Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.
Week Seven Discussion Topic Question:
Chapter 7 in the textbook discusses the different approaches of communication in change management. After reading the chapter, refer to the contingency approach features in communication. Offer a summary of the feature and discuss its role in organizational change. How can this change communication approach can aid in facilitating a change effort?
security
Read the article, “How Apple and Amazon security flaws led to my epic hacking” by Mat Honan. A PDF of the article is posted to Canvas. In addition, you can find it online
http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/
For additional information, read:
http://www.wired.com/2012/08/mat-honan-data-recovery/
4 Security Lessons Learned from Mat Honan’s iCloud Account Hack
AFTER reading the article, answer the following questions:
2.In all, 4 accounts were hacked. Briefly list all 4 with the extent of “damage” (why hacking into the specific account was a problem). Include your opinion for each account as well.
3.Googleacct. What is Google’s two-factor authentication? Clearly explain first A. what two-factor authentication is at Google, then B. provide a clear and specific example of how Google uses two-factor authentication, i.e. how do they do two-factor authentication. This needs to be understandable. [note be sure you understand how GOOGLE uses it!]
4.“Wired” successfully verified the hackers’ access technique by performing it on a different account. When it came down to it, what were the final three items needed to successfully do this? Simply list the three.
5.Mat Honan corresponded with the hacker. A. What was the hacker’s “name”? and B. Why were the accounts hacked, i.e. what was the “target”? Be clear.
6.What are TWO lessons learned that YOU personally could apply, after having read this article? [i.e. in addition to what the companies need to improve!]. Be specific and be sure these are take-aways from having read this article.
431F1
CHECK ATTACHMENT!!!!
Business networks
In chapter 6, the author describes basic components of a business network. Create a new thread, choose one of the types of participants discussed in chapter 6, and explain how you think the chosen participant type could effectively use assets in an enterprise blockchain environment to impact the organization’s outcomes.
Please write 350 words essay on the following with references?
Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.
Select one of these compromises and explain how it could be avoided.
Web Design
**The question is in the attached file**
Software Development History Presentation (6-8) slides
Assignment Instructions
Create a narrated 6-8 slide presentation in Microsoft PowerPoint® in which you discuss the aspect of software development history that you found most interesting during this week’s learning. Be sure to discuss whether this historical aspect has a continuing influence in today’s software development environment in terms of core programming concepts such as repetition structures, decision structures, arrays, functions, and variables. For example, think about how the shift from procedural programming to object-oriented programming changed or did not change how the core concepts were handled. When composing your presentation, be sure to use Standard English and a highly developed and sustained viewpoint and purpose. The communication of your presentation should be highly ordered, logical and unified.
Additionally, one slide must be devoted to some aspect of software development history demonstrating the benefits of multiculturalism and diversity in a global context. How has software development evolved as we have become more globalized and how has it influenced the growth and change in software development?
Your presentation must have narration throughout as if you were delivering it in a live, professional setting. Focus on your word choice. Your oral delivery techniques, including word choice and oral expressiveness, should display exceptional content, organization, and style, while leading the audience to a dynamic and supported conclusion.
For instructions on adding audio to your presentation, please review the HOONUIT module on adding media.
https://learnit.hoonuit.com/5567/learnit
Assignment Requirements
Narrated content must be effectively incorporated into the presentation. Oral delivery techniques, including word choice and oral expressiveness, displays exceptional content, organization, and style, while leading the audience to a dynamic and supported conclusion.
At least one slide must demonstrate the ability to analyze the benefits of multiculturalism and diversity in a global context.
Assignment Requirements
Points
Possible
Points
Earned
Student selects a specific aspect of software development history to discuss.
5
At least one slide analyzes an aspect of software development history that demonstrates the benefits of multiculturalism and diversity in a global context.
5
Student work includes recommended solutions to issues that arise from a more globalized software development environment.
5
Effectively discusses how this historical aspect continues to influence today’s software development environment (taking into account covered programming concepts, such as repetition structures, decision structures, arrays, functions, and variables).
15
Student’s voice narration effectively incorporated into the presentation.
10
Presentation is 6–8 slides in length.
5
Total (Sum of all points)
45
ERD Diagram, Project, Using MySQL
Build out the ERD diagrams for the entire solution based on the following questions (you must have at least 3 tables for full credit, there is no limit based on your simplification of the data. The simplification of the data should follow the in-class examples of data, with no duplication in tables)
Provide
I. The MYSQL code (within the word document) to build the database and tables
II. The MYSQL code (within the word document) to answer each of the following questions
III. Provide screen shots answering each question along with any supporting text
The answers must be done in SQL, not table presentation and manual interpretation of the data
Questions :
1. What is the total revenue for the year?
2. What is the gross profit for the year? (based only on what is in the tables)
3. How much revenue did each wine provide for the year?
4. What is the Average revenue per month per location for the year?
5. What is the final inventory of the Premium Red wine?
6. If the retail price of the wine increases by 10%, what is the gross profit margin ?
7. How many bottles of the different wines were ordered in July?
8. What is the revenue per year per restaurant?
Create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future.
Create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future.
Please follow the attached document for the plan/template and utilize it.
Need this plan created by Friday 4th, evening.