I have already prepared the document all you have do is contents and check whether it is in IEEE format (one column) or not
Case Study: Read Raiding Customer Assets at MF Global and complete the questions at the end of the case study.
Please click on–> Raiding Customer Assets at MF Global and complete the questions at the end of the case study.
Code of ethics
Why is it important for Strategic Communication to have a code of ethics?
IG Wk8
2 full pages (550 words)
We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today. In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective. The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact.
With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation? Support with references and do your usual critical review of at least 2 other students’ posts.
Internet Privacy
In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.
Privacy is a concept that is rapidly evolving in relation to the most public of mediums, the Internet, which became even more super-charged with social networking websites. In a recent California election, one ballot measure, Proposition 8, asked voters a question on marriage. Donors to the Prop 8 campaign found that their names, addresses, and amount of contribution were masked up with Google Maps and thus rendered into a format showing the world a map image of donors’ names, street addresses, and dollar contributions. All this data is public record information already, but still quite inconvenient to access. What are the side effects of this action?
CSE about AI
Uplaod the answer as a pdf. The slides might help.
Part 1: State Spaces
1.1) [1pt] You will need to create a small problem to work from (i.e., find an initial state that is only a few moves away from a goal state).
Luckily, for the 8-puzzle this is straightforward. Start from the goal state and move tiles around several times to “mix up” the board
For example (See attached pictureRYM@…)
Now you give it a try. Start from the goal state and move the tiles 3 times to create an initial state.
1.2) [4pts] Now draw out the search space starting from the initial state you created in (1.1). Draw 4 levels of the tree (we need a limit since the tree would otherwise be infinite in size), meaning the root node (initial state) and 3 levels of successor states. When considering successor states, evaluate moves (and writing them left-to-right) in the following order:
- Move a tile up into the blank space
- Move a tile down into the blank space
- Move a tile left into the blank space
- Move a tile right into the blank space
Indicate in some way which nodes are goal states and which nodes have further successors (which you won’t explore because they are past 4 levels).
The idea here is to reproduce something like the trees demonstrated on the slides (e.g., slide 11 in Uninformed Search).
I highly recommend putting the first set of successors (2nd level of tree) on separate pages, so you have enough room to finish the tree!
Part 2: Uninformed Search
Now we move on to some actual algorithms.
2.1) [4pts] Using your initial state from Part 1, show how Breadth First Search (BFS) would explore states.
Show your work in detail, including the contents of the Open and Closed sets after each iteration.
Because the open set will grow quite large, you may abbreviate by leaving out parts of the open and closed sets which don’t change. However, make sure it is clear what is leaving the open set and what enters the open/closed sets (and where!).
Hint: As you work through the BFS operation, trace which states it explores on your tree from Part 1. Is it following the pattern you expect? If not, maybe you’ve made a mistake?
If you find yourself needing to do more than 10 iterations to find a goal state, then after the 10th iteration, you may simply report which state is visited, rather than the entire contents of the Open & Closed sets.
2.2) [0.5pts] If you had used Uniform Cost Search (UCS) instead of BFS above, how would your results change?
2.3) [4pts] Now repeat (2.1) but using Depth-Limited Search (DLS) with a depth limit of 4.
Remember that DLS needs to know the depth in the search tree of each state (number of actions to reach), so you will need to include that extra information in your open set. (The formatting is up to you, but you could use the UCS example on the slides for inspiration.)
Hint: When you generate successor (children) states, how do you know what their depth is? Can you calculate their depth if you know the predecessor (parent) depth?
2.4) [4pts] Again, repeat (2.1) using Iterative Deepening Search (IDS).
Keep in mind, IDS runs DLS multiple times with increasing depth limits, so this problem will be somewhat like repeating (2.3) multiple times. Make sure it is clear each time where the depth limit changes (and a new run of DLS starts).
Hint: You may be able to re-use (copy-paste) many pieces of your work from (2.3) to save time.
Part 3: Informed Search
3.1) [6pts] Finally, repeat (2.1) using A* search using the “misplaced tiles” heuristic (see slide 25).
Note, as with DLS, A* requires tracking extra information about a state in order to operate. At a minimum, you will need to track the total estimated path cost for each node ( f ). But I highly recommend tracking the path cost so far ( g ) as well, as it will make you’re job significantly easier.
Hint: The path cost so far ( g ) has a very strong relationship with the depth from DLS…
Journal entry
– Pick one of the following terms for your research: analyzability, core technology, interdependence, joint optimization, lean manufacturing, noncore technology, service technology, small-batch production, smart factories, or technical complexity.
– The paper should have a ‘Definition, Summary and Discussion’ headings ( Summary should have 150-200 words and discussion should have 300-350 words. )
– Attach minimum 2 references
– Absolutely no plagiarism, attach a plagiarism report with a 0% similarity index
Conducting an investigation on a network (cybersecurity)
- Explain the challenges the forensic investigator has when conducting an investigation on a network. What are the things they would need to do if they are not part of the organization versus being part of the organization?
SNAP stands for
1. SNAP stands for______________ .
2. The ability of FDDI and other high-availability fiber networks to wrap connections on either side of a break is due to the dual _______________ rings.
3. Which of the following is a cell-based protocol?
4. Given a small local area network of 10 systems, what is the best device, where best is best performance without additional unneeded functionality, to connect all 10 systems to each other. Assume that all of the systems need to transfer large files frequently between each other, but that there is no need for external access/communication outside of the LAN.
5. Given an analog signal with the highest frequencies at slightly below 5KHz, what would be the best sampling frequency, where best means the lowest sampling frequency that will still accurately allow the original signal to be regenerated.
6. The three key public network components are____________________,
Section 2 Please answer all question in detail and in your own words.
What is a collision on an Ethernet network? What happens in the case of a collision?
Describe 5 network topologies (briefly) and give an advantage and a disadvantage for each.
Describe what a VLAN is. How is this useful for a geographically dispersed company? What advantage to the end user does this provide?