Information System
Strategies to Implement
To facilitate cultural assimilation, IT and non-IT must become more integrated. What are some strategies to implement to allow this type of interaction to occur? 300 words.
Designers Work
Discuss: For your first post: Step One: Watch the Thomas Heatherwick TED Talk video, link. If you have any troubles opening the link, you can also find it at the address provided here:Thomas Heatherwick: Building the Seed Cathedral(Links to an external site. (Links to an external site.)Here, too, is also the website for the firm: http://www.heatherwick.com/Step Two: After watching the video: Post about one (1) of the following four prompts:Write one paragraph that describes the work of Heatherwick and his design firm that is featured in the video: where is his design firm located, where has the firm completed projects, what is unique about the work? ORWrite one paragraph provide a brief description of how Heatherwick and his team of designers work. What is unique about their approach to making? Hint: it relates to questions. ORWrite one paragraph describe one project featured in the video or website. In your description, include the MEDIA, three VISUAL ELEMENTS, and the dominant PRINCIPLE OF DESIGN. What is the purpose or function of the project? ORWrite one paragraph, summarize your thoughts and opinions about Heatherwicks work in general. What are your own questions you have about the projects you see in the video?
[SOLVED] Artificial Neural
Discussion and exercises:Chapter 5:· Discussion 1: What is an artificial neural network and for what types of problems can it be used?· Discussion 2: Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar?· Discussion 3: What are the most common ANN architectures? For what types of problems can they be used?· Discussion 4: ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.· Exercise 6: Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding.Chapter 6· Discussion 1: What is deep learning? What can deep learning do that traditional machine-learning methods cannot?· Discussion 2: List and briefly explain different learning paradigms/ methods in AI.· Discussion 3: What is representation learning, and how does it relate to machine learning and deep learning?· Discussion 4: List and briefly describe the most commonly used ANN activation functions.· Discussion 5: What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.· Exercise 4: Cognitive computing has become a popular term to define and characterize the extent of the ability of machines/computers to show intelligent behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real- world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.Your paper should meet these requirements:· Minimum 5 pages length, not including the required cover page and reference page. Also do not include questions, just number and the answer.· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations.
Metrics And Information Visualization
Respond to the following in a minimum of 175 words:The most frequently used measures of central tendency for quantitative data are the mean and the median. The following table shows civil service examination scores from 24 applicants to law enforcement jobs:83 74 85 7982 67 78 7018 93 64 2793 98 82 7868 82 83 9996 62 93 58Using Excel, find the mean, standard deviation, and 5-number summary of this sample.Construct and paste a box plot depicting the 5-number summary.Does the dataset have outliers? If so, which one(s)?Would you prefer to use the mean or the median of this datasets measure of central tendency? Why?
[SOLVED] Modern Multimedia
Explain the origin and evolution of modern multimedia.
Database Entities
Produce an ER Model for the following scenario (presented in Step 1 below) and business need, for the Pythagoras Math Academy.Deliverables:ER Model for the scenario presented.· You have the option to use MS Visio (if you have the software) to produce your ER Model.· Alternatively, if you do not have MS Visio, you can use the ERD PLUS (Open source ER Modeling Software) and produce your ER ModelLab Steps:Step 1: Read and understand the Scenario and Business needs presented below. Define and document the ENTITIES, and RELATIONSHIPS, required to address the business needs. The nouns in the scenario below will give the ENTITIES that you will need. Finally, the verbs will describe the RELATIONSHIPS.Scenario and Business Need:The Pythagoras Math Academy is in need to develop a database to keep track and control of his students, teachers, and classes offered.Teachers are able to teach multiple courses. But they are required to be certified on the course they are teaching. For example, only a group of teachers are certified to teach Algebra, and other Geometry.Students can take multiple courses. Courses are taught by teachers with the proper certification and have multiple certs as needed. Courses are taught in one of the classrooms at one of the Schools several sites.Each classroom is optimized to serve the needs for a course (for example some courses might require computer labs and whiteboards). The school needs to keep track of the math courses delivered in each of the sitesStep 2: For this project, you are required to use MS Visio or ERD PLUS to produce the deliverables.If you are using MS Visio follow the steps below:· Open MS Visio· Click on the Software Database Template in the main window· Select the Database Model Diagram Template to open a new file.If you are using ERD PLUS.· From the ERP PLUS main interface, select DOCUMENTS –> NEW DIAGRAM (NAME YOUR DIAGRAM) –>ER DIAGRAM –> CREATEStep 3: Define and Database ENTITIES· Add an entity for each Table you identified in the Scenario and Business Need.Step 4: ADD the required ENTITY ATTRIBUTES· Add the required Attributes for each Entity that you feel would help to define each Entity as needed.· Select one of the attributes to be PRIMARY KEY (PK)Step 5: Define RELATIONSHIP· Use the Crows Feet Notation.· Drag and drop (draw) relationships between the entities you defined.· Connect the ends to the two entities for each relation.· Defined the Primary Key for the parent entity.Step 6: Define CARDINALITY RELATIONSHIPSet the cardinality for each of your relationships defined in Step 5.For MS Visio: select a relationship line in the drawing area that is connecting two entities. In the Database Properties window, select the miscellaneous category. Select the cardinality for the selected relationship.
[SOLVED] Job Responsibilities
Apply Your Work Experiences to The Course Correlate your job responsibilities (system administrator) with the course outcomes listed belowCourse name: Current and emerging technologyJob Title: System AdministrationThe document should be in 500 word limit
Network Security Exploits
All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.Below is a list of common security exploits and attacks. Review the list1. Replay Attacks2. Insertion Attacks3. Fragmentation Attacks4. Buffer Overflow Attacks5. XSS Attacks6. Man-in-the-Middle Attacks7. Hijacking Attacks8. Spoofing Attacks9. Covert Channels10. DoS11. DDoS12. Botnet Attacks13. Social Engineering AttacksDecide which attack you consider to be the worse kind.· List the attack’s name you selected.· Explain your reasons for determining this to be the worst kind of attack.· Locate an incident in which the attack was used to exploit an organization.· List the URL and describe the attack.· Provide the outcome, was the attack successful or foiled.· What steps were taken (or should be taken) to circumvent this type of attack from happening again?
A picture is worth a Thpousand Words
A picture is worth a thousand words may be a lovely cliché, but its exactly the wrong way to view visualization. For this week’s discussion question, please view the Periodic Table of Visualization at the following link (http://www.visual-literacy.org/periodic_table/periodic_table.html). Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide a brief description of your choices and explain why you made your choices. Also, describe what advantage your choices have over the others.
[SOLVED] Technology Forensic Investigation
Conduct a modern digital technology forensic investigation to create a comprehensive digital forensic submission for use by law enforcement and legal professionals. Your objective is to provide the final product of the work you planned in the Week 7 Assignment.Conduct your investigation as follows:Retrieve from the Internet or create abridged evidence that can represent the investigation, removing personal identifiable informationOrganize the abridged evidence into appendices that can be used within the results of the investigationExtract meaning and a set of logical implications that can provide support to the organizations caseProvide sample data documenting the processes that would allow the evidence to be admissibleProvide a persuasive conclusion based on the evidenceCite scholarly sources to support the evidence, conclusions, and admissibilityLength: 13 pages (excluding title, reference, and appendices).Resources: Cite at least 15 recent scholarly peer-reviewed sources
Use Promo Code: FIRST15