Computer Science Homework Help

BIT 200 Grand Canyon University Social Media Data Collection Presentation

 

The purpose of this assignment is to identify social media data collection strategies and the legal and ethical issues associated with social media data mining.

Part 1

Conduct research to identify how business organizations mine social media to collect data so they can obtain a competitive advantage in the marketplace. Locate examples of several strategies and companies. You cannot use examples already referenced in the study materials. Research the legal and ethical issues that are associated with data mining activities, including specific laws that govern data mining and examples of companies that have faced legal issues and negative consequences as a result of ethical issues resulting from the data mining strategies they employed.

Create a PowerPoint presentation (minimum of eight content slides) that summarizes your findings and addresses the following. Include a reference slide at the end of the presentation.

  1. Describe strategies business organizations use to mine social media to collect data and provide supporting examples.
  2. Discuss how the data that are mined via social media can be used to create a competitive advantage for the business organizations.
  3. Describe legal issues associated with business data mining activities, including specific laws governing data mining practices.
  4. Provide an example of a company that faced legal issues as a result of the data mining strategies it employed.
  5. Discuss ethical issues associated with business data mining activities.
  6. Provide an example of a company that faced negative consequences as a result of ethical issues resulting from the data mining strategies it

Computer Science Homework Help

NEC PCI Compliance to The Database Administrator at A Large Retailer Essay

 

In 500 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format.

Write in essay format not in bulleted, numbered or other list format.

Computer Science Homework Help

CIS 175 American InterContinental University PowerShell Script Practice

 

  • Use Microsoft Word
  • Title page
    • Course number and name
    • Project name
    • Your name
    • Date
  • Write a Windows PowerShell script that will perform the following functions:
    • Search your computer for files ending with a .doc, .docx, .xls, or .xlsx file extension.
    • Output the filenames and sizes (in groups by file extension) to a text file named “File_Summary.txt”. The output should also conclude with a total of the number of files and total file size for each file extension.
    • Include comments in the script code to document the functionality of the script.
  • Paste the script and the file output to your MS Word document.

Computer Science Homework Help

New England College IT Security Policy Essay

 

Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Computer Science Homework Help

Week 4 IDaaS SSO SAML FIDM and ID Management Analysis Paper

 

This is a required assignment worth 15 points (15-points/1000-points). by the due date. No late assignments are allowed. Please discuss the following topics and provide substantive comments to at least two other posts.

Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.

The discussion questions this week are from Chapter 5 (Jamsa, 2013).

Chapter 5 topics:

  • Define and describe SSO.
  • Define and describe IDaaS.
  • Define SAML and describe its purpose.
  • Define and describe provisioning.
  • Define and describe FIDM.
  • List factors that make mobile ID management difficult.

Note: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. The initial post is due by Wednesday at You must engage on at least three separate days (by Wednesday for the first post and two additional days of peer engagement).

Computer Science Homework Help

Dar Al Hekma University Machine Learning and Artificial Intelligence Presentation

 

Write about the topic of Artificial Intelligence (AI) e. as powerpoint

  • Explain what is Machine Learning and what it has to do with AI (Write a couple of slides about machine learning )
  • Explain why AI Applications are popular right now( And then write about how machine learning has applications to do with AI)
  • Computer Science Homework Help

    Cyber Security and Ethics Live Penetration Test Discussion

     

    I’m working on a cyber security question and need an explanation and answer to help me learn.

    During a United Airlines flight from California to Ohio, a California University cybersecurity student decided to conduct a live penetration test of the flight. The student commandeered the Boeing aircraft by tampering with the thrust management computer via its in-flight entertainment system, causing one of the airplane engines to climb. That resulted in a jarring sideways movement of the aircraft and oxygen masks dropping from overhead. The turbulence-like motion frightened some passengers, causing them to scream, cry, soil themselves, and/or discover religion. Other passengers were nonplussed and continued to read the SkyMall magazine located in the seatback pocket in front of them. The student did not intend to harm anyone onboard but the actions against such critical systems could have been grave. Give an ethical argument for and against the student

    Computer Science Homework Help

    LIU Digital Computer Forensics Methods Essay

     

    Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).

    Your written assignment should be 3-4 paragraphs in your own words and should include reference citations for your source of information. 400 words (Double spacing)