Practical Connection

 

Course: System Analysis and Design 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment (My role : Software Quality Analyst ). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Blockchain – Discussion

This week’s reading introduced an overview of blockchain and its impact on business. Create a new thread, choose a use case from section III, and a risk for adoption from section IV. Describe a real blockchain-based product that implements your chosen use case and how your chosen risk could impact the project’s success. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion.

You must do the following:

1) Create a new thread. As indicated above, create a new thread, choose a use case from section III, and a risk for adoption from section IV. Describe a real blockchain-based product that implements your chosen use case and how your chosen risk could impact the project’s success. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion.

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should answer AT LEAST one of the questions posed in the thread and extend the conversation started with that thread. Make sure that you include the question in your comment so I can see what question you’re answering.

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just a short answer.)

Data Collection for Machine Learning

 

Assignment 1B: Data Collection for Machine Learning Model

• Two multi-part, multiple-choice questions.

• Details of the Q1 & Q2 m/c questions are shown in the attached question sheet.

• Lecture notes on Machine Learning in Healthcare for your reference

Discussion

 

Discuss in 500 words your opinion on what lessons should be learned from the 737 Max 8 crashes. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Business Intelligence

 

1. Some people say that chatbots are inferior to chatting. Others disagree. Discuss

2. Discuss the financial benefits of chatbots.

3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are. 

4. Compare the chatbots of Facebook and WeChat. Which has more functionalities?

5. Research the role of chatbots in helping patients with dementia.

6. Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done

Cybersecurity Strategy, Law, and Policy Team Assignment

 

Group Project #2 MUST have 20 external scholarly citations within the submission.

The chief technology officer (CTO) has indicated that your organization has been requested by the National Security Council (NSC) to comment on the upcoming National Cybersecurity Strategy. The NSC has asked for specific recommendations as it relates to the next cybersecurity strategy, private/public partnerships, and comments on how specific technologies should be incorporated into the assessment.

The CTO has asked you to collaborate with your team to provide the organizational input.

You will be collaborating with your previously assigned team on this assignment. It is up to the team members to decide how they will plan, meet, discuss, and complete the six sections of the paper. Remember, if a member fails to complete his or her part of the work, the team is still responsible for all sections. You will also complete a peer review for yourself and for each member of the team. The peer feedback will be incorporated into each team member’s assignment grade.

As a group, use the Cybersecurity Strategy, Law, and Policy Team Assignment Resources to write your paper, which should cover the following topics:

 Part 5: Cybersecurity Technologies

  • The authors of the National Security Strategy (NSS) are looking to address particular technologies that have the opportunity to revolutionize cybersecurity. They believe that blockchain technology is a revolutionary technology that has the ability to significantly improve cybersecurity.
    • What would be your recommendation for how the NSS should incorporate this technology to the public?
    • Propose exactly what you believe should be written in the NSS. Specifically, explain the blockchain technology in layman’s terms to nontechnical people that may be reading the NSS, give examples of how it could be used to provide revolutionary cybersecurity, include examples of how it is being used to provide cybersecurity solutions, and discuss what, if any policies or laws should be established to mandate its use in specific industries.

Part 6: Ethics in Cybersecurity

  • Ethical issues are at the core of what we do as cybersecurity professionals. Think of the example of a cyber defender working in a hospital. They are charged with securing the network, medical devices, and protecting sensitive personal health information from unauthorized disclosure. They are not only protecting patient privacy but their health and perhaps even their lives. Confidentiality, Integrity, Availability – the C-I-A triad – and many other cybersecurity practices are increasingly at play in protecting citizens in all walks of life and in all sectors. Thus, acting in an ethical manner, is one of the hallmarks of a cybersecurity professional. 
    • What are the ethically significant harms that may result from mass surveillance (including by government and corporations)? 
    • What are the ethically significant harms that may result from emerging technologies such as blockchain technology, artificial intelligence, and machine learning. 

Python

  

Python 

Write a program that takes an integer input b that represents a number base and prints all

numbers with two digits in that base. Print all numbers in one line, separated by spaces, in ascending order. For example, if b is 2, the output should be 00 01 10 11. Use

a function called numbase(b). Check for invalid number bases

COMPUTER SCIENCE

 

As the manager of a small flower shop, you have just received an email from a customer that is quite negative. Your task is respond to the customer via email in using professional business etiquette. 

  • Use the article, “Watch Your Tone: Email Etiquette for Business” to help you.

   APA format 7th edition, two pages. Need it by friday 12pm eastern time.

Real time operating systems Programming

There are many web pages, tutorials, and books that provide guidelines for installing
ROS. Here are two useful tutorials. 

https://docs.ros.org/en/foxy/Installation/Ubuntu-Install-Binary.html
Youtube series:
https://www.youtube.com/watch?v=bFDfvKctvV8&list=PLRE44FoOoKf7NzWwxt3W2taZ7Bi
WyfhCp     

https://cse.sc.edu/~jokane/agitr/

Assignment 300 words

 

Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Write the strengths and weaknesses of the Microsoft Windows firewall

Use your own words

Note your safe assign score. Score should be less than 25