We have to write a small paper not too long about 2 paragraph max on peoples behavior on using technologies. That could be anything like mostly phones, machines anything around people. Actual instruction in attached below.
Basic Level AI
Exercise 1
In your local nuclear power station, there is an alarm that senses when a temperature gauge exceeds a given threshold. The gauge measures the temperature of the core. Consider the Boolean variables A (alarm sounds), FA (alarm is faulty), and FG (gauge is faulty) and the multivalued nodes G (gauge reading) and T (actual core temperature).
a. Draw a Bayesian network for this domain, given that the gauge is more likely to fail when the core temperature gets too high.
b. Is your network a polytree? Why or why not?
c. Suppose there are just two possible actual and measured temperatures, normal and high; the probability that the gauge gives the correct temperature is x when it is working, but y when it is faulty. Give the conditional probability table associated with G.
d. Suppose the alarm works correctly unless it is faulty, in which case it never sounds. Give the conditional probability table associated with A.
e. Suppose the alarm and gauge are working and the alarm sounds. Calculate an expression for the probability that the temperature of the core is too high, in terms of the various conditional probabilities in the network.
Exercise 2
Consider the problem faced by an infant learning to speak and understand a language. Explain how this process fits into the general learning model. Describe the percepts and actions of the infant, and the types of learning the infant must do. Describe the subfunctions the infant is trying to learn in terms of inputs and outputs, and available example data.
Exercise 3
Complete the missing step in the derivation of Equation (15.19) on page 586 of the textbook, the first update step for the one-dimensional Kalman filter.
Exercise 4
Consider an arbitrary Bayesian network, a complete data set for that network, and the likelihood for the data set according to the network. Give a simple proof that the likelihood of the data cannot decrease if we add a new link to the network and recompute the maximumlikelihood parameter values.
technology
how does technology help children learn?
PowerPoint_Introductory_Capstone1_Winter_Products
PowerPoint_Introductory_Capstone1_Winter_Products
PowerPoint Introductory Capstone1 Winter Products
Project Description:
In this project, you will apply skills you practiced from the Objectives in PowerPoint Chapters 1 through 3. You will develop a presentation that Irene Shviktar, Vice President of Marketing, will show at a corporate marketing retreat that summarizes the company’s plans to expand the winter sports product line.
Open the PowerPoint file PowerPoint_Capstone1_Winter_Products.pptx downloaded with this project.
Change the Slide Size to Widescreen, and then change the Colors to Blue II.
Format the background of Slide 1 with the picture downloaded with this project—pCap1_Skiing.jpg. Select the subtitle, and then use the Eyedropper to change the font color to the dark red color of the skier’s jacket. Apply bold to the subtitle.
With Slide 1 displayed, insert the second slide from the downloaded presentation named pCap1_Company_Overview.pptx.
Mac users: Insert all slides and then delete the title slide (FRONT RANGE ACTION SPORTS) and the third slide (SPECIALIZED MERCHANDISE) from the Company Overview presentation.
On Slide 2, in the content placeholder, center the paragraph, increase the font size to 32, and then apply bold and italic. Click the Bullets button to toggle it off.
On Slide 2, change the line spacing of the content placeholder text to 1.5. Change the shape fill to the first color in the sixth column, and then change the font color to White, Background 1—the first color in the first column.
On Slide 2, format the content placeholder with the first bevel shape effect—Round. Format the title with the first WordArt style and increase the font size to 80.
Note, the bevel effect may be named Circle depending on the version of Office used.
Display Slide 3, and then change the slide layout to Content with Caption. In the content placeholder, from the downloaded project files, insert pCap1_Heights.jpg. Apply the first reflection picture effect—Tight Reflection: Touching.
On Slide 3, format the slide background with the last Theme color in the sixth column. Be sure to apply the background color only to Slide 3. Increase the font size of the caption placeholder text to 24.
Display Slide 4, and then in the content placeholder, insert the Process type SmartArt graphic Segmented Process. Change the color to Colored Fill – Accent 2, and then apply the 3-D Cartoon style. Center the slide title and hide the background graphics.
In the SmartArt, in the top, dark blue text rectangle, type Washington and California Resorts and then click in the light blue text placeholder below and to the left. Type Mammoth Mountain in California and then click in the text placeholder to the right. Type Mission Ridge in Washington
In the middle of the SmartArt graphic, click the dark blue shape. Type Our Market Position and then click in the light blue text placeholder below and to the left. Type Trusted brand name and then click in the text placeholder to the right. Type Expansion planned for Western U.S. (include the period.)
In the last dark blue shape, type Poised for Growth and then click in the text placeholder below and to the left. Type New warehouses in Washington and then click in the text placeholder to the right. Type Proposed retail division in California
Display Slide 5, and then insert a new slide with the Two Content layout. On the inserted slide, enter Our Most Popular Winter Products as the slide title. Center the title.
On Slide 6, in the content placeholder on the left, type the following six list items and then change the font size to 36 and apply the default numbering style.
Snowboards
Boots
Goggles
Bindings
Skis
Jackets
On Slide 6 in the placeholder on the right, search Online Pictures using the search phrase snowboard and then insert an appropriate image from the results. Change the Height of the picture to 3.5 and then apply the preset Glow: 8 point; Turquoise, Accent color 1 glow effect— in the first column, the second effect.
Select and delete any additional text boxes that may display when the image is inserted.
Display Slide 7, and then in the content placeholder, insert a Clustered Column chart. In the worksheet, enter the following data:
Oregon Colorado British Columbia
Year 1 12.2 17.5 6.5
Year 2 14.5 19.2 8.7
Year 3 11.9 18.6 10.6
Year 4 17.6 22.4 11.3
Apply Chart Style 8, and then remove the Chart Title element. Animate the chart by applying the Wipe entrance effect.
Display Slide 8, and then hide the background graphics on the slide. Format the background with the downloaded picture file—pCap1_Lake.jpg.
On Slide 8, align the text placeholder to the top and center of the slide. Change the Font Color to White, Background 1—the first color in the first column, and the Font to Calibri (Body). Apply Bold.
In the slide thumbnails, select Slides 5 and 9. Apply a Solid Fill background color using the second color in the sixth column, under Theme colors.
Display Slide 9. Insert the downloaded picture file pCap1_ Mountain.jpg. Change the picture Height to 2.25 and then apply the second glow effect in the first column.
On Slide 9, use the Crop to Shape option to change the picture shape to the tenth Basic Shape in the third row—Cloud. Align the picture to the center and middle of the slide.
On Slide 9, insert a Frame shape anywhere on the slide. Change the Height to 2.5 and the Width to 4.5, and then type Moving to the Top of the Winter Sports Action in the shape. Align the shape to the bottom of the slide. Select the title, picture, and frame, and then align the objects to the center of the slide. Apply the second style in the third column shape style to the Frame shape.
To all of the slides in the presentation, apply the Page Curl transition with the Single Left Effect Option.
Display Slide 6, and then apply the Split entrance effect to the numbered list.
Display Slide 3. In the Notes pane, type The key elements necessary to achieve our goals are the expansion of the winter sports product line and an aggressive marketing campaign. (include the period).
Insert a Header & Footer for the Notes and Handouts. Include the Date and time updated automatically, the Page number, and a Footer with the text Capstone1_Winter_Products.
Errors Failures and Risks
Answer each of these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
- Give an example from the book where insufficient testing was a factor in a program error or system failure.
- What was one cause of the delay in the completion of the Denver Airport?
- Why didn’t the healthcare.gov website work at first?
- What is one characteristic of high-reliability organizations?
- Describe the potential risks of alert fatigue in EHR systems.
- What were 2 common factors in both the Thorac-25 case and the space shuttle disaster?
- What does design for failure mean?
You are an entry-level programmer
You are an entry-level programmer with the ACME Development Firm. Your boss has selected you to plan new payroll application for a new client. This could be the big break you have been looking for to move up in the company. In general, the application you are planning takes employee information and appropriate timecard data and generates payroll data for the pay period. The application should also be able to generate and print paycheck statements for each employee. (There are samples of these documents attached to these instructions.)
Calculations Required:
Gross pay is the total amount an employee makes BEFORE deductions; net pay is what they get to take home. Net pay is calculated by subtracting the following deductions from an employee’s gross pay:
Medical Insurance: $25 + $5 for each dependent
Dental Insurance: $2 per covered person (employee and dependents)
State Tax: determined using a tax table (data file)
Social Security: 7% of gross earnings up to $60,000 – No Social
Security is paid on amounts over $60,000
Taxable Pay = Gross Pay – (Medical Ins. + Dental Ins.)
Use the Taxable Pay to calculate State taxes. Use Gross Pay to calculate Social Security tax.
Data Dictionary:
All of the data in your program will involve a variable or constant. These variables and constants will be used throughout your program. In the data dictionary, you must identify the following items for each data item:
Name
Variable name used
Data type
Size (Maximum number of digits or characters)
Module(s) in which it is used
Scope (Local or Global)
Whether or not it is a constant
Design/Planning Charts:
Hierarchy Chart
Flowcharts
Pseudocode
Cybersecurity Framework
Implement a security framework to identify and close gaps between an organization’s current cybersecurity status and its target (future) cybersecurity status. Make sure to align to an appropriate regulation (e.g., PCI DSS, HIPAA, SOX, GLBA). In CYB-650, the NIST Cybersecurity Framework was utilized, and therefore it cannot be utilized for this assignment.
Develop a report that addresses the following:
Organizational Objectives and Priorities
- Current Framework Compliance Status: Describe the current cybersecurity environment, such as processes, information, and systems directly involved in the delivery of services. Describe the current risk management practices, threat environment, legal and regulatory requirements, business/mission objectives, and organizational constraints using the framework identified. Include a diagram related to the common workflow of information and decisions at the major levels within the organization.
- Future Cybersecurity Policy Implementations: Describe the critical cybersecurity needs that should be in place to ensure compliance with the appropriate regulation (e.g., PCI DSS, HIPAA, SOX, GLBA) and then prioritize organizational efforts, business needs, and outcomes.
Operational Compliance and Risk Assessment
- Cybersecurity Risk Assessment: Describe the likelihood of risks occurring and the resulting impact. Identify threats to, and vulnerabilities of, those systems and assets. Express risks both internally and externally. Determine the acceptable level of risk (risk tolerance). Describe the response to the risk. Describe how identified risks are managed and resolved. Include an Organizational Risk Assessment Chart.
- Privacy Risk Management: Describe how the business is integrating privacy laws and regulations, prioritizing, and measuring progress.
- Compliance Gaps: Describe the type of audits that should be performed in order to keep a consistent measure of risk. Determine what type of gap analysis should be performed in order to properly identify the security elements and variables within the environment that pose the most risk. Formulate a cybersecurity governance strategy that establishes mitigation plans to achieve security objectives.
- Web Portal Diagram: Create a web portal data flow diagram of the hypothetical organization’s operational environment using Visio or a similar diagramming software. Within the web portal data flow diagram, students will show how the web portal is compliant. The web portal data flow diagram must: a) Display the organization’s technical requirements (related and unrelated applications, services, and links); b) display the compliance of associated servers, routers, access-control components, data storage, internal and external data communication, data backup, e-mail servers, and so forth; c) identify related systems and assets, regulatory requirements, and overall risk approach; and d) demonstrate each IT task to the next as aligned to regulations/compliance (e.g., start with the user logging in, and then go through each step and how it is validated.
APA style is not required, but solid academic writing is expected.
Refer to “CYB-690 Cybersecurity Framework Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.
Usability Business Case Study
Case Study: http://www.id-book.com/downloads/casestudy_n_1.pdf
1. Summarize the case study (http://www.id-book.com/downloads/casestudy_n_1.pdf)
2. Identify the study method used and why it was appropriate (http://www.id-book.com/downloads/casestudy_n_1.pdf)
3. Explore some of the qualitative or quantitative methods gathered. (http://www.id-book.com/downloads/casestudy_n_1.pdf)
4. How would you conduct the study any differently? (from peer reviewed journal articles with references)
5. Given the nature in the advance of technology, how do you foresee technology changing the way studies such as these are conducted in the future? (from peer reviewed journal articles with references)
GO19_AC_CH01_GRADER_1E_AS – Computer Club 1.0
GO19_AC_CH01_GRADER_1E_AS – Computer Club 1.0
Project Description:
In this project, you will create database objects to track the inventory of new computer parts used by the Computer Club. You will create a table and import data from Excel to create a second table. You will create a simple query, a form, and a report.
Start Access. Open the downloaded file named Student_Access_1E_AS_Computer_Club.accdb, enable the content, and then open the Inventory table.
Beginning in the second column of the Inventory table and using the specified data types, create the following fields (in this order):
Part (Short Text), Room (Short Text), Cabinet Location (Short Text), Vendor ID (Short Text), Price (Currency), Quantity in Stock (Number).
Change the data type of the ID field to Short Text, rename the ID field to Part ID, and then save the table.
Add the following three records to the Inventory table and then close the table.
Record 1:
Part ID: V-01
Part: Monitor with speakers
Room: SE110
Cabinet Location: Cabinet A, Shelf 3
Vendor ID: V-015
Price: 199.99
Quantity in Stock: 3
Record 2:
Part ID: S-01
Part: Sound Card
Room: SE110
Cabinet Location: Drawer A
Vendor ID: V-002
Price: 24.99
Quantity in Stock: 10
Record 3:
Part ID: P-01
Part: Power Supply
Room: SE110
Cabinet Location: Drawer C
Vendor ID: V-010
Price: 189.99
Quantity in Stock: 2
Append the records from the downloaded Excel file a01E_Parts_Inventory.xlsx to the Inventory table and then open the table in Datasheet view (the table has 13 records).
Switch to Design view and delete the Room field. For the Part field, enter a description of Enter the computer component name and then change the field size to 50. For the Part ID field, change the field size to 4 and then save the table.
Switch to Datasheet view, apply Best Fit to all of the fields in the table, save the table, and then close the table.
Import the records from the downloaded Excel file a01E_Vendors.xlsx into the database as a new table named Vendors. Designate the first row as column headings and the Vendor ID field as the primary key. Open the Vendors table in Datasheet view (the table has 15 records).
Switch to Design view. For the State field, enter a description of Enter two-letter state abbreviation and then change the field size to 2. For the Vendor ID field, change the field size to 5 and then save the table.
Switch to Datasheet view, apply Best Fit to all of the fields in the table, save the table, and then close the table.
Based on your Inventory table, use the Query Wizard to create a simple query. Add the Part, Cabinet Location, and Quantity in Stock fields (in that order). Keep the default name of Inventory Query, click Finish to display the query results, and then close the query.
Based on your Vendors table, use the Form tool to create a form for the table. Save the form as Vendor Form, display the form in Form view, and then close the form.
Based on your Inventory table, use the Report tool to create a report. Delete the Vendor ID and Price fields from the report. Save the report as Inventory Report.
Sort the Part field in ascending order. Set the width of the Part and Cabinet Location fields to 2 inches. Delete the page number from the report, save the report, and then close the report.
Close all database objects, close the database, and then exit Access. Submit the database as directed.
Proposal for e-Commerce Implementation or Upgrade
refer to the attached details