Write a 5 Page Minimum (single-spaced with 12-point font) research paper covering the topic, citing any sources you use, including the CCPA or GDPR.

Computer Science Question

Write a 5 Page Minimum (single-spaced with 12-point font) research paper covering the topic, citing any sources you use, including the CCPA or GDPR. Your paper should have a Minimum of 5 Sources that are properly cited in the text and included in a Reference section.

Use a common citation method such as APA or IEEE and be consistent throughout (SOURCES WILL BE CHECKED!).

Explain how the recommender system works and how it uses data modeling to provide personalized recommendations to users. Analyze the benefits and challenges of data modeling in this context. Consider factors such as data privacy, algorithm accuracy, and user satisfaction.

Module 5: Netflix Case study

Assignment: Netflix Recommender System Data Modeling

In this assignment, you will explore the Netflix recommender system and analyze how data modeling is used to provide personalized recommendations to users. You will also investigate the benefits and challenges of data modeling in this context.

Instructions:

  1. Research the Netflix recommender system and its data modeling techniques.
  2. Explain how the recommender system works and how it uses data modeling to provide personalized recommendations to users.
  3. Analyze the benefits and challenges of data modeling in this context. Consider factors such as data privacy, algorithm accuracy, and user satisfaction.
  4. Provide examples of other companies or services that use data modeling to personalize recommendations or improve user experiences.
  5. Evaluate the ethical considerations of data modeling in this context. Consider issues such as bias, fairness, and transparency.
  6. Reflect on the potential future developments of data modeling in the context of recommender systems.

Explore the data using data visualization techniques, such as histograms, scatter plots, and heatmaps. Identify any trends or patterns in the data that you find interesting, and write a brief report (2-3 pages) summarizing your findings.

Exploring the Housing Market in Python

Objective: To gain practical experience in importing and managing data in Python, and to use data visualization techniques to explore trends in the housing market.

Task:

  1. Obtain a dataset of housing prices and related variables such as square footage, number of rooms, location, etc.
  2. Import the data into Python using the Pandas library.
  3. Perform any necessary data cleaning and preparation, such as handling missing values and removing duplicates.
  4. Explore the data using data visualization techniques, such as histograms, scatter plots, and heatmaps.
  5. Identify any trends or patterns in the data that you find interesting, and write a brief report (2-3 pages) summarizing your findings.

Resources:

What is an Information Technology Project? What is research? Why do we need to do research? What is a research methodology? What is a research design?

Information technology project question

Answer the following questions: Make sure to follow the instruction given and observe the required word count:

1. What is an Information Technology Project? (Max 50 words) ”Cite the source – Use APA.”

2. What is research? (Max 50 words) “Cite the source – Use APA.”

3. Why do we need to do research? (Max 50 Words) “Cite the source – Use APA.”

  • 3.1. – Explain what we mean by Qualitative research
  • 3.2. – Explain what we mean by Quantitative Research
  • 3.3. – What is a survey?
  • 3.4. – List the major parts of a research paper
  • 3.5. – What is a Peer Review-Journal?

4. As students / Scientists, what topic/s do we need to research? (Max 50 Words) “Cite the source – Use APA.”

  • 4.1. – Why do we need to use keywords during our Lit Review?

5. What is a research methodology? (Max 100 Words) “Cite the source – Use APA.”

6. What is a research design? (Max 100 Words) “Cite the source – Use APA.”

7. What do we mean by project deliverable? (Max 50 Words) “Cite the source – Use APA.”

8. Is deadline an important aspect of a project? (Max 50 Words) “Cite the source – Use APA.”

9. What are project limitations? (Max 50 Words) “Cite the source – Use APA.”

10. What do we mean when we say resources? (Max 100 Words) “Cite the source – Use APA.”

11. Why do we need to apply APA Basic Citation Stiles in a research proposal? (Max 100 Words). “Cite the source – Use APA.”

12. From our Syllabus, please explain what we mean by Academics Integrity. (Max 250 Words) “Cite the source – Use APA.”

13. What is Plagiarism? (Max 100 Words) ”Reference the Academic Integrity from the Syllabus”

14. What is Self-Plagiarism? (Max 50 Words) ”Reference the Academic Integrity from the Syllabus”

15. What are bar charts? (Max 15 words)

16. What is a central question? (Max 15 words)

17. What do we mean when we say: Cleaning the Data? (Max 25 words)

18. What is a sample size formula? (Max 25 words)

19. Define the term “Statistics” (Max 20 words)

Determine the necessary requirements to achieve the proposed system and its associated technical design, including the multilevel architecture specifications and design.

DESIGN AND ANALYZE A MULTILEVEL ARCHITECTURE

INTRODUCTION

Many organizations have legacy systems that are no longer meeting the organization’s requirements with regards to business processes and security. Laws such as the Health Insurance Portability and Accountability Act (HIPAA) require higher security standards since these laws were implemented, and new technology is now available that was not an option previously. A LAN administration and security manager may need to design a new system that will increase security and automate business processes more efficiently than the current legacy system.

Using the attached “Business Systems Design Report Template,” you will design and document a multilevel target security architecture to address cybersecurity threats to the Healthy Body Wellness Center (HBWC). You will also use the “Business Systems Design Report Template” to conduct, record, and audit your design, and provide justification to defend each aspect of your multilevel network architecture. You will then complete the attached “DREAD Workbook” and submit it as a separate attachment.

The “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Center Security Assessment Report” are attached for your reference; you may also refer to the “Business Requirements Document Template” you created in Task 1 to assist in the completion of this task.

SCENARIO

As the newly promoted LAN administration and security manager for Healthy Body Wellness Center’s (HBWC) IT Department, you are tasked with designing a multilevel target security architecture using the “Business Requirements Document Template” you created in Task 1. Then you will need to conduct a DREAD analysis on your multilevel architecture design.

The technical requirements and specifications for the multilevel target security architecture should be based on the business, functional, and security requirements you documented in the “Business Requirements Document Template.” The target multilevel architecture should include the Small Hospital Grants Tracking System (SGHTS), payroll system, and research data that meet the standards and regulations of the National Institute of Health (NIH) and the federal government, including HIPAA and industry best practices.

REQUIREMENTS

Your submission must be your original work. No more than a combined total of 30% of a submission can be directly quoted or closely paraphrased from sources, even if cited correctly. Use the report provided when submitting your task as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A. Current Systems: Summarize the systems currently being used at the Healthy Body Wellness Center using details from attached case study and assessment report. (HBWC) You may use the information you provided in the BRD template from your Task 1 submission. Record your summary in the “Current Systems” section of the attached “Business Systems Design Report Document.”

B. Goals, Objectives, and Rationale for New System: Outline the purpose, goals, objectives, and rationale for the proposed system, including a clear statement of the problem using the information provided from the “Healthy Body Wellness Center Case Study” and the “Healthy Body Wellness Center Security Assessment Report” to justify your claims. Record your responses in each subsection of the “Goals, Objectives, and Rationale for New or Significantly Modified System” section of the attached “Business Systems Design Report Document.”

C. Factors Influencing Technical Design: Explain the relevant standards, assumptions, dependencies, constraints, and design goals that influence the technical design of the proposed new system. Record your responses in the “Factors Influencing Technical Design” section of the attached “Business Systems Design Report Template.”

D. Proposed System: Determine the necessary requirements to achieve the proposed system and its associated technical design, including the multilevel architecture specifications and design. Include all required tables and diagrams as part of your submission. Record your responses in all subsections of the “Proposed System” section of the attached “Business Systems Design Report Document.”

E. DREAD Analysis: Conduct an analysis of your multilevel architecture using the attached “DREAD Workbook.” Record your results in the “DREAD Workbook” and include the workbook as an attachment. Your workbook should include a minimum of ten threats.

F. Analysis of Proposed System: Summarize your findings from the DREAD analysis by prioritizing and describing the top five risks identified in the “Listing of Threats” worksheet, including mitigation, risk acceptance, and justification for your decisions. Record your responses in the “Analysis of the Proposed System” section of the attached “Business Systems Design Report Document.”

G. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

H. Demonstrate professional communication in the content and presentation of your submission.

For each category of Employee, count the number of employees in that category, and the average salary of that category. Find the average number of orders placed by Customer. Find all the customers who purchased the Popular-Product.

Show the SQL statement of the following Queries.

  1. For each category of Employee, count the number of employees in that category, and the average salary of that category.
  2. Find the average number of orders placed by Customer.
  3. Find all the customers who purchased the Popular-Product.
  4. Find the store that has most different products in stock.
  5. Find the floor staff who has taken charge of all the floors in the past 1 week.
  6. For each product, list all the stores selling it, and the price of the product at the stores.
  7. Find the floor that have the most number of stores located.
  8. List the schedule of the Gold-Store.
  9. Find the store that produces the most amount of sale in the past 1 week.
  10. Find the employee who supervises the most number of floor staffs
  • https://www.studypool.com/questions/download?id=2830872&path=uploads/questions/1321933/20230501201050project_part2.drawio.pdf&fileDownloadName=attachment_1

What are the factors to be noted while creating microservices? How microservices communicate with each other and how to handle fault tolerance?

PRIOR KNOWLEDGE ON SPRINGBOOT MICROSERVICES REQUIRED

Based on below papers we have to write systematic Research paper (sample paper attached )

Add these questions in paper

Q1 : What are the factors to be noted while creating microservices?

Q2 : How microservices communicate with each other and how to handle fault tolerance?

Q3 : Challenges in Authenticating and Authorizing microservices?

Papers as below:

Note: As per the document attached need Side headings and proper content : Introduction, Systemtic review with Questions as above, conclusion etc… Every content should be from above mentioned papers only

Discuss one technology that is being used by these groups for nefarious purposes. What is or has the U.S. government done to counter its influence?

CJIF Program Discussion

Despite numerous laws and the intervention of the government, terrorists and malicious nation-state actors have been using technology to further their goals and objectives. Such technologies include the use of fake accounts, bots, forums, cryptocurrency, commodity malware, etc.

  • Discuss one technology that is being used by these groups for nefarious purposes.
  • What is or has the U.S. government done to counter its influence?
  • Have these actions been effective? How or how not?
  • What else can we do to lessen its influence/effects?

How did the teaching experience impact you personally? What did it reveal about your leadership skills, ability to present and guide/work with younger children? How did you change over the course?

Criteria and Rubric for Final Project

COMBO SMT2044-U01 (19288) /

SPRING23 / SIMMONS

Directions:  Please be creative in composing your final project.  This is Due on or before Friday, April 28 (9:45am – 11:45am) although can be uploaded earlier should you finish ahead of time!

Must Haves:

  • “Some” audio recording of your own voice using technology (Powerpoint, Screencast, Imovie, Voicethread, Nearpod).
  • Include a storyline or progression of how you developed through the course from start to finish using your final TEACH3/4 data. Note: If you decide to do a powerpoint – consider including presenter notes (just be sure I can see them).  This helps me track what you intended the slide to convey to me, the viewer.

Components

  1. Narrative (20 points) of your teaching experience (This includes your reflections on your Peer teach, TEACHES 1 – 3. What were you expecting? What did you experience? (This is paragraph form with audio recording)

 

  1. Showcase TEACH4 (Some of you are TEACH3) (20 points)
    • Specifically showcase (describe, illustrate) the intended content and activities of the lessons for FINAL TEACH – this serves as an overview of what you intended to do in FINAL TEACH. You can link your lesson plan but you must provide an overview (scaffold) of your plan (What were the 5E’s)   

 

  1. Statistical Analysis (30 points) Analysis of Student Work from FINAL TEACH (Note: your final project you MUST have data (Excel or Google Sheets) on students’ understanding both before and after the test. ) = Quantitative

* You will also need a rubric to analyze some of your qualitative data (open responses, drawings, models etc) i.e. – What does the data tell you about whether students met the objectives?)

 

  1. Modifications to FINAL TEACH (15 points)
    If you taught your FINAL teach again – please highlight in the lesson plan OR narrate in an organized fashion ONLY the parts of your lesson that you will change.
  2. Summary (15 points)
    • How did student work/data influence your revision,
    • How did Mentor teach / Professor Simmons feedback influence your modifications?  Why? How?
    • How did the teaching experience impact you personally?  What did it reveal about your leadership skills, ability to present and guide/work with younger children? How did you change over the course?