a. Briefly describe why clusteirng is one kind of unsupervised learning
b. Briefly descirbe how a K-means clustering works
c. Briefly describe the main difference between K-means and K-medoid methods.
d. In data mining, one of the fields is outlier analysis. Explain what is an outlier? Are outliers noise data?
e. A good clustering method will produce high quality clusters. What criteria can we use to judge where clusters are high quality clusters?
f. List out at least two drawbacks of K-means clustering approaching. In hierarchical clustering, there are different ways to measure the distances between clusters, e.g. single linkage, complete linkage, and average linkage. Briefly describe the difference among these three distance measures.
This assignment requires that you create a free SurveyMonkey® or QuestionPro online questionnaire account.
Go to http://www.surveymonkey.com/ OR http://questionpro.com/.
Sign up for a free basic plan / account by following the instructions on the screen.
Follow the instructions on how to create a simple survey.
In this assignment you will create an online questionnaire. Prepare as follows:
Read Activity 7.2 on page 239 of the textbook.
Create an online questionnaire using your account on SurveyMonkey® or QuestionPro, depending on which one you selected during the.
Insert the six (6) questions in your questionnaire. You may add additional questions if you wish.
Send an email to at least five (5) friends or participants and ask them to participate in the online questionnaire. Include the link to the online questionnaire in the email.
Give your participants a few days to complete the online questionnaire.
Use SurveyMonkey® or QuestionPro to analyze the collected data.
Download and save the report. You may take a screenshot if you wish.
Attach your report to your assignment paper.
Write a four to five (4-5) page paper in which you:
Include the survey report.
Describe the positive and negative aspects of creating and conducting an online questionnaire.
Speculate on the reliability of the collected data.
Recommend two (2) methods that you can use to validate the collected data.
Based on your experience, describe the major challenges of using an online questionnaire Website.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Format your assignment according to the following formatting requirements:
Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.
Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.
The specific course learning outcomes associated with this assignment are:
Demonstrate the ability to select an appropriate user interface interaction style for a particular task.
Explain the different usability data-gathering techniques
Create a product evaluation through a formal framework.
Use technology and information resources to research issues in human-computer interaction.
Write clearly and concisely about human-computer interaction topics using proper writing mechanics and technical style conventions.
HITECH Act Technology and Controls
The HITECH Act requires providers applying for financial incentives for meaningful use to engage in a number of very specific data collection, storage, and exchange activities. A large percentage of healthcare providers that might qualify for these financial incentives are small practices—essentially small businesses. These small businesses rarely have the resources available to purchase and maintain the technology necessary to qualify for these incentives. Providers have chosen a variety of solutions including partnering with large health systems that might provide the services as part of the partnership or choosing to outsource the work to a third party.
Dr. Taylor has been providing healthcare for his neighbors since the 1960s. Over the years, he has shared a clinic space with several other independent physicians, sharing expenses, support staff, and on-call responsibilities. Dr. Taylor and his partners have decided that they do not want to follow the path of many of their peers by joining forces with a large health insurance company. At a partners meeting, Dr. Taylor was tasked with finding a cloud provider to help the partners implement an appropriate electronic health record (EHR). The EHR would meet all criteria, including security and privacy regulations, that would qualify these health providers for meaningful use financial incentives.
Use the study materials and engage in any additional research needed to fill in knowledge gaps. Then discuss the following:
Describe the steps necessary to select an appropriate cloud provider that will provide access to an EHR and host data storage for a small provider practice.
Identify the security and privacy controls that the selected cloud provider must be able to implement to comply with the HITECH Act criteria.
Explain the roles and responsibilities of the cloud provider and the healthcare providers in ensuring that the HITECH Act security and privacy regulations are met.
This is part II of Quiz 10 Chapter 10 of the assigned textbook “Wharton Managing Emerging Technologies – Scenario Planning for Disruptive Technologies”.
Create two essay questions and associated answers. The question/answer part may not be the same as any two previously submitted.
Read Four (4) academically reviewed articles on Cyber Security and Risk Management and complete the following activities:
(Wikipedia articles will not be accepted. Professor may check originality of all posts. Avoid copy-and-paste.
1. Summarize all four (4) articles in 300 words or more. Please use your own words. No copy-and-paste
2. Base on your article review and the assigned reading, discuss the relationship between cyber security and risk management.
3. As an IT manager, discuss how you will use the concepts discussed in the four articles in the management of IT risks within your company
Explain how Active Directory impacts the Ken 7 Windows Limited environment?
Explain fully and clearly from academic journal article research what types of differences exist between men and women in negotiation?
Watch the video on Top 5 Cybersecurity Threats In 2018, select one of the threats that face the computer industry and expand on how it will affect the users and how users can prevent from being effected.
Your proposal should be a minimum of 2 – 3 pages and properly site all references (does not include title page and reference page).
You should have at least 4 references with at least two being peer reviewed articles.
Follow APA format.
Write a 1/2-page informal paper using Microsoft® Word that answers the following questions:
Accurately define Cloud Storage-as-a-Service.
Accurately describe how to get to OneDrive® from a Web browser.
Describe in a set-by-step manner how to sync files.
What is a guest link?
List three ways you can control access in OneDrive®
Describe two vulnerabilities you think OneDrive® contains.
As a group, produce power point lecture note on Data Visualization and Geographic Information System in IT Environment. As an IT professional, how would you use your understanding of these concepts to effectively manage an organization.
Your power point should contain at least 15 slides. Use APA throughout. Support your power point lecture note with appropriate references