AI bots ingesting information and creating content

There has been an increase in AI and bots that are ingesting information and creating their own content. Click the links below and read the content. Then, express your thoughts about this concept. Do you think AI can really take in existing information and create something original? Should the original sources be credited since it is technology driven, or is it similar to a person learning about a topic and creating their own work? How do you think this can evolve in the future? 

 

https://twitter.com/KeatonPatti/status/1072877290902745089

https://twitter.com/KeatonPatti/status/1050396467674968064

Discussion: Protecting Executables

In addition to applying access controls to end users and objects, you can apply them to applications as well. This takes two forms—internal to the application and through the operating system.

You can assign an application its own user ID and directories. From there, you can grant the application rights only to the files and directories it needs to run and explicitly deny access to the rest of the system. This gives the application a sandbox to work in.

Answer the following question(s):

If you apply access controls to the network (firewalls and intrusion prevention systems) and end users, why would you need to apply access controls to applications?

Fully address the questions in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students’ views.

Initial post should be at least 350 words in length. Each reply post should be at least 150 words in length.

HCI P

https://hci.stanford.edu/courses/cs147/2009/assignments/storyboard_notes.pdf

https://kathybateman.files.wordpress.com/2013/08/mary-jos-story.jpeg

Exp22_Excel_Ch01_CumulativeAssessment

 Exp22_Excel_Ch01_CumulativeAssessment

  

Project Description:

You manage a company that provides corporate training workshops. Your two types of clients are business people and college professors. You want to complete a spreadsheet that calculates gross revenue for upcoming training workshops. Finally, you will improve the appearance of the worksheet by applying font, alignment, and number formats.

     

Start Excel. Download and open   the file named Exp22_Excel_Ch01_CumulativeAssessment_Training.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

Your organization provides a   discount to educators. However, the worksheet contains wording that needs to   be changed to Education.
 

  Use Find and Replace to find Teacher and replace it with Education.

 

The worksheet contains spelling   errors that need to be corrected.
 

  Check the spelling of the worksheet and correct the errors.

 

You canceled the Charting Basics   workshop because only one person registered for it.
 

  Delete the row containing the Charting   Basics workshop.

 

The Excel Analytics &   Forecasting training course filled, and you opened another course.
 

  Insert a new row between the Big Data   Foundations and Data Mining   rows. Copy row 5 and paste it on the empty row. Change the dates to June 7, 2024 in the range C7:D7. Enter 11 in cell G7 and 10 in cell H7.

 

 

Assigning a code to each   workshop provides a reference number. You will use 06 to indicate the sixth   month (June) and 001 for the first workshop.
 

  Type 06-001 in cell A5. Use AutoFill to   complete the range A6:A10.

 

Instead of displaying dates such   as 6/3/24, you want to display dates as 6/3/2024.
 

  Format the dates in the range C5:D10 with Short Date format (or *3/14/2012   from the Type list).
 

Note, Mac users, select 3/14/2012   as the format.

 

The worksheet contains columns   for the start and end dates. It would be helpful to insert a column to   display the number of days for each workshop.
 

  Insert a column to the right of the End Date column. Type # of Days in cell E4.

 

 

Row 3 contains # of Attendees and Gross Revenue main headings. Centering   these headings over their respective subheadings will help clarify the   details.
 

  Merge and center the cells H3 and I3. Merge and center the range J3:L3.
 

 

Applying a cell style will   improve the appearance of the headings on row 4. In addition, wrapping and   centering the text in the heading cells will further improve the appearance   of the worksheet.
 

  For the range A4:L4, apply the Good cell style, wrap text, and center   horizontally.

 

 

You are ready to calculate the number of days for the workshops.
 

  In cell E5, enter a formula to calculate the number of days for the first   workshop. Add 1 to the results to include the total number of days, including the start   and end dates. The results may display in date format. Copy the formula to   the range E6:E10.

 

 

The number of days results show   dates rather than values. Applying the Number format will solve this issue.
 

  Apply Number format with zero decimal places and center the results   horizontally in the range E5:E10.

 

 

The gross revenue is calculated   by type of customer. Column J is designed to display the gross revenue for   corporate customers.
 

  In cell J5, enter a formula to calculate the gross corporate revenue for the   first workshop by multiplying the cost per attendee by the number of   corporate attendees. Copy the formula to the range J6:J10.

 

Column K is designed to display   the gross revenue for education customers.
 

  In cell K5, enter a formula to calculate the gross education revenue by   subtracting the education discount rate from 1, multiplying the result by the cost per attendee   and multiplying by the number of education attendees. Copy the formula to the   range K6:K10.

 

 

Now that you calculated the   gross revenue for corporate and education customers, you can calculate the   total gross revenue for each workshop.
 

  In cell L5, enter a formula to calculate the total gross revenue by adding   the Corporate Gross Revenue and the Education Gross Revenue. Copy the formula   to the range L6:L10.

 

 

The discount rates look better when displayed with percent symbols   and centered because the rates are all two digits.
 

  Format the range G5:G10 as Percent Style and center the data horizontally.

 

 

The monetary values in the Cost   per Attendee, Corporate, Education, and Gross Revenue columns would look   better with dollar signs and commas.
 

  Format the ranges F5:F10, J5:L10 with Accounting Number Format with zero   decimal places.

 

 

Change the width of columns G,   H, and I to 9. Change the width of columns J, K, and L to 11.

 

 

To further improve how the   number of attendees values display below their headings, you can change the   alignment and indent the data.
 

  Right-align data in the range H5:I10 and increase the indent two times.

 

Borders around the # of   Attendees and Gross Revenue sections would help distinguish data and improve   readability.
 

  Apply Outside Borders to the range H4:I10. Apply Outside Borders to the range   J4:L10.

 

 

You want to prepare the   worksheet so that your manager can print it. Because the worksheet data   consumes several columns but only a few rows, it would look better in   landscape orientation.
 

  Select Landscape orientation.

 

 

A larger top margin but smaller left and right margins will help   balance the worksheet data on a printout. Centering the data between the left   and right margins further balances workshop revenue data on the page.
 

  Set a 1.5-inch top margin, 0.5-inch left and right margins, and center the   worksheet horizontally on the page.

 

 

Even with the smaller left and   right margins, the data does not fit on one page. Therefore, you should   reduce the scaling so that it fits.
 

  Change the scaling to 90%.
 

 

Insert a footer with the text Exploring   Series on the   left side, the sheet name code in the center, and the file name code on the   right side of the Sheet1 worksheet.

 

The worksheet is named Sheet1,   which is not meaningful. You want to add a meaningful sheet name so that it   will display in the footer. In addition, the Sheet2 worksheet is empty and   should be deleted.
 

  Rename Sheet1 as June and then delete Sheet2.

 

Save and close Exp22_Excel_Ch01_CumulativeAssessment_Training.xlsx.   Exit Excel. Submit the file as directed.

Risks associated with web servers Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

The Apache web server is an open source web server that was created in 1995. With very little configuration Apache is able to handle large amounts of traffic and because of open source there are developers continuously working on updates and better functionality. Apache can also be used on multi-platforms. Apache is able to accept and route traffic to certain ports. By default it will run on port 80, but with specific address-port combinations it is able to route ports. Ways to make Apache more secure are through some of the following ways. Disabling the trace HTTP request. By default this is enabled and allow cross-site tracing that could potentially expose your cookie information. Disabling the directory listing will prevent access to the files and sub-directories within the browser. Tools that can be used to secure your Apache server are mod security that is an open source web application first this will provide you with several features designed to protect the server.  

The Microsoft Internet Information Server (IIS) has been in service since Windows Server 2003 and only operates on the Windows operating system. Like Apache you are able to route traffic to other ports. IIS benefits from being popular due to its platform that supports all the Microsoft applications. Some of the features of IIS are Remote management that allows the management of the program via command line interface or union PowerShell. IIS also comes with security features that allows users to manage TLS certificates and allows the user to filter requests that will allow for the traffic of whitelists and blacklists. These are tools that will assist in securing IIS. Disable the OPTIONS Method. The OPTIONS method gives a list of the methods supported by a web server and disabling this ensures that potential attackers won’t be able to access the information. Enable Dynamic IP address restrictions will block access to IP address that go over a certain amount of requests. This can prevent denial of service attacks. 

Reference 

(February 20, 2020). Ultimate guide IIS server: What is IIS? IIS tutorial. DNS stuff. Retrieved from https://www.dnsstuff.com/windows-iis-server-tools

Acunetix (November 5, 2014). Microsoft IIS – 8 Tips for security best practices. Acunetix. Retrieved from https://www.acunetix.com/blog/articles/iis-security-best-practices/

Hernandez, J. (May 8, 2019). What is Apache? In-depth overview of Apache Web Server. Sumo Logic. Retrieved from https://www.sumologic.com/blog/apache-web-server-introduction/

Kumar, C. (June 6, 2019). Apache web server hardening and security guide. Geekflare. Retrieved from https://geekflare.com/apache-web-server-hardening-security/

– VINCENT

RESPONSE 2:

Security on an Apache webserver is only as good based on its configurations.  Along with proper security configuration, it’s important to keep Apache updated with the latest security patches as they become available.  The following are some configuration changes in securing an Apache server:

Securing an Apache webserver should be configured to use only what is required for functionality. Configure on the module required to run functionality and restrict other unnecessary services.  

Run as an unprivileged user:  this refers to locking down the Apache server with minimal permission than necessary.  This would require to set the server as an unprivileged systems user versus root or admin user.

Disabling server-info directive, server signature and server-status Directive to prevent the exposure of server information, such as version, paths, data directories, server performance, HTTP requests and client IPs. 

Setting the ServerToken directive to Prod will direct Apache to a specified name, like Apache in the server response header. This prevent the server from sending server information out when responding to a request.

OpenSSL is one tool I ran into when researching Apache security.  Because Apache does not come with encryption, running OpenSSL with it can provide traffic encryption and public/private key pairs to force all traffic over SSL protocol.

A Microsoft IIS server has similar security configuration recommendations as the Apache.  These include:

Installing and properly configuring only the necessary modules required for functionality and implementing the least privileged rule. As well as enabling Window authentication with extended protection to protect against credential relaying and phishing attacks.

Maintaining an up-to-date anti-virus and security patches.  Also enabling SSL and SSL certificates.     

Web application isolation includes isolating web application pools, ASP.Net temp folders and content and ensure access controls list are configured to allow access as per set permissions.

Claudia 

Acunetix. (2021, March 12). 10 tips for apache security. Retrieved August 03, 2021, from https://www.acunetix.com/blog/articles/10-tips-secure-apache-installation/

The most important steps to take to make an Apache server more secure. (n.d.). Retrieved August 03, 2021, from https://help.dreamhost.com/hc/en-us/articles/226327268-The-most-important-steps-to-take-to-make-an-Apache-server-more-secure

Archiveddocs. (n.d.). Security best practices for iis 8. Retrieved August 03, 2021, from https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj635855(v=ws.11)

– CLAUDIA

In 2021

In 2021, the tuition for a full time student is $6,549 per semester, the tuition for a part time student is

$3,325. The tuition will be going up for the next 7 years at a rate of 3.5% per year. Write a program using if-else and a loop. Ask the user if they are a full time or part time student, then display the projected semester tuition for the next 7 years. You should display the actual year (2021, 2022, through 2027) and the tuition amount per semester for that year using python

Dissertation PhD Begininng to Ending

Hello ,

I Need to select a topic for Start the Dessertation on it and get Approval from IRB. I am studying in Cumberlands university.

I need topic Related to IT infrastructure. I Like related to Devops skills like Ansible,Puppet,Chef, Cloud like AWS related topic. please suggest and if you can  work on that recommended topic . we can work together

Vulnerability Memo

 Your task this week is to check the internet and the Common Vulnerabilities and Exposures (CVE) List for networked IoT or IoMT devices with publicly known problems identified in the past six months.  

Select two devices related that might be relevant to the organization setting and review what is known about the vulnerabilities of these devices.

For each device, include background information about the device, a description of the vulnerability, possible solutions that have been identified to fix the vulnerability, and your recommendation on whether the organization should avoid the product.

Use this Memo Template to record your work.

How Will My Work Be Evaluated?

In writing a clear and concise memo to inform management about potential vulnerabilities, you are demonstrating communication skills, technical expertise, and responsiveness to stakeholder needs and concerns.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.2.1: Identify the target audience, the context, and the goal of the communication.
  • 1.3.4: Balance original content with supporting sources.
  • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.3: Define the specifications of required technologies.
  • 12.1.1: Determine business needs that require policies, processes, and procedures.
  • 12.3.1: Select controls.
  • 12.3.2: Describe the implementation of controls.

Answer attached

Returns True after converting the image to monochrome.

All plug-in functions must return True or False. This function returns True

because it modifies the image. It converts the image to either greyscale or

sepia tone, depending on the parameter sepia.

If sepia is False, then this function uses greyscale. For each pixel, it computes

the overall brightness, defined as

0.3 * red + 0.6 * green + 0.1 * blue.

It then sets all three color components of the pixel to that value. The alpha value

should remain untouched.

If sepia is True, it makes the same computations as before but sets green to

0.6 * brightness and blue to 0.4 * brightness.

Parameter image: The image buffer

Precondition: image is a 2d table of RGB objects

Parameter sepia: Whether to use sepia tone instead of greyscale

Precondition: sepia is a bool

“””

# We recommend enforcing the precondition for sepia

# Change this to return True when the function is implemented

height = len(image)

width = len(image[0])

for row in range(height):

for col in range(width):

pixel = image[row][col]

pixel.red = int(0 * 0.3)

pixel.green = int(1*0.6)

pixel.red = int(2*0.1)

pixel.red+pixel.green+pixel.blue