Determine three critically important questionsnot otherwise included in the article that you would like to address to the author regarding the article

Instructions

Paper CE: Analysis of a Current Events article.

The purpose of this assignment is to analyze a current events article (i.e., only one) that you may choose from any online current periodical, trade magazine, or other electronic publication about a global digital ethical issue. While this assignment will increase your knowledge in that subject area from a corporation viewpoint and enable you to analyze digital ethical issues of a current GLOBAL situation or event, it will also help enhance your research and writing skills, as well as your critical-thinking abilities.

Start by selecting one current IT related online article (2017 sources or later) about a global ethical issue. Note that this assignment is not a general essay about the topic selected, it must be about the current event article that you have selectedIn addition, please note that while articles from journals may be of interest, they are ultimately too long and involved for this assignment – it is best to find an article from the World Wide Web from a trade magazine, or other electronic publication.  Provide the source citation that is in compliance with the American Psychological Association (APA) formatting rules, as well as the persistent URL – one that anyone can click on to re-access the original article.

The following elements must be addressed:

  • Summarizethe whole article by all of its key or salient points. It may help if you use bullets to note the salient points of the article, as you read through it. A summary is desired, not just the “thrust’ of the article.
  • Analyzethe multi-national and global aspects of the article – what is the impact or what is the importance of the information in the article?
  • Determine three critically important questionsnot otherwise included in the article that you would like to address to the author regarding the article – you are not expected to answer the questions!

Prepare a double-spaced paper and submit it to the LEO Assignments Module as an attached Microsoft Word file. The instructor will provide your grade and feedback via the LEO Grades tool. This assignment does not have a specific length, as the length depends upon the length of the article that is being summarized, but you want to make sure that you have fulfilled the three requirements listed above. Remember to use headings for each topic criteria. The length of Paper CE is not a factor considered in its grading!

Use APA formatted source citations for all sources utilized, in your reference list.  Remember, as a minimum, the source citation for your article must be included along with an external link. In addition to critical thinking and analysis skills, your paper should reflect appropriate writing mechanics, good organization, and proper business-writing style.  Include a Cover Page with your Name, the UMGC/Name of the Class, and the Title of the Paper.

 

Develop a detailed comparative analysis of cloud vendors and their services.

Instructions
In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

One to two slides on the company profile.
One to two slides on what the company is struggling with.
One to two slides on current infrastructure.
Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.
One slide on the conclusion.

Identify the key elements of sound data governance.

Tel: +1 224 249 3522 | Email: info@getsmarter.com | Website: getsmarter.com© 2020 Harvard’s VPAL All Rights ReservedPage 3 of 18Learning outcomes: LO4: Identify the key elements of sound data governance. LO5: Apply appropriate methods for protecting an organization’s systems, networks, and data. LO6: Deduce types of questions necessary to determine the technologies implemented in an organization’s cybersecurity.

Provide your supervisor with a summary of cloud computing and the potential benefits and risks of migrating to the cloud.

For this assignment, you are asked to provide your supervisor with a summary of cloud computing and the potential benefits and risks of migrating to the cloud. By summarizing your findings in a brief executive summary, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.

Specify a framework for using the cloud using blockchain in a secure way that should be innovative.

Research Trend follows a strong plagiarism policy. It ensures that none of the part of manuscript is plagiarized from other sources and proper reference is provided for all contents extracted from other sources.

All the papers submitted have to pass through an initial screening and will be checked through the Advanced Plagiarism Detection Software.

1) The paper should include abstract,introduction,proposed framework,conclusion,acknowledgement,necessary diagrams,references,etc as per IEEE.
2)The paper should specify the problems in cloud and how we can secure it using the block chain technology.
3)It should specify a framework for using the cloud using blockchain in a secure way that should be innovative.
4)The paper must follow IEEE format(double-sided).
5) The plagiarism must be less than 5%.
6) The paper should include all the sections as specified in the format template.

Provide at least three examples of cybercrimes that can be committed under the category of “computers as storage devices.”

PLease answer these 2 questions with 250 words each:

What is a user permitted to do in a computer or a network if they have authorized access to under the “security testing” exception to copyright law and what permissions must the user have before undertaking security testing?

Provide at least three examples of cybercrimes that can be committed under the category of “computers as storage devices.”

How does the use of data and information affect the ability of Zappos to manage performance and interact with customers and potential customers? 

Directions

  1. Reflect upon these questions:
    1. How does the use of data and information affect the ability of Zappos to manage performance and interact with customers and potential customers?
    2. What specific issues are found in your own organization (or a company of your choice) concerning the use of data and the performance of the organization?

 

Is there a simple definition for what quality software is?

SE 4367, Software Testing Homework #1, Quality Write a 1-2 page description (12 point font, double-spaced) of what “software quality” means.

Is there a simple definition for what quality software is?

What attributes make up “quality”?

Is quality truly important for the success of software products?

How does testing contribute to a quality product?

Read and cite the article by Glass in the References folder on eLearning on “Defining Quality Intuitively” to inform your discussion.

   Describe, using code or pseudo-code, an algorithm to search for a solution to a travelling salesman problem with the shortest path. 

  1. State Spaces

(a) A chess board has 64 squares and there are 32 different pieces.  Assuming that each piece can be in any square, how many different states does the game have?

(8 marks)

(b)   Describe, using code or pseudo-code, an algorithm to search for a solution to a travelling salesman problem with the shortest path.

(9 marks)

(c)   There is one algorithm that is particularly good for playing adversarial games like chess?   Name and briefly explain this algorithm.  What is an essential component for this algorithm?  Name one typical mechanism used to improve this algorithm.

(8 marks)

  1. Knowledge Representation

(a) Write a semantic net for the topics in CST3170.  This should include at least 12 nodes, and 5 types of arcs, including the most important types of arcs.  In this case, the topics are also important.

(10 marks)

(b) Is XML Turing Complete?  Another way to phrase this is can you compute everything in XML that you can compute in Java? Why or why not?

(8 marks)

(c)   How do rules in a rule based system differ from predicates in first order predicate logic?

(7 marks

  1. Machine Learning

(a) What is the prime difference between multi-layer perceptrons and deep nets?  How can this difference lead to an improved performance on big data tasks?

(8 marks)

(b)   Explain how new members of a population are created in genetic algorithms?

(9 marks)

(c)   What is a kernel function, and when is it useful?

(8 marks)

  1. Applications

(a) Parsing is a major component of syntactic processing, is one commonly used sub-system in natural language processing applications.  Name and briefly describe three other common sub-systems.

(9 marks)

(b)   Name four sensors and four effectors used by robots.  (They don’t have to all be used by the same robot.)

(8 marks)

(c)   Shallow natural language processing systems often use bag of word techniques to approximate semantics (the meaning of words and texts).  Describe how these techniques might work.

Explain the algorithm in details with some examples that show how the algorithm works and some examples.

Assignment overview: each group will write a report on the Word document and create a web page that discusses the algorithms

Report (Word document) contents: 1. Cover Letter on a separate page (include all team members’ names, ID, section number, course name, and the name of the algorithms)

  1. Table of contents on a separate page (with pages numbers)
  2. Introduction (brief introduction to the algorithms that will be discussed in the report)
  3. Algorithm 1: Explain the algorithm in details with some examples that show how the algorithm works and some examples.
  4. Algorithm 2: Explain the algorithm in details with some examples that show how the algorithm works and some examples.
  5. References (citation for any work or any textbook you use to write your report (APA style).