Discuss game theory and how artificial intelligence is used in video games. Provide examples and visual representations.
Provide examples and present your written findings. You must write a 3-page essay in APA format. You must include 3 scholarly reviewed references that are DIRECTLY related to the subject.
Discussion 500 words
why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc.
Heuristic Usability Analysis
Heuristic Usability Analysis of your Prototype
- Usability Test/Test Plan
- Scenarios (from project 3)
- Tasks (from project 3)
- Task List (from project 3)
- Usability Data
- Use two participants.
- You can observe them using your prototype.
- Write your observation.
- Interview them after they used your product.
- Give them a questionnaire.
- Make sure your data is clear and understandable.
- Recommendations
- After your users have used your product, what are your recommendations for any usability problems that you observed from your users or that you got from the questionnaire.
- You can also rate the recommendations as major, minor, or non-issue, etc. if you like.
Paper on how to be prepared for a cloud-based incident.
Assignment:
This assignment will be associated with Legal & Technical Issues in the cloud-based computing environment.
1. How does being in a cloud-based environment change data forensics techniques in your opinion?
2. Do legal concerns also change from being in the cloud than being on a local device in your opinion?
3. If legal aspects change, how does it change associating with the investigation.
Please do not include step by step on how to proceed with an incident like this or even attempt describe the steps. This is more of a research type of an assignment to be more prepared for a cloud-based incident.
Please, include at least three references including the following one that can be found at (https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6159124).
Please, provide at least two more additional references.
References:
Birk, D., & Wegener, C. (2011, May). Technical issues of forensic investigations in cloud computing environments. In 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (pp. 1-10). IEEE.
Paper requirement:
1. The paper must be written in APA format.
2. Number of references should be at least 3 including the one that can be found in the link in the assignment section.
3. The length of the paper can be maximum of 3-4 pages.
4. No need of cover page.
Python
Yabe Online Auctions requires its sellers to post items for sale for a six-week period during which the price of any unsold item drops 12 percent each week. For example, an item that costs $10.00 during the first week costs 12 percent less, or $8.80, during the second week. During the third week, the same item is 12 percent less than $8.80, or $7.74. Design a modular program that allows a user to input prices until an appropriate sentinel value is entered and displays the price of each item for weeks one through six.
building secure web applications week 3
Week Three Assignment
Do a bit of research on CWE, Common Weakness Enumeration.Write a brief overview of their scoring system.Pick one of common weaknesses identified on their site and describe it.
Your assignment should be 200-300 of your own words.
Write a program that includes two functions
Program #4
Write a program that includes two functions. The First (named isPerfect) receives no parameters and does not return any parameters. It simply calculates and prints all the perfect numbers between 1 and 10000. A perfect number is a number whose sum of its divisors (not including the number itself) add up to the number
Determine through processing and print each perfect number and its divisors from 1 to 10000 (there are only 4). Pause the screen and clear the screen between outputs. The output for each perfect number should be like the following example.
6 is perfect. Its divisors are
1, 2, 3
The second function (named isPrime) that receives an integer as a parameter and returns a boolean that indicates whether the number is prime or not. Allow the user to enter a number between 2 and 10000 and printout whether it is prime or not. Example of prompts and output
Please enter an integer and I will tell you if it is prime: 19
19 is prime
Would you like to do another (y/n)? y
…clear screen
Please enter an integer and I will tell you if it is prime: 21
21 is not prime
Would you like to do another (y/n)? n
…end the program
Clear the screen between runs. Do not rerun the perfect code, just the prime.
Make sure you use function prototypes and no globals. Make sure your output is like the above.
Check for invalid input for the prime. If an invalid number is entered, display an error message and then go to the prompt that asks whether he wants to do another.
Name the program numbers.cpp
Business Use Case for a Restaurant
We’ve covered business use case models this week. A business use case defines what happens in the business when the use case is requested by a business actor; it describes the complete workflow or business process that produces results required or in need of a business actor. Use case behaviors may be described in a natural language text, which is current common practice, or by using UML behavior diagrams for specific behaviors such as:
- activity,
- state machine, and
- interaction.
For this week’s Critical Thinking Assignment, you are asked to create a business use case diagram for a restaurant. Include several business actors with needs and goals as related to the restaurant and business use cases, expressing expectations of the actors from the business. Your diagram should include both external and internal business views of the restaurant.For assistance in completing this activity, please review this business use case guideline document: https://sceweb.uhcl.edu/helm/RationalUnifiedProcess/process/modguide/md_buc.htmPlease paste your diagram to a Word document
BigData
Please explain the 7 stages of bigdata stages
- Stage 1: Planning with data.
- Stage 2: Doing the analysis.
- Stage 3: Checking the results.
- Stage 4: Acting on the plan.
- Stage 5: Monitoring in real time.
- Stage 6: Adjusting the impact.
- Stage 7: Enabling experimentation.
Activity 6- Project Risk
#1 Small to medium businesses are exposed to risks on a daily basis. The impact of these risks could cause a decrease in revenue and/or an increase in expenses. As we all know, every business is subject to risks at any time. The potential losses as a result of unmanaged risks could be catastrophic. Insurance policies can be purchased that can help protect businesses from risks caused by certain events and from risks to their employees’ personal security.You have been given the task of persuading your business’s board of directors to purchase insurance policies that will help manage the risks mentioned above. The insurance policies have already been chosen, but now you must explain the details of the insurance policies, including the contracts involved in the policies to the board and convince the board that these policies really will protect the business from risks. In addition, you must describe what the terms in the insurance contracts mean and how they can be applicable to each business area.In order to do this, you will need to create a portfolio document with the following sections:
- Define insurance and an insurance policy.
- Identify the two basic types of insurance.
- Describe how insurance policies can be used to protect the business from risks caused by certain events and from risks to their employees’ personal security while on the job.
- Define the four essential elements of a valid insurance contract: offer and acceptance, consideration, legal capacity, and purpose.
- Identify the common terms found in insurance contracts that specify exactly what risks an insurer will cover.
- Define catastrophe theory and how it differs from risk management principles.
- Discuss how catastrophe theory can be utilized by your organizations to manage and recover from risks.
Requirements:
- There is no minimum or maximum required number of pages. Your response will be considered complete, if it addresses each of the components outlined above.
- Use of proper APA formatting and citations – If supporting evidence from outside resources is used those must be properly cited. A minimum of 7 sources (excluding the course textbook) from scholarly articles or business periodicals is required.
- Include your best critical thinking and analysis to arrive at your justification.
Text
Title: Managing Project Risks ISBN: 9781119489733 Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards Publisher: John Wiley & Sons Publication Date: 2019-08-13