Assignment

  

Chapter #5: 

1. What is an artificial neural network and for what types of problems can it be used? 

2. Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar? 

3. What are the most common ANN architectures? For what types of problems can they be used? 

4. ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode. 

5. Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding. 

6. Go to neuroshell.com. Look at Gee Whiz examples. Comment on the feasibility of achieving the results claimed by the developers of this neural network model. 

Chapter #6: 

1. What is deep learning? What can deep learning do that traditional machine-learning methods cannot? 

2. List and briefly explain different learning paradigms/ methods in AI. 

3. What is representation learning, and how does it relate to machine learning and deep learning? 

4. List and briefly describe the most commonly used ANN activation functions. 

5. What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN 

6. Cognitive computing has become a popular term to define and characterize the extent of the ability of machines/ computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real-world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report. 

threat-dis

 

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Develop a Computer/Internet Security Policy

 Research Paper: Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

Computer and email acceptable use policy

Internet acceptable use policy

Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

Your paper should meet the following requirements:

Be approximately four pages in length and four references.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

research paper – Info-tech import in strategy Planning

 

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

please answer this in word document.

no plagiarism .  please follow above instructions

Data Security Principles

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Post between 100-300. Use your own words. Do not copy the work of another students.

BI_Assignment_1

 

Complete the following assignment in one MS word document:

Chapter 1 –discussion question #1 & exercises 9 and 15 (limit to one page of analysis for question 15)

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

Discussion question #1:

Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources

Exercise 9:

Go to microstrategy.com Find information on the five styles of BI. Prepare a summary table for each style.

Exercise 15:

Visit the Million Song Dataset(http://millionsondataset.com/), search the collection, and download a few titles. How are the songs indexed, and how would you download the entire database?
 

Policy and legal_8

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Discussion And Reflections(Essary)- W8

Discussion 

How will VEEM impact payment systems and global commerce?

500 words

APA with proper citation

Introduction

Body

Conclusion

Due date – tomorrow Oct 12th, 2020. 

Reflection which is an essay with 5-page paper (APA style)

Submit a 5-page paper (APA style) and accompanying presentation with recorded audio (PowerPoint) that addresses how VEEM and Blockchain will transform global marketing.

Final Project is an essay assignment. 

Final Project is due by Tuesday before Oct 13th 2020 11:59 PM EST.

Reflection Two (R2) is an essay assignment. 

1- Introduction

2- All the body part with proper, I mean point wise

3- Conclusion 

4- References with proper citation. 

Read:

Watch: