Describe the reasons you are interested in this program and discuss any relevant past experience. If you have relevant work or research experience, please indicate how it helped you decide on your career path. What are your post-graduation plans or career goals?

Personal Statement

The guidelines are as follows:

The purpose of the Personal Statement is for you to share more about your past experiences and to discuss how these experiences have contributed to your personal and professional growth. It allows the applicant the opportunity to explain to the admission committee the distinct qualities and commitment they can bring to the NYU Engineering community. A few topics that you may want to address in your Personal Statement include:

Describe the reasons you are interested in this program and discuss any relevant past experience.
If you have relevant work or research experience, please indicate how it helped you decide on your career path.
What are your post-graduation plans or career goals?
What do you hope to gain from this program?
What about this program excites you?

If there are any special circumstances that need to be brought to the attention of the Admission Committee, please include that information.
We recommend that your Personal Statement be between 250 and 1,000 words. Your application will not be negatively impacted should you exceed this recommendation.
If possible, the following format is preferred:
All margins should be at least one inch, and the left and right margins should be equal.
Text should be double spaced.

The preferred fonts are 10-point Arial or 12-point Times New Roman; however, any legible serif or sans-serif standard font may be used. Do not use script or ornamental fonts.
Your name should appear in the Header or Footer of every page.
It is integral to the admissions process that you write and submit this Personal Statement on your own. Any evidence of plagiarized materials may result in denial or revocation of admission.

What is organizational behavior (OB)? Why does organizational behavior matter? What research methods are used to study organizational behavior? What challenges and opportunities exist for OB?

Organizational behavior

In reading Bauer and Erdogan, you are quietly joining the revolution that is otherwise known as Unnamed Publisher, our partner and publisher. For this we thank you. The people at Unnamed Publisher and your author team share a common vision about the future of management education that is based on powerful but fun and simple-to-use teaching and learning tools. Moreover, Unnamed Publisher gives you—you the student and you the instructor—the power to choose. Our fifteen chapters are written using a “modular” format with self-contained sections that can be reorganized, deleted, “added to,” and even edited at the sentence level. Using our build-a-book platform, you can easily customize your book to suit your needs and those of your students.

After reading this chapter, you should be able to understand and articulate answers to the following questions:

  1. What is organizational behavior (OB)?
  2. Why does organizational behavior matter?
  3. How can I maximize my learning in this course?
  4. What research methods are used to study organizational behavior?
  5. What challenges and opportunities exist for OB?

 

Outline the problem that this emerging trend is trying to solve and why it is important to solve it. Explain how the emerging trend solves the problem, which will also provide a giving deeper insight into the emerging trend and its technologies.

Artificial intelligence

Write an essay on one of the emerging trends in computer science.

The computer science field is an ever-evolving field. From Turing machines to self-driving cars, we see examples of emerging and innovative technologies every day.

In this assignment, you will select one of the emerging trends in computer science and write an essay explaining it, its potential applications, and the impact it will have on our lives locally and globally.

To prepare for this assignment:

Review the module’s resources and references,

Select the computer science emerging trend to be the subject of your essay.

To complete this assignment:

  • Write a 2,000 word, Harvard referenced essay on your selected computer science emerging trend in which you:
  • Define and explain the emerging trend.
  • Outline the problem that this emerging trend is trying to solve and why it is important to solve it.
  • Explain how the emerging trend solves the problem, which will also provide a giving deeper insight into the emerging trend and its technologies.
  • Describe some applications of the emerging trend.
  • Analyze the local and global impact of emerging trend applications.

Reference and cite at least two peer-reviewed articles supporting your essay.

 

Explain what “Speculative execution” means and how it applies to computer performance? Explain the difference between static and dynamic branch prediction??

DISCUSSION ESSAY

Name and explain the four types of misses associated with cache memory

What is meant by the term “power wall” in terms of processor performance improvements and the focus towards more parallelism?

The current focus of exploiting higher levels of performance in hardware is on multicore, domain specific architectures and parallel processing. What is the primary impediment to achieving maximum utilization of the hardware resources being implemented today?

Explain what “Speculative execution” means and how it applies to computer performance?

Explain the difference between static and dynamic branch prediction??

 

BIG DATA ..what is big data ? What’s the Purpose of big data? What are the characteristic of big data? What’s the use of big data?

BIG DATA

Prepare about two page word document that addresses the following:

  • BIG DATA ..what is big data ?
  • What’s the Purpose of big data?
  • What are the characteristic of big data?
  • What’s the use of big data?

For technology….advantage and disadvantage of big data…..

 

Research the incident and get as many details as possible indicating who perpetrated the crime, what methods were used to get inside the network, what data was stolen, and the extent of the damage in dollars and to the organization.

Data breach case

Pick a major data breach case that occurred in 2016 or later and was well publicized in the news media and other journals or periodicals. Research the incident and get as many details as possible indicating who perpetrated the crime, what methods were used to get inside the network, what data was stolen, and the extent of the damage in dollars and to the organization. Also, indicate the extent of the damage to the organization’s reputation and any other intangible harms that resulted from the security breach.

 

Read the attached Paper and write a 1-page conclusion on the topic.

Conclusion

Scenario: The chief technology officer (CTO) has indicated that your organization has been requested by the National Security Council (NSC) to comment on the upcoming National Cybersecurity Strategy. The NSC has asked for specific recommendations as it relates to the next cybersecurity strategy, private/public partnerships, and comments on how specific technologies should be incorporated into the assessment. The CTO has asked you to collaborate with your team to provide the organizational input.

Read the attached Paper and write a 1-page conclusion on the topic.

Summarize the episode in 3-5 sentences. List 5 detailed things you learned from this episode. Relate the things you learned in this class with what you learned in the podcast.

ASSIGNMENT TASKS

(100%) Learn about data science from the command line

We have learned a lot about Jupyter notebooks in this course, yet there are a lot of other tools that should (and will) be in the quiver of the working data scientist.

You will learn about such tools in this interactive recording of a live stream that is an interview / live coding with Jeroen Jannsens a data science consultant and author of the book Data Science at the Command Line.

You will watch the video of the podcast Talk Python[‘Podcast’] Episode #392 Data Science from the Command Line, December 2, 2022: where the host and guest discuss and review some different patterns in the data science toolchain.

You can listen to / watch the show from one of the links below (there are others (i.e. Apple Podcasts) if you search):

  • (main page) Talk Python[‘Podcast’] Episode #392
  • (mp3 direct) MP3 file direct download
  • (youtube) YouTube: Talk Python[‘Podcast’] Episode #392

Task: Listen to the podcast and answer the following 4 questions:

  1. Summarize the episode in 3-5 sentences.
  2. List 5 detailed things you learned from this episode.
  3. Relate the things you learned in this class with what you learned in the podcast.

You should list at least 3 things to get full points for this question

 

What is the primary key of the 1NF table you just constructed? Identify the functional dependencies in the 1NF table you constructed. Describe any insertion anomalies that can occur in your 1NF table.

Lab: Normalization Assignment Instructions

Instructions

The following table is un-normalized.

The original data set is in the Normalization Lab Data.xls file in your lab folder.  For each question that requires you to re-write tables, re-write them in the Excel workbook and copy/paste your new table(s) in the appropriate sections of the Lab: Normalization Template located on the assignment page. Tables must include all data (not merely column headings).  To make your results more readable, paste your tables as bitmaps or screenshots.  To receive credit for these questions, your tables must be easily readable.  You may refer to the Lab: Normalization Example file (found on the assignment page) as an example on how to approach this task.

Question #1:

In the space below, re-write the table above so that it is in first normal form.

Question #2:

What is the primary key of the 1NF table you just constructed?

Question #3:

Identify the functional dependencies in the 1NF table you constructed.

Question #4:

Describe any insertion anomalies that can occur in your 1NF table.

Question #5:

Describe any deletion anomalies that can occur in your 1NF table.

Question #6:

Describe any modification anomalies that can occur in your 1NF table.

Question #7:

Based on your 1NF table, in the space below, re-write the table so that it is in second normal form.  You may add ID fields to any new tables you create and use those IDs as foreign keys in other tables as appropriate.  (10 points)

Question #8:

What is the primary key of each of the 2NF tables you just constructed?

Question #9:

Identify the functional dependencies in the 2NF table(s) you constructed.

Question #10:

In the space below, re-write the 2NF table(s) so that they are in 3NF.

Question #11:

What is the primary key of each of the 3NF tables you just constructed?

Question #12:

Identify the functional dependencies in the 3NF table(s) you constructed.

Question #13:

Are all of your tables in BCNF?  Why or why not?

 

Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.

Describe how a brute-force approach algorithm would solve the above problem, and explain its complexity. Design an algorithm to solve the above scenario for N boxes.

Question 1: (30 Marks)

In stores, boxes should be placed in an organized way otherwise it will be messy. Given a collection of boxes, it is requested to place them on top of each other to reach the minimum possible height. There is a condition, where a box cannot be placed on top of another box unless the area of its 2D base is smaller or equal of the 2D base of the lower box. It is allowed to rotate any box to use any two sides as its base. For example, consider below 4 boxes where each box has the following dimensions Input: Box 1: (2,1,3), Box 2:(6,3,8) Box 3: (4,2,5), Box 4:(3,1,6),

Output:

From bottom to top as follows:

In the bottom Æ Box 2 on the base (6,8) and height 3,

On top of it Æ Box 3 on the base (4,5) and height 2,

Then Æ Box 4 on the base (6,3) and height 1,

Finally Æ Box 1 on the base (2,3) and height 1.

The total height is 7

[Explanation: as we can see that the first box in the bottom is the box 2 with base 6×8 and height 3, then box3 with base 4×5 and height 2, and so on. This arrangement of boxes fulfils the constraint mentioned above: “the dimensions of the 2D base of the lower box are each strictly larger than those of the 2D base of the higher box”. This solution also satisfies the shortest possible stack]

  1. a) Describe how a brute-force approach algorithm would solve the above problem (4 marks), and explain its complexity (2 marks).
  1. b) Design an algorithm to solve the above scenario for N boxes. (6 marks) [The efficiency of your algorithm is the main driver of the mark], and analyze the complexity of your solution. (2 marks) [full explanation of your answer should be provided]
  1. c) Develop a python code to implement your efficient algorithm. (10 marks) [The marks depend on the correctness of the code, indentation, comments, test-case]
  1. d) Prepare a brief report (250 words) comparing the two algorithms (6 marks)

 

Question 2: (30 Marks)

There is a group of n children standing in a queue, where their ages are listed in the array A[ ]. The children are standing randomly in the queue. Most probably, their ages in the array A[ ] are randomly listed too. For each child, you are required to search for the next older child in the queue and to print the difference of their ages. Print all the outputs in an array Out[ ].

Note: x The last kid in the queue is then compared with the first kid in the queue as if it is a circular queue. x Print -1 if no one is eldest than the kid under consideration.

Example 1:

A[ ]={11, 10, 7, 13, 14, 12,9,15,8}

Output: Out[ ]= {2, 3, 6, 2, 1, 3, 6, -1, 3}

Example 2:

A[]={8,5,9,4,10}

Output: Out[ ]={1, 4, 1, 6, -1}

Explanation of example 1:

The given array A[] of heights is as follows: A[0] A[1] A[2] A[3] A[4] A[5] A[6] A[7] A[8] 11 10 7 13 14 12 9 15 8

The kid at the starting point of the queue 11 years old (i.e., A[0]). The next older kid in the queue at A[3] with age 13 years. The difference between their heights is 13 – 11 = 2, therefore 2 is printed. The second kid is 10 years old (i.e.,A[1]) has also the same kid as the next first older kid.

Therefore 3 is printed and so on. Remember that the queue is circular. Therefore, the last kid in the queue with age 8 (i.e., A[8]) is compared with the kid at the starting point of the queue, where the kid with 11 years old (i.e., A[0]) is the next older taller kid, and hence, 3 is printed.

Output: Out[ ]={2, 3, 6, 2, 1, 3, 6, -1, 3}

  1. a) Design an efficient algorithm to solve this problem. (10 marks) [The efficiency of your algorithm is the main driver of the mark], and analyze the complexity of your solution. (4 marks) [full explanation of your answer should be provided]
  1. b) Develop a python code to implement your efficient algorithm. (10 marks) [The marks depend on the correctness of the code, indentation, comments, test-case]
  1. c) Prepare a brief report (250 words) comparing the two algorithms (6 marks)

Question 3: (30 Marks)

Given three groups of boxes A, B, and C of n boxes each, where the shapes of the boxes are different. The capacity of each box is measured in milliliter (ml). The list of boxes’ capacities in Group A is exactly randomly repeated in Group B and C. This means that for each box in Group A there exist a corresponding box in Group B and C that hold the same capacity, but we do not know which box would match with the other in group A, B and C. Your mission is to find a smart way to match these boxes.

For example:

Input: capacity in milliliter

Group 1 2 3 4 5 6 7 8

A 140 120 150 100 170 200 90 180

B 170 150 140 90 100 120 180 200

C 120 90 200 150 180 140 100 170

Output:

A[1] with B[3] with C[6]

A[2] with B[6] with C[1]

A[3] with B[2] with C[4]

… and so on

  1. a) Using a brute-force approach, design an algorithm to solve this problem, and analyze its complexity (3+2 marks)
  1. b) Design a more efficient algorithm to solve this problem, and analyze its complexity [Hint: you can use any data-structure] (6+4 marks)
  1. c) Implement your efficient algorithm using Python (10 marks)
  2. d) Prepare a brief report (250 words) comparing the two algorithms (5 marks)

 

Question 4: (30 Marks)

The following algorithm examines all the components in a given array to check for the existence of any two numbers, where one of them is the square of the other, in the given array or not.

For example 1: input: A[9,5,28,25,47, 55] Æ output: true

For example 2: input: A[24,15,18,18,42, 22] Æ output: false

In example 1 the output is True because (5 and 25), where 25 is the square value of 5, while the output of example 2 is False because there is no any pair of numbers that meets this condition.

  • Input: An array A[0…n-1]
  • Output: Return True if there exist any two numbers, where one of them is the square of the other in the array, False otherwise
  1. a) Design a brute force algorithm to solve this problem (5 marks) and analyze its complexity. [explain your answer] (2 marks)
  1. b) Design a more efficient algorithm to do the same job (10 marks) analyze the complexity of your algorithm [explain your answer] (3 marks)
  1. c) Develop a python code to implement your efficient algorithm. (10 marks) [The marks depend on the correctness of the code, indentation, comments, test-case