GAME THEORY

 

Details: A game theory assignment to be completed in python.

hw4 (1).pdf1D

There were clarifications sent out to the class:
Attached are some example plots to show you what I am talking about for some of the plots I have requested.

You may also consider generating a table. with different algorithms as columns and rows, and then statistics on how they perform against one another in the entries (e.g., do they converge? are they converging to Nash or a cooperative solution? what is the learned policy? how does convergence depend on initial conditions if relevant?)

The whole goal is to get you to explore the different possible learning algorithms and understand how they fair against themselves and one another. So this assignment is a very simplified environment in which you can hopefully explore how different learning algorithms long run behavior is dependent on the decision rule and information it has available.
For example you may find that two UCB players go to cooperative solutions in PD and a UCB vs e-greedy player go to a strategy that is better for one player than another. Essentially what can happen is that players beliefs may end up getting skewed by the samples they are seeing from their competitor.

And attached is the paper that sort of motivated this assignment.

Note: Just do multiple tournaments for the case where you add noise to the cost matrices or change the intiialization/parameters—e.g., epsilon in e-greedy.

 

Problem 6- Org behavior

1. Discuss some of the errors in perceptual judgment made by interviewers in job interviews.

 should be at least 1.5 – 2 pages in length, Times New Roman 12-pt font, double-spaced, 1 inch margins and utilizing at least one outside scholarly or professional source related to organizational behavior. This does not mean blogs or websites. This source should be a published article in a scholarly journal. This source should provide substance and not just be mentioned briefly to fulfill this criteria. The textbook should also be utilized. Do not use quotes. Do not insert excess line spacing. APA formatting and citation should be used.

Text-

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH

“Could RFID technology be used to become the mark of the beast?

 

Answers the question: “Could RFID technology be used to become the mark of the beast?  Why or why not?” Understand that this post is an intersection of Theology and Technology question. You cannot answer this post without considering both.
Technology can be used for good. Think of all medical devices that have saved countless lives over the decades.
Technology can also be used for evil. Think of how technology can be used to manufacture biological weapons and mind-altering drugs or to facilitate kidnapping, human trafficking, and even murder.
In the hands of good people, any technological device can be used for good.  In the hands of evil people, the same device can be used for evil.  Thus, it is true for RFIDs.
Some people have suggested different uses for RFIDs, including the tracking of humans through the use of chip implants beneath the skin.  For all of the benefits that this potentially brings, could there be hidden dangers as well? Some people have likened embedded RFIDs in humans to the mark of the beast as described in Revelation 13:17 (NIV): “And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.”
You will find countless resources by An Internet search on topics like:

  •     End time Prophecy and RFID
  •     Is RFID the Mark of the Beast
  •     Technology as the Mark of the Beast

Need to Complete the assignment in the format mentioned in the attachement

 

Topic: Complete a Physical Security Assessment (internal and external) of your place of work or living area.  If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities. Refer to your text on the importance of Lighting and Access Control and be sure to cover the salient issues discussed in the text.

Instructions: Please download the Assignment 2 Physical Security Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_2_Physical_Security_Assessment.docx and submit to the appropriate assignment folder. 
Also review any additional files attached for more information. 

Exp19_Access_Ch08_HOEAssessment – Real 1.0

 Exp19_Access_Ch08_HOEAssessment – Real 1.0

  

Project Description:

In this project, you will work with a database that tracks real estate agents and their property sales. You will add a hyperlink field that will store a link for each agent’s website. The HR department manager wants to store a photo for each agent as an attachment. You also export data from the database to three different formats. Finally, you import information from Excel, Access, and text files.

     

Start   Access. Open the downloaded Access file named Exp19_Access_Ch8_HOEAssessment_Real.accdb. Grader has automatically added   your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

You will add a hyperlink field   to the Agents table to store each agent’s website address.
 

  Create a new field in the Agents table after PerformanceReview named Website with the Hyperlink data type.   Save the table.

 

Switch to Datasheet view, add   the website https://juanrosario.biz to the first AgentID (record   1). Close the table.

 

You will add an attachment field   to the Agents table to store the employees’ performance reviews and photos.
 

  Create a new field in the Agents table after PerformanceReview named EmployeeFiles with the Attachment data type.   Save the table.

 

Switch to Datasheet view and add   the downloaded the picture file named Juan.jpg   to the EmployeeFiles field for the first AgentID (record 1).

 

Create a basic form based on the   Agents table; the form will open in Layout view. For the first AgentID   (record 1), click the picture to   display the Attachment toolbar. Click Manage   Attachments to display the Attachments dialog box and then click Cancel. Save the form as Agents.   Close the form and the table.

 

You want to determine current   sales for a specific agent. You will filter the Sales Report query to locate   records and export the records to Excel and Word. You will also export   records to create a report in PDF format.
 

  Open the Sales Report query. Use Filter by Selection to display records in   the LastName column where the value equals Yang. Export the filtered records to an Excel file. Save the file   as a08c1Yang_LastFirst. Do not save the export steps.

 

Hide the Sale Price field from the datasheet results in the Sales Report   query. Export the same filtered records to a Word file. Open the destination   file after the export operation is complete. In the document, press ENTER one time and add the title Hart   Commissions to   the file. Format the title as bold and center aligned. Save the file as a   Word document with the name a08c1Yang_LastFirst. Close the document and exit Word. Do not save the   export steps. Save and close the filtered Sales Report query.

 

Use Filter by Selection to   display records in the Properties table where the Beds value equals 4 (twelve records will display).   Export the records to a PDF document. Save the file as a08c1FourBeds_LastFirst. Close the PDF reader program.   Do not save the export steps. Save and close the filtered Properties table.

 

You will import a new Customers   table from Excel.
 

  Open the a08c1Customers.xlsx   workbook, examine the Customers worksheet, and then close the workbook.   Create a linked table in the database by importing the workbook named a08c1Customers.xlsx. Use the first row   of the Customers worksheet as column headings and accept all other default   options.

 

You will also import subdivision   records from an Access database.
 

  Open the a08c1SubDivisions.accdb   database, examine the SubDivision2 table, and then close the database. Create   a linked table in the database by importing the SubDivision2 table from the   database named a08c1SubDivisions.accdb.

 

You will import additional   subdivision records from a text file.
 

  Open the a08c1TextSub.txt text   file, examine the content, and then close the file. Create a table in the   database by importing the text file named a08c1TextSub.txt.   Use the first row of the file as field names, SubDivisionID as the primary   key, and name the table SubDivision Text. Accept all other default options.

 

Append the 5 records from   SubDivision2 and the 5 records from SubDivision Text to the SubDivision   table. Open the SubDivision table to view the appended records. Close the   SubDivision table.

 

Close all database objects.   Close the database and then exit Access. Submit the database as directed.

Design and implement a stringed musical

  

1. Design and implement a stringed musical instrument class using the following guidelines:

a. Data fields for your instrument should include number of strings, an array of string names representing string names (e.g. E,A,D,G), and boolean fields to determine if the instrument is tuned, and if the instrument is currently playing. You are welcome to add additional data fields if you like.

b. A constructor method that set the tuned and currently playing fields to false.

c. Other methods 1) to tune the instrument, 2) to start the instrument playing, and 3) to stop the instrument from playing.

d. Other methods as you see fit (Add at least one unique method).

2. Create a UML class diagram using a diagram tool (e.g. PPT, Visio) of your choice. Prepare the diagrams and place them in a word document along with a brief description of each of your classes.

3. Create Java classes for your instruments. Be sure that your code matches your design specifications and some minimal functionality is included. For example, if you called the violin.play() method, you should at least print that the violin is playing. Similar functionality should be supplied when you stop playing, tune or call any of your methods. For example:

public void playviolin() {
System.out.println(“The violin is now playing.”);
}

4. Write the output from your Instrument class methods to a text file that a user entered from the command line arguments (e.g. java Mynamep3tst myfilename.txt). This allows your program to accept filenames from the user via a command line argument.

5. Finally, create a Java test class that simulates using your instrument class. In your test class be you should at a minimum: a) Construct 10 instances of your instrument, b) tune your instruments, c) Start playing your instrument, d) Call your unique method, and e) Stop playing your instruments. (Hint: Arrays and Loops will make your job easier and result in more efficient code!)

6. Your programs should compile and run without errors.

7. Be sure to test your program carefully. Provide a list of comprehensive test cases used to validate your application and include these test cases in your word document containing your UML diagrams and descriptions. Similar to Project 1, your test data can be shown in a table that includes input data, expected output, actual output and pass/fail results from the test.

C# Programming (Using Inheritance)

Step 1) Make a new  Console App (.NET Framework)  project file in Visual Studio

Step 2) Name the project as “Programming Using Inheritance”

Step 3) Follow the instructions in the attachments below, and upload without plagiarism:

Thank you!

Case Study

 The paper must be APA-formatted, 1200 to 1500 words, the double-spaced, and 12-point font size in Times New Roman. 

 

Read the paper rubric to understand how your work will be assessed.

This assignment is also used to assess a Cybersecurity Program Learning Outcome (PLO) through the rubric. The PLO assessment will appear as a separate row within the rubric; it will not contribute points to the paper.  

Please see the attached word document for the instruction and the Case Study link is attached to the word document. Please write this paper based on the rubric.

Case study link: https://store.hbr.org/product/data-breach-at-equifax/118031?sku=118031-PDF-ENG