RESUME

Instruction:: Create your resume in a style of your choice.  The resume should be written from the standpoint of your career objectives based on the major(cybersecurity) you selected at this University, and applying for your first job in your chosen career. need it within 6-7 hours. Thank you

Practical Connection Assignment

  

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Be sure to not self-plagiarize as this assignment is similar in multiple courses.

DQ

While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

CIS 415 Unit 1 BMW Case Study

Your paper will be at least 3 double-spaced, APA formatted pages not including title and reference pages.

Follow PDF and these are the question also i will send you a link to the book ch 1 

1. Other than selling more cars, what potential benefits do connected-car technologies offer auto makers such as BMW in terms of enhancing long-term customer relationships?

2. What responsibilities does BMW have to its customers regarding the data it captures via the various con- nected car technologies that it builds into its cars?

3. Visit a BMW showroom and spend time with one of the “product geniuses” to learn more about the latest BMW technological innovations. Write a brief para- graph or two providing your critique of these innovations.

ethical hacking

 

Sometimes you need to see how an application works and behaves on a booted suspect’s computer. For this project, write a short guideline of two to three pages on how to use VirtualBox to start and run applications from a suspect’s disk image. Your research should start with the VirtualBox user guide at www.virtualbox.org. For more information, search for terms such as “VirtualBox convert RAW image to VDI” or “convert raw to vmdk.”

 

Decrypt the following ciphertext that is encrypted using RSA

Decrypt the following ciphertext that is encrypted using RSA:

5433065902986267632605533071412313607849042001231487725752160944543337634764776942780551811154931702225666567112761402854245945771790200374756020087742730448029511549378258035341909089954945069377423917666095579241594583655805469852654975413725915810650231239021446353034249591165382217733674640

RSA public key (N, e):

N =

9443933355875323479428701223436866003317020345062337184168866482442741746051755875714077225424938697068202237079691276886895796347334130227954217861122456746475811995655599937678751969288324093545863325957721247606698180886906068377558846502707583137394885329858060292972366775543495590847656457

e = 65537

Hint.

• A modulus N of the standard RSA consists of only the two large prime p and q.

• But the modulus N in this assignment consists of many primes, which may weaken the security of RSA (so making this assignment practicable).

• Students can use the following website for integer factorization: https://www.alpertron.com.ar/ECM.HTM

• Refer to the provided example code (example.py).

DONT BID ON THIS QUESTION IF YOU ARE NOT A PYTHON EXPERT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

 DONT BID ON THIS QUESTION IF YOU ARE NOT A PYTHON EXPERT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

DONT BID ON THIS QUESTION IF YOU ARE NOT A PYTHON EXPERT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

DONT BID ON THIS QUESTION IF YOU ARE NOT A PYTHON EXPERT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

DONT BID ON THIS QUESTION IF YOU ARE NOT A PYTHON EXPERT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

DONT BID ON THIS QUESTION IF YOU ARE NOT A PYTHON EXPERT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

 

In this assignment, you will gain experience working with OpenAI Gym, which is a set of problems that can be explored with different reinforcement learning algorithms. This assignment is designed to help you apply the concepts you have been learning about Q-learning algorithms to the “cartpole” problem, a common reinforcement learning problem.

Note: The original code referenced in this assignment was written in Python 2.x. You have been given a zipped folder containing an updated Python 3 version of the code that will work in the Apporto environment. To make this code work, some lines have been commented out. Please leave these as comments.

Reference: Surma, G. (2018). Cartpole. Github repository. Retrieved from https://github.com/gsurma/cartpole.

Prompt

Access the Virtual Lab (Apporto) by using the link in the Virtual Lab Access module. It is recommended that you use the Chrome browser to access the Virtual Lab. If prompted to allow the Virtual Lab access to your clipboard, click “Yes”, as this will allow you to copy text from your desktop into applications in the Virtual Lab environment.

  1. Review the following reading: Cartpole: Introduction to Reinforcement Learning. In order to run the code, upload the Cartpole.zip folder into the Virtual Lab (Apporto). Unzip the folder, then upload the unzipped folder into your Documents folder in Apporto. Refer to the Jupyter Notebook in Apporto (Virtual Lab) Tutorial to help with these tasks.

    Note: The Cartpole folder contains the Cartpole.ipynb file (Jupyter Notebook) and a scores folder containing score_logger.py (Python file). It is very important to keep the score_logger.py file in the scores folder (directory).

  2. Open Jupyter Notebook and open up the Cartpole.ipynb and score_logger.py files. Be sure to review the code in both of these files. Rename the Cartpole.ipynb file using the following naming convention:

    __Assignment5.ipynb

    Thus, if your name is Jane Doe, please name the submission file “Doe_Jane_Assignment5.ipynb”.

  3. Next, run the code in Cartpole.ipynb. The code will take several minutes to run and you should see a stream of output while the file runs. When you see the following output, the program is complete:

    Solved in _ runs, _ total runs.

    Note: If you receive the error “NameError: name ‘exit’ is not defined” after the above line, you can ignore it.

  4. Modify the values for the exploration factor, discount factor, and learning rates in the code to understand how those values affect the performance of the algorithm. Be sure to place each experiment in a different code block so that your instructor can view all of your changes.

    Note: Discount factor = GAMMA, learning rate = LEARNING_RATE, exploration factor = combination of EXPLORATION_MAX, EXPLORATION_MIN, and EXPLORATION_DECAY.

  5. Create a Markdown cell in your Jupyter Notebook after the code and its outputs. In this cell, you will be asked to analyze the code and relate it to the concepts from your readings. You are expected to include resources to support your answers, and must include citations for those resources.

    Specifically, you must address the following rubric criteria:

    • Explain how reinforcement learning concepts apply to the cartpole problem.
      • What is the goal of the agent in this case?
      • What are the various state values?
      • What are the possible actions that can be performed?
      • What reinforcement algorithm is used for this problem?
    • Analyze how experience replay is applied to the cartpole problem.
      • How does experience replay work in this algorithm?
      • What is the effect of introducing a discount factor for calculating the future rewards?
    • Analyze how neural networks are used in deep Q-learning.
      • Explain the neural network architecture that is used in the cartpole problem.
      • How does the neural network make the Q-learning algorithm more efficient?
      • What difference do you see in the algorithm performance when you increase or decrease the learning rate?

Guidelines for Submission

Please submit your completed IPYNB file. Make sure that your file is named as specified above, and that you have addressed all rubric criteria in your response. Sources should be cited in APA style.