Artificial Intelligence

Part a) 

1)      Discuss the difficulties in measuring the intelligence of machines.

Required: 200+ words

2)       Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recognition product. 

Required: 200+ words

Part b) 

1)      Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

Required: 150+ words

Checklist:

Part ‘A’ and Part ‘B’ answers should to be attached as two separate documents. 

Both part ‘A’ and ‘B’ must adhere to APA formatting guidelines

At least two references for each part

Plagiarism report for both.

Data Mining

Write one page on how data mining helps to gain competitive advantage for businesses. Include at least 2 references and in-text citation.

MySQL

Complete exercizes in all of these sections (https://www.w3resource.com/sql-exercises/sql-retrieve-from-table.php):  

 Retrieve data from tables 

Boolean and Relational Operators 

Wildcard and Special operators 

Aggregate Functions 

Formatting query output 

Query on Multiple Tables 

SQL JOINS 

SUBQUERIES 

FILTERING and SORTING on HR Database 

SUBQUERIES on HR Database J

OINS on HR Database 

SQL UNION  

Submit screenshots with YOUR (not copy/paste from solutuions) answers.

Week 5 Discussion – ITM capstone

 How would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI?

Reply should be in 350 words.  Indicate at least one source or reference in APA format. You can use textbook or current research articles 

Information Technology

https://www.cnet.com/news/lenovo-laptop-deals-get-a-thinkpad-t14-for-900-x1-yoga-for-1266-and-more/

 

Explore CNET

https://www.cnet.com/

Right click the link above and open it in a new tab or window. You may also right click and copy the hyperlink and paste it into the address like of Chrome or Firefox.

CNET is a great website for technology news and review. Their About Us page states, “CNET tells you what’s new in tech, culture and science, why it matters, how it works and what you need. Our global team works 24/7 to explore and explain the changing world around us. You can depend on CNET for news, commentary, analysis, features, FAQs, advice, hands-on reviews, buying guides, amazing photography and fun and informative videos.”

We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly.

Post this summary to the Hardware Assignment discussion board. Read at least one other student’s summary on hardware and provide a peer review. A peer review is an evaluation of another student’s academic work. This could include but is not limited to taking a stand on the topic and providing evidence for/against it; providing additional information on the other student’s topic; posing questions about the topic and possible answers; demonstrating your understanding or application of the topic with examples. You may need to cite a source in your reply. Remember that if the information does not come out of your own head, you need to cite it

Research Paper – Database Security Absolute Essential ask

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Professor has zero tolerance for plagiarism. Please ensure originality of the work.

Your paper should meet the following requirements:

  • Be approximately 4 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Wireless Networking

 

Draft a response to each of the questions below. After you have  posted your own response, make sure you go back through the discussion  and read the responses of your peers. Make sure you respond to at least  two of your peers’ posts and take the opportunity to ask questions and  share ideas. Your responses should again be detailed, thoughtful &  substantial. Use your textbook and other academic resources to justify  your responses.

  1. When did Wi-Fi become an official standard?  Who is the governing body?
  2. What are some of the different Wi-Fi standards?  How are they similar?  How are they different?
  3. How do we keep Wi-Fi, or wireless networks, secure?
  4. What are some different companies that offer wireless networking equipment?  Compare and contrast some of their equipment.  

Week 5 – Research Paper – Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

EH Week15 DB

 

Hello,

i need this paper by 12/16 afternoon.

Strictly No plagiarism please use your own words.

300 words

Do you feel the benefits of cloud computing are worth the threats and vulnerabilities? Have we arrived at a point where we can trust external agencies to secure  our most precious data? Please explain your answer.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

InfoTech in a Global Economy 2.1

 Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. You should use the UC library ( https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles ( https://scholar.google.com/ )Once you find the article, you will read it and write a review of it.  This is considered a research article review.Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.