PLE week3 p3

 

Hello,

i need this paper by 1/27 afternoon.

Strictly No plagiarism please use your own words.

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

reference link:  https://hackablepodcast.com/episodes/locked-out

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Hillclimbing and simulated anealing algorithms

write a hillclimbing algorithm to find maximum value of function f=|13.value(v)-170| where v is the input binary variable of 40bits and one counts the number of 1’s in v. set Max at 100 and thus reset algorithm 100 times for the global maximum and print the found maximum value for each reset separated by a comma in the output.txt file.

Note:For this the output should be local maxima,global maxima and so on… example:350,170,350,170,350,170

write a Simulated Anealing algorithm to find maximum value of function f=|14.value(v)-190| where v is the input binary variable of 50bits and one counts the number of 1’s in v. set Max at 200 and thus reset algorithm 100 times for the global maximum and print the found maximum value for each reset separated by a comma in the output.txt file.

Describe how to run the code. Write the code in Python.

organ leader and decision making

 

Required Reading:

Read Se Yeon Choi, Goo Hyeok Chung, & Jin Nam Choi. (2019). Why are we having this innovation? Employee attributions of innovation and implementation behavior. Social Behavior & Personality: An International Journal, 47(7), 1–13. https://doi.org/10.2224/sbp.8124

http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=pbh&AN=137631636&site=eds-live&custid=s8501869&groupid=main&profile=eds_new

Assignment

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies. Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

Provide a high-level overview/ summary of the case study

Note how constructive intentionality impacts innovation implementations

Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations. Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

This assignment is due by 11:59pm EST on October 4, 2020.

Preview the document

read the articles and answer the following question.

1. Read the attached article “Why the Future Doesn’t Need Us”Preview the document by Bill Joy. Appeared in Wired, issue 8.04, April 2000;
2. Read a summary of Professor Peter Singer’s lecture on ethics and technology; (Links to an external site.)

3. Read Tech Ethics Issues We Should All Be Thinking About In 2019 (Links to an external site.).

4. Write a paper containing answer to the following questions. Your paper should present your understanding of ethical dimensions and unintended consequences of technology.

  • What do you strongly agree with in the articles? and Why? (20 points)
  • What do you disagree with in the articles? and Why? (20 points)
  • What kind of person Bill Joy seems to you, an idiot, a Luddite, or a genius? and Why? (5 points)
  • Are the assumptions in both the articles sound? (5 points)

Requirements:

Please make your analytic points specific; The paper cannot be just a collection of generalities and cannot contain too many direct quotes from the articles. Find something interesting to say. Reference any ideas that are not your own in APA format.

The paper should be at least 1 page but no more than 2 pages long, single line spacing, use a font size of minimum 10 points but no larger than 12 point. Set margins to 1 inch on all sides. Use correct grammar.

Save your paper in a Word document and name it as P4_FL.docx where FL are your first and last name initials. Use the link Assignments -> Project 4 to submit your document.

Articlee writing

Write a 3-page paper (1000 words):  defining “what is artificial intelligence?” What is the history behind it and how can it benefit our society in the future? Provide examples and present your written findings. You must write a 3-page essay in APA format. You must include 3 scholarly reviewed references that are DIRECTLY related to the subject.

EH Week7 DB

 

Hello,

i need this paper by 10/07 afternoon.

Strictly No plagiarism please use your own words.

Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts (example:  Softerra LDAP Browser is the industry-leading software for browsing and analyzing LDAP directories. It provides a wide variety of features for handy viewing of directory contents, getting information about directory infrastructure and objects.)

400 words  

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Firewalls and Host and Intrusion Prevention Systems

 

  • Based on this week’s course objectives of securing resources in a network and describing Firewalls and Host and Intrusion Prevention Systems, discuss if both of these items are necessary for the network. Security networking devices have many advantages in the business environment. Moreover, what are some of these advantages, and from an Information Security perspective, what are some of the standard practices in securing these networks? Describe the significant reasons to secure the Network and protect access to the Web. Feel free to research the internet and provide resource links and APA cited references to support your comments.

Introduction to machine language and digital logic

 

Task 4: Download the file masm_2018.zip (see below). Create a folder called masm, as described in the Lecture Notes “Writing the First Program”. The software you need to assemble and link your assembly language programs are in the file masm_2018.zip.

Copy masm_2018.zip and paste it into your folder “masm”, that you just created on your computer and then unzip masm_2018.zip into the “masm” folder,  or a folder of your choosing. These files are necessary for assembling and linking your first programs. Everything is explained in HANDOUT 4 WEEK 4 First Programs.
Programming Assignments
Assignment #1 – Write an assembly language program that will accept a single character from the keyboard, and then output the next character in the ASCII sequence. For example, if the character ‘A’ is entered, the character ‘B’ will be typed out.
Assignment #2 – Write an assembly language program that will print out the message of your choosing!
Assignment #3 – Examine Assignment #1 above using DumpRegs; Find registers AX, BX, CX, DX. Find the hex value in AL after returning from the ReadChar input routine?
Videos: If you need help with Assignments 1,2,3 then watch this video:  Getting Started Assignments 1,2,3