College Data Structure and Evaluation of Abstract Data Types

As a data scientist you will be required to manipulate very large datasets in order to answer specific questions. The data that you will be manipulating will often be available in a raw format that have to be cleaned before being suitable for analyses. Due to the size of these datasets it is important to know how to choose the most appropriate algorithms and data structures to answer specific types of questions. A single dataset might have to manipulated in a variety of data structures during analyses. This assignment requires you to recommend appropriate data structure choices for the analyses of data that was collected from Twitter in order to answer several questions.

The assessment tasks described in the PDF, The dataset contains 1600000 tweets extracted using the Twitter API and saved in a CSV file which is big and cannot be uploaded here but can be send over email.

THE ASSESSMENT IS TO ONLY ANALYZE AND RECOMMED THE APPROPRIATE DATA STRUCTURE TYPE FOR ANALYZING THE DATA !! Please refer to the pdf.

Note: the data csv file to be shared in a link, since its a big file.

Use of Satellite Communication Discussion

Week 9 Discussion

Some businesses have no alternative but to use satellite communication solutions.

  • Give some examples of when you think this would be appropriate and what considerations you need to take into account when choosing a satellite option.
  • How would this affect your need for ATM or your large business WAN operations?
  • You’ll need to know how to deploy your teams and resources to support these networks. Talk about your first thoughts on how you might do this based on what you’ve learned in class so far.
  • After posting your response, respond to at least one of your classmates on their suggestions.

Here is the post that you have to respond

Hello Class & Professor,

I am going to be a little out of the box. Airplanes, if an EMP happens and multiple airports are taken out. It would be a critical communication solution. Currently, plans are tracked over radars, but their tracking over water is not very good; hence the problems are trying to find planes when they go down near the ocean. That can be used for data transfers as well. However, we need to worry about the data going back and forth and the encryption. Could it be as a drone with a transponder that could take out the incoming frequency and allow the airplane to then connect to the rouge satellite signal? MITM // IMSI catchers.

When thinking of satellite, we think of a dish on top of a business or news agency. We have never seen one on top of Starbucks; that would be great. People in Arizona have thunderstorms all the time in the summertime, they call It the monsoon; Example (https://vimeo.com/106827999). They have problems with when the clouds are very thick with moisture and or there is a lot of static electricity and or sand from dust storms; they lose a lot of satellite reception. The signals cannot go through all the interference well. Wonder what other companies around the world do. For instance, in Arizona, Dish Network would not have service until the storm passes. People with cable, who have the fiberoptic in the ground, would have no problems at all.

 

Attachment preview

Circuit Switched vs Packet Switched Technologies Discussion

Instructions: Please read the attached pdf that contains chapter 4 and write a discussion on the given topic (atleast 3 – 4 paragraphs).

Note: You can use both attached pdf and online resources as we

Financial management Essay

In at least 250 words, name and describe the major functions of Financial Management based on the material presented in this course. Explain how you have seen these functions addressed in the workplace.

 

Blockchain Technology Research Paper

Prepare a one page APA style paper about blockchain applications. In the paper be sure to (1) define the parameters of blockchain applications, (2) address why they are needed, (3) discuss the different types and (4) discuss how the current markets could benefit from the use of such applications. Use at least 2 sources in this paper (and please be sure to cite them in the paper).

Impact of Big Data on Businesses Analysis

ANALYSIS: Using 600-1000 words, write a brief analysis, in your own words of how the article relates to the selected chapters. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format.

Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.

Security Risks in Database Migration Essay

Project Topic – Security risks in database migration

Propose and defend a topic for your final project. Write 500 words or more explaining why this topic is important for your peers to understand. Be focused and specific. Look into the general topic provided in the list below to find something new and interesting to write about. You should do a deep dive into a topic. Do not do a survey. Make use of academic rederences such as you can find in the Danforth LIbrary research databases

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.

Write in essay format not in bulleted, numbered or other list format.

Respond to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. Make your initial post by Thursday 11:59 pm EST. Respond to two of your classmates by Sunday 11:59 pm EST.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. Please do not use attachments unless requested

Enhancing Cybersecurity for The Digital Health Marketplace Paper

2.1 Scholarly Abstract Assignment #1

Create a 2-3 page single-spaced Analysis of Research abstract published scholarly articles related to your mock dissertation topic/research question.

Brevity and being concise are important as this analysis is intended to be a brief summation of the research.

Each abstract must therefore consist of the following in this order:

1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.

2. Author Qualifications – name and qualification of each author conducting the research

3. Research Concern – one paragraph summary of the reason for the overall research topic

4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research

5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)

6. Research Methodology – description of the population, sample, and data gathering techniques used in the research

7. Instrumentation – description of the tools used to gather data (surveys, tests,interviews, etc.)

8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

Additional information on writing scholarly abstracts can be found via this link

See completed example

 

2.2 Scholarly Abstract Assignment #2

Just like you did in assignment 2.1, you will create a 2-3 page single-spaced Analysis of Research abstract published scholarly articles related to your mock dissertation topic/research question. However, this time you need to review a different methodology than you previously did (i.e. if you reviewed a quantitative article in 2.1, you will do a qualitative one in 2.2 and vice versa).

Brevity and being concise are important as this analysis is intended to be a brief summation of the research.

Each abstract must therefore consist of the following in this order:

1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.

2. Author Qualifications – name and qualification of each author conducting the research

3. Research Concern – one paragraph summary of the reason for the overall research topic

4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research

5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)

6. Research Methodology – description of the population, sample, and data gathering techniques used in the research

7. Instrumentation – description of the tools used to gather data (surveys, tests,interviews, etc.)

8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

Injection Vulnerability Discussion

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.

Write in essay format not in outline, bulleted, numbered or other list format.

Do not submit attachments.

Use the five paragraph format. Each paragraph must have at least five sentences.

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.

Multimedia Information System Security Discussion

Hi,

Could you summarize the attached research paper?

Allowed citation percentage is 20%.

Using simple academic language because I’m a student.

no more than 600 words that cover the following:

1-summary of paper

2-strength (one or more)

3-weakness (one or more)

It should be finished in 3 days.

thank you