references with citations must each 1 amp 2 separate papers

1)Chapter 1 provided a high-level overview of the need for a national framework for protecting critical infrastructure. For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure:

https://www.whitehouse.gov/presidential-actions/pr…

After reading chapter 1 and looking at the link above, you’re ready to participate in the first discussion.

Let’s look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defense’s [DOD’s] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation.

please explain how DHS should handle the situation described in the preceding paragraph.

2)Discussion question (Instructor)

On Page 3 of the Introduction in our textbook – Managing & Using Information Systems: A Strategic Approach – Figure 1-1 lists reasons why business managers should participate in information systems decisions.

Reply to this Discussion question (800 or more words)

Select 4 of these reasons and find a peer-reviewed journal article to support each reason. Try to find articles that are less than 5 years old. You will have 4 reasons and 4 journal articles. In one paragraph, summarize the article. Make sure you cite and reference the articles correctly.

week 9 discussion 29

Visit the MEDLINE website (Links to an external site.)Links to an external site. and browse the various links to sites offering information on club drugs.

What club drug(s) present the greatest danger to teenagers and young adults in America? What is the danger?

Criminal Behavior: A Psychological Approach

  • Chapter 16
  • Of Crime and Criminality, Chapter 10

Author: Curt Bartol, Anne Bartol

Publisher: Prentice Hall

Edition: 11th

ISBN: 978-0134163741

final project case study analysis needs to be written in apa format of atleast 6 pages

For your Cloud Computing Final Project, complete a case study to provide a practical reference to help enterprise Information Technology (IT) and business decision-makers adopt cloud computing to solve business challenges. The case study provides a way to evaluate the market from the point of view of your organization to select a cloud architecture and an implementation approach through the use of house staff, cloud vendor(s), or both.

An organization is expected to have any or all of the Cloud Computing models, depending on its needs for speed of execution, available resources, data protection and security needs, and an array of other reasons. Based on your case study, choose the most efficient cloud service and deployment model for your organization. As the organization’s consultant, provide accurate guidance to decision-makers on the selection of cloud service and deployment models. Take into consideration the organization’s size, IT Infrastructure, and other needs.

Follow the Step-by-Step Cloud Computing Prescriptive Series to guarantee a successful cloud deployment from the perspective of the cloud service consumer. During the Intersession, you completed steps 1-7 of your project for review. Use the feedback from the intersession assignments as you write your final analysis. Additionally, add steps 8-10 to your final analysis.

Step-by-Step Cloud Computing Prescriptive Series:

  1. Assemble your team
  2. Develop a business case and an enterprise cloud strategy
  3. Select cloud deployment model(s)
  4. Select cloud service model(s)
  5. Determine who will develop, test, and deploy the cloud services
  6. Develop governance policies and service agreements
  7. Assess and resolve security and privacy issues
  8. Integrate with existing enterprise services
  9. Develop a proof-of-concept (POC) before moving to production
  10. Manage the cloud environment

datamining-questions

1. What are the di erences among the three:

(1) boxplot (2) scatter plot (3) Q-Q plot?

2. Assume a base cuboid of 10 dimensions contains only two base cells:

(1) (a1; a2; a3; b4; :::; b19; b20), (2) (b1; b2; b3; :::; b19; b20),

where ai 6= bi for any i. The measure of the cube is count.

(a) How many nonempty aggregated cells a complete cube will con-

tain?

(b) How many nonempty aggregated cells an iceberg cube will con-

tain if the condition of the iceberg cube is count 2″?

(c) How many closed cells in the full cube?

3. Since items have di erent values and expected frequencies of sale, it

is desirable to use group-based minimum support thresholds set up by

users. For example, one may set up a small min support for the group

of diamonds but a rather large one for the group of shoes. Outline an

Apriori-like algorithm that derive the set of frequent items e ciently

in a transaction database.

4. For mining correlated patterns in a transaction database, all con dence

( ) has been used as an interestingness measure. A set of items fA1;A2; :::;Akg

is strongly correlated if

sup(A1;A2; :::;Ak)

max(sup(A1); :::; sup(Ak))

min

1

where min is the minimal all con dence threshold and max(sup(A1); :::sup(Ak))

is the maximal support among that of all the single items

Based on the equation above prove that if current k-itemset cannot

satisfy the constraint, its corresponding (k+1)-itemset cannot satisfy

it either.

5. What are the major di erences among the three:

(1) information gain (2) gain ratio (3) foil-gain

6. What are the major di erences between:

(1) bagging (2) boosting?

7. Given 50 GB data set with 40 attributes each containing 100 distinct

values , and 512 MB main memory in a laptop, outline an e cient

method that constructs decision trees e cientlym, and answer the fol-

lowing questions explicitly:

(a) How many scans of the database does your algorithm take if the

maximal depth of decision tree derived is 5?

(b) How do you use your memory space in your tree induction?

how-would-you-defend-the-statement-quot-project-management-in-action-is-different-in-2019-and-in-particular-what-has-been-the-impact-to-scope-management-quot

How would you defend the statement “Project Management in Action is Different in 2019…and in particular what has been the impact to Scope Management?”

evaluating the model of democracy applying arend lijphart s grand theory 1

Please there should be no Plagiarism. Therefore correct quotations and bibliography entries are mandatory.

Using the typology provided by Arend Lijphart in his book “Patterns of democracy” as a basis of their assessment of Bulgarian democracy the students should:

  1. Individually apply the 10 criteria that Lijphart develops to the chosen by me political system.
  2. Deliberate on the common values that should be assigned to every component. Identify possible issues, problems, shortcomings with the application to any of these criteria for understanding the type of democracy.
  3. Based on the context evaluate the overall logic of the model developed by Lijphart.
  4. Write a short (two-three pages long) essay justifying your view on the matters mentioned above.

your-own-artist

Now show us how an artist you have chosen, in one of their works has brought the reader to the hell-ish, deathly place.hand in your typed (double-spaced, and proofread) essay Especially show how the director has used the images from “The Tyger.”
Also: are there any images of Heaven throughout the sto, in contrast

trauma-informed-practice-with-specific-population-or-an-agency

Length: 6 – 7 pages double spaced, not including title page. APA formatting.

A trauma-informed practice approach primarily views the individual as having been harmed by something or someone, thus connecting the personal and the socio-political environments: A foundational principle within social work. The purpose of this assignment is to identify the principles of trauma informed practice through a social work lens.

NOTE- There is a required minimum of 6 scholarly sources;

you are encouraged to use other sources that can support the richness of your learning. ,

search out other sources of information (academic as well as sources of traditional knowledge-based teachings if appropriate) to support your paper. Include in your discussion, what it means to be a trauma-informed social worker in either option you choose.

Pick one of the options below:

1) Explore trauma informed practice with a specific population – e.g. refugee, women experiencing family violence, At-risk youth, Indigenous peoples, men who experienced childhood sexual abuse, and so forth.

OR 2) Discuss a specific agency( has to be canadian agency) in relation to trauma-informed-practices/trauma-informed service delivery. Find a trauma informed organizational assessment guide (there are many established ones found on-line) then either evaluate that organization’s practices against that guide or use examples from the organization’s practice to illustrate the principles you are discussing

responses-comments-to-the-attached-articles

Please find the attached 2 articles. Kindly read each article and give your comments to each of them. Minimum of 150 words to each article is important.

Total of 300 words to both articles.

No plagiarism

use your own words please

4 Peer Reviewed References (2 references to each article)

in-text citations

giving-a-peer-review-on-a-paper

all the instructions will be in the rubric that is attached as a file, also the paper you doing it on will be attached also.