Human Resources

d)IT Security Policy Enforcement Monitoring

Question 6

Which of the following areas of the organization is responsible for ensuring that employees, contractors, and consultants conform to all organizational policies?

a)Executive Management

b)Supervisory-Level Management

c)Human Resources

d)IT Security Policy Enforcement Monitoring

7)Violations of security policies are considered to be a(n) __________ issue upon which proper disciplinary actions must be taken.

a)law enforcement

b)employer-employee

c)executive-staff

d)implementation

8)Depending on the violation’s severity, repeat or continued violations of organization-wide policies might be grounds for:

a)refusing to pay earned wages.

b)denying overtime assignments.

c)termination of employment.

d)limiting an employee’s Internet access.

9)Flat organizational structures are characterized by a management structure that:

a)is cross-functional and more open to employee input.

b)places all decision making at the executive management level.

c)provides limited access and connectivity to employees.

d)considers employee contributions to be of no value.

10)Hierarchical organizational structures are characterized by departments that are separated by:

a)creativity level.

b)salary level, creating animosity between departments.

c)teams, creating competitiveness between departments.

d)function, creating multiple functional silos.

11)In hierarchical organizational structures, communication between employees tends to:

a)be very difficult to achieve at all.

b)occur across organizational functions.

c)be more “top-down.”

d)be more “bottom-up.”

12)In flat organizational structures, employees tend to be:

a)more open and communicative.

b)more interested in financial rewards.

c)constrained within their role or function.

d)less likely to interact across the organization.

13)Employees in organizations with flat organizational structures tend to be more:

a)creative and involved in business decisions.

b)dissatisfied and apathetic.

c)financially successful.

d)concerned about job security.

14) Hierarchical organizations are more likely than flat organizations to have a:

a)security policy.

b)formal chain of command.

c)profitable business model.

d)chief executive officer.

15)Which of the following can affect an employee’s sense of job security, purpose, and potential to contribute to the company’s success, all of which can make an employee feel dissatisfied or apathetic?

a)The U.S economy

b)A company’s IT policies

c)A company’s size

d)A company’s board of directors

16)Conducting annual audits and security assessments for policy compliance are critical security operations and management functions because:

a)people constantly change (they grow on the job, move to new jobs, etc.).

b)people tend to shy away from repetition and repetitive inputs.

c)employees never discover new risks and threats.

d)security awareness training is most often ineffective.

17)Which of the following statements is true regarding the scenario in the lab in which the Specialty Medical Clinic was being acquired by a larger parent organization?

a)Both the medical clinic and the larger parent organization had a hierarchical structure with multiple departments and clinics.

b)Both the medical clinic and the larger parent organization had a flat organizational structure.

c)The medical clinic had a hierarchical structure with multiple departments and clinics, while the larger parent organization had a flat organizational structure.

d)The larger parent organization had a hierarchical structure with multiple departments and clinics, while the medical clinic had a flat organizational structure.

18)Security awareness training can include special all-hands meetings called __________ meetings that are held between team or departmental leaders, with those leaders then sharing the information they’ve gained from those meetings with employees.

a)Town Hall

b)Task Force

c)Awareness

d)Security Reminders

19)Which of the following statements is true regarding ongoing security policy management?

a)New policy and procedures always negatively impact a business process or create unintended challenges in a particular department.

b)When users find that a policy is going to make their jobs harder, they’re much more likely to try to circumvent that policy.

c)Employee feedback is not helpful in determining how a policy might impose unintended challenges on an employee.

d)Be certain to communicate, to leaders and employees alike, that there may be adverse repercussions for providing feedback.

20)Which of the following statements is true regarding security awareness training?

a)Employees typically look forward to and enjoy mandatory security awareness training.

b)Security awareness training can be more effective if made unconventional or interactive.

c)The training should be uniform across all employees and departments.

d)The rationale behind the security training should be withheld from the employees.

Total 20 questions i have . 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Role of end-users in the creation of a contingency plan, 300 words plus APA citation and references

Search “scholar.google.com” for a company or school that has defined the role of end-users in the creation of a contingency plan. Discuss why it is (or is not) important to include end users in the process of creating the contingency plan? What are the possible pitfalls of end user inclusion?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

assignment 8

 

How to write: Introduction, Issue, Sub Issue, Conclusion

Note : Each one 2 pages.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

What are your research interests in the area of Information Technology? Why are you inspired to possibly research in this area and/or why do you think it is important to research in this area?

 PhD candidates should provide an authentic personal statement reflecting on their own person interest. In the event that any outside resources are used, those should be cited in APA format. Statement should be a maximum of 500 words answering the following questions:

  • What are your research interests in the area of Information Technology?
  • Why are you inspired to possibly research in this area and/or why do you think it is important to research in this area?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Uses of Efficient Frontier Analysis in SRM

Chapter 22 presented a case study in creating value from uncertainty, and chapter 25 presented the use of efficient frontier analysis in SRM. Assume you are the project lead for the analysis team that uses Efficient Frontier Analysis to evaluate risks of the portfolio presented in chapter 25. How would you explain the results of the analysis to non-technical decision makers? What recommendation would you make, assuming the risk appetite presented in chapter 25?

 Original Discussion(What’s need to be done) –  As indicated above, assume you are the project lead for the analysis team that uses Efficient Frontier Analysis to evaluate risks of the portfolio presented in chapter 25. How would you explain the results of the analysis to non-technical decision makers? What recommendation would you make, assuming the risk appetite presented in chapter 25?

NOTE: These discussions should be informal discussions, NOT research papers. If you MUST directly quote a resource, then cite it properly.

 

The original discussion should be a minimum of 300 words with at least 3 references in APA style.

After this, there is an attached document called “Discussion needs responses”. In this document there are three discussions which needs responses. Each response should be a minimum of 150 words.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

peters company

The case study below offers an excellent perspective on how projects are often initiated under less than ideal circumstances—which often lays the ground work for project failure.

Companies that provide a service for another company usually respond to a bid document from a company that needs help.  This case study is a good example of this situation.  The bid document can be as simple as an email from the buyer to the seller or as complicated as a request for proposal (RFP) outlining the objectives of the project and asking a seller to develop a proposal that provides a solution.

Each company (seller and buyer) will have a business case for doing the project. The Peter’s Company is outsourcing for a reason.  The Corwin Corporation is taking on the project for a different set of reasons.  One of the reasons the Corwin Corporation is taking on the work is the looming, potentially very lucrative production contract if they are successful.  There are no guarantees in research and development project that there will be success.

Part 1 (20 points)–Prepare a requirements management plan (RMP) that addresses the five components described in Section 5.1.3.2, PMBOK 6e.  The plan should be at least 3 but not exceed 4 pages and does not need to conform to APA guidelines (except for citing and referencing sources).

Some things to think about – how is the role of the in-house rep dealt with in the RMP as it relates to activities for planning, tracking and reporting requirements?   Configuration management is not just about software and versioning.  What processes will be used for configuration management activities as they relate to changes in the product requirements?  How and who will authorize/approve changes?   The traceability structure should be tailored to the type of project and should ensure that each requirement adds business value.

Part 5 (15 points)– Create Scope Validation Process.  Using the cast of characters from the case study (and any additional people needed), prepare a process for validating the work packages and higher-level components of the WBS.   For each part of the process flow diagram, explain in a separate page who from the case study is involved and what is to be done.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science + econ. DUE IN 12 HOURS

Do only 1,3,4. Use equation writer in Word to type this up.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project on Access 2013

I need help on Project to access 2013.

I the person complete the instructions on pdf and theni need  the queries answer the below questions. Create a query for the following

  1. How many primary factor Alcohol related tickets issued in the database.
  2. Which primary factor has the least tickets and how many tickets are there
  3. Which primary factor has the most tickets and how many tickets are there
  4. Create a new query that identifies how many tickets M and F have, in other words who has the most ticket Male or Female

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now