Chryptography and business intelligence

question 1. compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organizations security posture. minimum 300 words and Must be APA format.

Q 2. Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.should be 250-300 words.must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q3. Survey the literature from the past six months to find one application each for DSS, BI, AND ANALYTICS. Summarize the applications on one page and submit it with the exact sources. Must be APA format.

Q4. Find information about IBM Watson’s activities in the healthcare field. write a report. Must be APA format and must one page.

Q5. Discuss the difficulties in measuring the intelligence of machines. Must be APA format and one page.

Q6. In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. 

Q7.5.Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.

Q8. Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recogni- tion product.

All must be APA format. from question 3 to 8 must be each one page.

Assignment and discussion

 

WEEK 4 – DISCUSSION

What do you believe to be the most compelling reason to migrate information to the cloud? What is your biggest security concern about doing so?

It should be in between 250-300 words

RESEARCH ASSIGNMENT – WK 4

Compare and contrast two difference cloud computing services (Amazon Web Service and Microsoft Azure). Explain the differences and the similarities and select your choice of providers if you had to make the decision for your business. Write up a comparison on the services offered (2 pages maximum). Once again, it is essential that you use your own words (do not just copy and paste from the Internet).

These two links may offer some additional information for this assignment but you are encouraged to use additional sources for your project/assignment.

https://aws.amazon.com/security/introduction-to-cloud-security/

https://azure.microsoft.com/en-us/

WEEK 4 ASSIGNMENT

  • 4.1 List ways in which secret keys can be distributed to two communicating parties.
  • 4.2 What is the difference between a session key and a master key?
  • 4.3 What is a key distribution center?
  • 4.4 What entities constitute a full-service Kerberos environment?
  • 4.5 In the context of Kerberos, what is a realm?
  • 4.6 What are the principal differences between version 4 and version 5 of Kerberos?
  • 4.7 What is a nonce?
  • 4.8 What are two different uses of public-key cryptography related to key distribution?
  • 4.9 What are the essential ingredients of a public-key directory?
  • 4.10 What is a public-key certificate?
  • 4.11 What are the requirements for the use of a public-key certificate scheme?
  • 4.12 What is the purpose of the X.509 standard?
  • 4.13 What is a chain of certificates?
  • 4.14 How is an X.509 certificate revoked?

Complete your answers on a WORD Document,

Assignment

Write a 3-page paper (1000 words): What are the intelligent agents of AI? Write the agents and environments of artificial intelligence What are the nature of the environments and structure of the agents.?
Provide examples and present your written findings. You must write a 3-page essay in APA format. You must include 3 scholarly reviewed references that are DIRECTLY related to the subject.

assignment 8

  

How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations? How does this impact data management within organizations? 

How does servant leadership assist with transferring knowledge in an organization? 

When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. 

Data mining

 Discuss the strengths and weaknesses of using K-Means clustering algorithm to cluster multi class data sets. How do you compare it with a hierarchical clustering technique. 

Practical Connection Assignment

Executive Program Practical Connection Assignment

This assignment is a written assignment where students will demonstrate how this course InfoTech Import in Strat Plan research has connected and put into practice within their own career. 

Assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course InfoTech Import in Strat Plan have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

Enterprise Risk Management

Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

Computer Geographics

1.     

In this chapter we have looked at the point location problem with pre- processing. We have not looked at the single shot problem, where the subdivision and the query point are given at the same time, and we have no special preprocessing to speed up the searches. In this exercise and some of the following ones, we have a look at such problems. 

Given a simple polygon P with n vertices and a query point q, here is an algorithm to determine whether q lies in P. Consider the ray ρ := {(qx +λ,qy) : λ > 0} (this is the horizontal ray starting in q and going rightwards). Determine for every edge e of P whether it intersects ρ. If the number of intersecting edges is odd, then q ∈ P, otherwise q à∈ P. 

Prove that this algorithm is correct, and explain how to deal with degen- erate cases. (One degenerate case is when ρ intersects an endpoint of an edge. Are there other special cases?) What is the running time of the algorithm? 

2. Suppose you are given an n-vertex simple polygon, P. Describe how to build an efficient data structure for determining in O(log n) time whether a query point, q, is inside of P or not. What is the space and preprocessing time for your data structure?

3. The ray shooting problem occurs in computer graphics (see Chapter 8). A 2-dimensional version can be given as follows: Store a set S of n non-crossing line segments such that one can quickly answer queries of the type: “Given a query ray ρ—a ray is a half-line starting at some point—find the first segment in S intersected by ρ.” (We leave it to you to define the behavior for degenerate cases.) In this exercise, we look at vertical ray shooting, where the query ray must be a vertical ray pointing upwards. Only the starting point need be specified in such a query. Give a data structure for the vertical ray shooting problem for a set S of n non-crossing line segments in general position. Bound the query time and storage requirement of your data structure. What is the preprocessing time?

Gun games: shell shockers 2.0

Welcome to Shell Shockers! In this game, you will become a soldier in the shape of an egg. Shoot ceaselessly, jump from one side to another, try to get through all obstacles and attack your opponents. How long do you think you can survive? 

  

News: Shell Shockers 2.0