kywk11its531wk10as

1. Based upon the current state of the art of robotics applications, which industries are most likely to embrace robotics? Why?

2. Watch the following two videos: https://www. youtube.com/watch?v=GHc63Xgc0-8 and https:// www.youtube.com/watch?v=ggN8wCWSIx4 for a different view on impact of AI on future jobs. What are your takeaways from these videos? What is the more likely scenario in your view? How can you prepare for the day when humans indeed may not need to apply for many jobs?

3. Identify applications other than those discussed in this chapter where Pepper is being used for commercial and personal purposes.

4.Conduct research to identify the most recent developments in self-driving cars

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Mid term

  

Midterm Test

The midterm test is over chapters 1-5. Please use this template and answer the questions on this form. Place your name at the top of this page prior to submitting (or add a cover page to this paper),

1. For each of the datasets note if data privacy is an important issue

a. Census data collected from 1900- 1950

b. IP addresses and visit times of web users who visit your website.

c. Images from Earth orbiting satellites

d. Names and addresses of people from the telephone book

e. Names and email addresses collected from the web.

2. Classify the following attributes as binary, discrete, or continuous. Also classify them as qualitative (nominal or ordinal) or quantitative (interval or ratio). Some cases may have more than one interpretation, so briefly indicate your reasoning if you think there may be some ambiguity. 

Example: Age in years. Answer: Discrete, quantitative, ratio 

(a) Time in terms of AM or PM. 

(b) Brightness as measured by a light meter. 

(c) Brightness as measured by people’s judgments.

(d) Angles as measured in degrees between 0◦ and 360◦. 

(e) Bronze, Silver, and Gold medals as awarded at the Olympics. 

(f) Height above sea level. 

(g) Number of patients in a hospital. 

(h) ISBN numbers for books. (Look up the format on the Web.) 

(i) Ability to pass light in terms of the following values: opaque, translucent, transparent. 

(j) Military rank. 

(k) Distance from the center of campus. 

(l) Density of a substance in grams per cubic centimeter. 

(m) Coat check number. (When you attend an event, you can often give your coat to someone who, in turn, gives you a number that you can use to claim your coat when you leave.) 

3. Which of the following quantities is likely to show more temporal autocorrelation: daily rainfall or daily temperature? Why? 

4. Distinguish between noise and outliers. Be sure to consider the following questions. 

a. Is noise ever interesting or desirable? Outliers? 

b. Can noise objects be outliers? 

c. Are noise objects always outliers? 

d. Are outliers always noise objects? 

e. Can noise make a typical value into an unusual one, or vice versa? 

5. Discuss the advantages and disadvantages of using sampling to reduce the number of data objects that need to be displayed. Would simple random sampling (without replacement) be a good approach to sampling? Why or why not? 

6. How might you address the problem that a histogram depends on the number and location of the bins?

7. Show that the entropy of a node never increases after splitting it into smaller successor nodes.

8. Compute a two-level decision tree using the greedy approach described in this chapter. Use the classification error rate as the criterion for splitting. What is the overall error rate of the induced tree?

9. Consider a binary classification problem with the following set of attributes and attribute values: 

• Air Conditioner = {Working, Broken} 

• Engine = {Good, Bad} 

• Mileage = {High, Medium, Low} 

• Rust = {Yes, No} 

Suppose a rule-based classifier produces the following rule set:

Mileage = High −→ Value = Low 

Mileage = Low −→ Value = High 

Air Conditioner = Working, Engine = Good −→ Value = High 

Air Conditioner = Working, Engine = Bad −→ Value = Low 

Air Conditioner = Broken −→ Value = Low (

a) Are the rules mutually exclusive? Answer: No

b) Is the rule set exhaustive? Answer: Yes

c) Is ordering needed for this set of rules? Answer: Yes because a test instance may trigger more than one rule. 

d) Do you need a default class for the rule set? Answer: No because every instance is guaranteed to trigger at least one rule. 46 Chapter 5 Classification: Alternative Technique

10. Consider the one-dimensional data set shown below: 

  

X

.5

3.0

4.5

4.6

4.9

5.2

5.3

5.5

7.0

9.5

 

Y

+

+

+

+

(a) Classify the data point x = 5.0 according to its 1-, 3-, 5-, and 9-nearest neighbors (using majority vote). 

(b) Repeat the previous analysis using the distance-weighted voting approach.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Homework 4 (Individual Work) HIM 6122C: System Analysis and Design

 

Answer the following questions using Microsoft Visio or a suitable software. I use Lucid Charts

  1. Draw a neat diagram (for each model) indicating how the following software development models could be used in developing a decision support system for a clinic.

      a) Waterfall model

      b) Extreme Programming

      c) Rapid prototyping

      d) Iterative and Incremental model (general)

  1. Explain along with a diagram on how Scrum can be used in the synthesis of a medical billing system. Your answer must have at least 250 words and a neat diagram describing the use of scrum for the scenario mentioned. The answer must also identify individual sprints for the overall process.
  2. Explain the use of scenario-based testing for the above scenario. Your answer must provide the scenario and the testing strategy.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment part 3

 

Project Part 3: System Hardening and Auditing

Scenario

Fullsoft’s chief technology officer (CTO) established a plan to mitigate risks, threats, and vulnerabilities. As part of the mitigation plan, you and your team members will configure baseline security controls on all workstations (harden the systems), which run either Windows 7 or Windows 10. For this effort, you will ensure that the antivirus software is running properly and implement a control related to password-hacking attempts.In addition, Fullsoft’s CTO has asked your team to pay special consideration to continuously monitoring, testing, and improving countermeasures. The CTO points out that within the first 24 hours of configuring baseline security, you may sometimes receive alerts that malware has been quarantined within an antivirus program or notice a failed logon attempt captured by the Windows audit log. In response, you make a note to check the security of the workstation for which you will configure baseline security.The CTO also requests a report on the work you performed, part of which will be incorporated into the company’s IT security policy procedures. The report should also include the purposes of system hardening and auditing, and an additional area of concern or emerging trend related to information systems security that’s relevant to Fullsoft.At the end of the report, include a brief statement that explains how your work on this project relates to the larger responsibility you have for supporting the company’s success regarding IT security. Your statement will be considered a part of your upcoming performance review.

Tasks

If possible, complete the hardening and auditing tasks using a personal computer with the default installation of Windows 7 or Windows 10. If you do not own the necessary hardware and software, consult with your instructor about alternatives. After your work on this project is complete, you may need to return the settings to the previous configuration.

  1. Ensure that you are logged in as an administrator. Using a computer that has Windows 7 or Windows 10 installed:
    1. Review the antivirus program. Ensure that it is up to date, is configured for automatic updates, and is scheduled to run quick scans regularly. Note when the last full system scan was run and any issues you observe with the software.
    2. Configure audit logging to identify all failed password attempts into the system.
  2. After at least 24 hours, check the Windows workstation for security events. Be sure to review the audit log in Windows Event Viewer.
  3. Write a report in which you:
    • Explain how you ensured the antivirus program is up to date, scheduled to run regular quick scans, and when the last full system scan was run. Describe anything significant you observed.
    • Explain how you configured audit logging to record all failed password attempts into the system.
    • Describe all the potentially problematic security events that occurred in the 24-hour period after checking the antivirus software and configuring audit logging.

Project: Information Systems Security
Explain what was done (or should be done) to correct any problems encountered.
Explain the purposes of system hardening and auditing in terms of the company’s goal of maintaining information systems security. Also describe an additional area of concern or an emerging trend related to information systems security that you think warrants the company’s attention in the immediate future. Discuss some relevant hardening guidance Fullsoft could implement.
Briefly explain how your work on this project relates to your responsibility to help the company achieve its IT security goals.

Required Resources

  • Textbook for this course
  • A Windows 7 or Windows 7 computer, preferably with a default installation
  • Internet access

Additional Resources

Submission Requirements

  • Format: Microsoft Word or compatible
  • Font: APA Format
  • Citation Style: APA Format
  • Submit in the Group Project Part 3 Assignment
  • Name the document Group-project-part-3
  • Length: 5–6 pages plus citation page
  • Include relevant screenshots

You are encouraged to respond creatively, but you must cite credible sources to support your work.

Self-Assessment Checklist

  • I summarized the system-hardening and auditing configuration steps I implemented on a computer using Windows 7 or Windows 10, including:
    • How I ensured the antivirus software is running properly
    • How I configured audit logging of all failed password attempts
  • I described potentially problematic security events that occurred within a 24-hour period, and noted actions that were taken (or should be taken) to address them.
  • I explained the purposes of system hardening and auditing in terms of the company’s overarching goal of maintaining information systems security.
  • I proposed at least one area of concern or emerging trend related to information systems security that warrants additional attention.
  • I explained how my work on this project relates to my professional responsibility to help the company achieve its IT security goals.
  • I conducted adequate independent research for this part of the project.
  • I followed the submission guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 3- Proj Risk

 Assigned Readings:Chapter 7: Project Risk Identification ToolsChapter 8: Project Risk Analysis and IdentificationInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Explain each of the following steps in risk evaluation and remediation.
    • Risk identification
    • Risk evaluation for chance of occurrence
    • Risk evaluation for impact if the risk takes place.
    • The four types of risk remediation,
    • What is a project risk owner,
    • What is a risk threshold.
    • What is a risk matrix.

        2. Complete a risk analysis for a project involving a family vacation where a family of four is driving 1,000 miles one way to Myrtle Beach, SC to stay for one week at a coastal resort. Include the construction of a risk matrix.[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!] [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review] 

    Text

     

Title: Managing Project Risks; 464 Pages

ISBN: 978-1-119-48975-7

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards

Publisher: Wiley-Blackwell

Publication Date: 2019

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion: Through the Looking Glass

 

Unit 2 Discussion: Through the Looking Glass

Unit 2 Discussion: Through the Looking GlassThis unit talks about perception, and what influences how we think of ourselves.How did watching the video about stranger’s interpretations of each other influence your thoughts on self-identity?

 (Utilize the components of identity from chapter 3 to add credibility to your response.)What steps could you take personally to enhance your self-esteem and self-identity?

 (Cite information from your textbook to back your response.) 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Write a for loop to populate array userGuesses with NUM_GUESSES integers. Read integers using Scanner. Ex: If NUM_GUESSES is 3 and user enters 9 5 2, then userGuesses is {9, 5, 2}.

 Write a for loop to populate array userGuesses with NUM_GUESSES integers. Read integers using Scanner. Ex: If NUM_GUESSES is 3 and user enters 9 5 2, then userGuesses is {9, 5, 2}. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Distributed Hadoop Mapreduce – Course recommendation

Title: Design and develop a Distributed Recommendation System on Hadoop

Problem statement: 

 Given 2 CSV data sets: 

(a) A course dataset containing details of courses offered

(b) A job description dataset containing a list of job descriptions 

(Note: Each field of a job description record is demarcated by ” “)

You have to design and implement a distributed recommendation system using the data sets, which will recommend the best courses for up-skilling based on a given job description. You can use the data set to train the system and pick some job descriptions not in the training set to test. 

It is left up to you how you pick necessary features and build the training that creates matching courses for job profiles.

Use Map Reduce and Python

NOTE: Combine all data_job_posts.csv into a single CSV file. Due to size limitation, I had to split the file

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Access Module 2

This consists of 3 different assignments

1.) Access Module 2 SAM Training

2.) Access Module 2 SAM End of Module Pr*ject 1

3.) Access Module 2 E*xam

Below is:

1st File: Instructions

2nd File: Screen that should be seen once logged in; where to go.

3rd File: Screen shows the assignments mentioned above.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Controls and Events Programming Assignment

  

Controls and Events Programming Assignment Instructions 

Overview

Matthew 28:19-20
Therefore go and make disciples of all nations, baptizing them in the name of the Father and of the Son and of the Holy Spirit, and teaching them to obey everything I have commanded you. And surely I am with you always, to the very end of the age.” 

For your first visual basic assignment you are going to create a basic assignment to present a picture of your choice, a Bible Verse on the importance of mission work, and information on a Missionary of your Choice.  It is so important to understand our call to serve.  This is your chance to show an example of serving. 

Instructions 

When the application runs the user will see the picture of your choice and a Bible Verse on mission work. The form will have the option to close the application and a mission button. When the mission button is pressed, the user will be presented with an image of a missionary of your choice and a label with information on the missionary.

The following steps must be completed. 

1. Form Setup

a. Your form should have 2 buttons, 2 images, 1 label, and 1 textbox. 

b. Name the initial form frmAssignment1 and put Assignment 1 in its title bar.

c. Set the backcolor of the form to a color of your choice in the properties menu.

d. Lock all controls on the form 

e. Create access keys for the buttons for both buttons.

f. The tab order of the buttons should go from Missions to Quit. The form should open with the Missions button as the highlighted option. 

2. PictureBox

a. Add two PictureBox controls to your form and name the PictureBox picStudentImage and picMissionary

b. Import an image for both picture boxes to the resources of the project (Make sure you save the image in the project folder before you inport it to the resources folder)

c.  Use the stretch image property for the image

d. Make the picMissionary not available for vieiwing at the run of the application.

3. TextBox

a. Name the textbox txtVerse and enter a Bible verse on why missionary work is important. 

b. The font of the textbox should be something other than the default Microsoft Sans Serif. 

c. The text should be center aligned. 

d. The text box should be multi-line. 

e. The backcolor and forecolor should be different from the default.

f. The user should not be able to tab to the text box.

4. Label

a. A label should be created called lblMissions. 

b. The label should be created on the form but not show on the load. 

c. The label should include the missionary name, your name and your teacher name and the date you finished your project.. **This is a main requirement and the assignment will not be accepted without this detail.

5. Mission Button

a. When the Missionary button is pressed the lblMissions label is displayed using the visible property. 

b. The Missionary image is also made visible

6. Quit Button

a. The application will quit

7. Code

a. Create a comment section at the beginning of the code with the name of the assignment, purpose of the assignment, and your name. Comments must be throughout each sub of the application. 

b. Remove any subs that are not utilized by the program

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now