prolog questions

Please do the following exercises in The Art of Prolog, Second Edition and submit a ZIP file consisting of your submission files.  There should be a separate file ending in .prolog or .pl for each section.  (Keep in mind that the .pl file extension unfortunately conflicts with Perl, a language that is far more popular than Prolog; this is important when dealing with syntax highlighters and other text editor and IDE features.)  Please make sure that your solutions run in SWI-Prolog in order to receive full credit.

Section 8.2 (p. 153-154): i, ii

Section 9.2 (p. 173): i

Section 10.1 (p. 179): i, ii

Section 11.1 (p. 195): i, ii, iii

Section 11.3 (p. 202): i, ii

link to the book:  Go to https://mitpress.mit.edu/books/art-prolog-second-edition and click “Open Access” and click “Download PDF” 

Discussion-7 MM

 

https://mpra.ub.uni-muenchen.de/78053/1/MPRA_paper_78053.pd

For this Discussion Question, complete the following.

1.  Read the first 13 pages of the attached paper which discusses the effect of government intervention on recessions.  

2. Locate two JOURNAL articles which discuss this topic further. You need to focus on the Abstract, Introduction, Results, and Conclusion. For our purposes, you are not expected to fully understand the Data and Methodology.  

3. Summarize these journal articles. Please use your own words. No copy-and-paste. Cite your sources

Wk 4 – Comparing a Security Strategic Plan to a Security Policy and Aligning to Security Controls

2 Part Assignment 

Assignment Content

  1. The information security strategic plan and security policies are strongly interrelated within an organization’s information security program. The security plan and security policies will drive the foundation and selection of security controls to be implemented within the organization.

    Part 1
    Write a 1- to 2-page summary of the comparison chart of strategic plans and security policies you completed in this week’s Learning Team assignment.

    Part 2
    Review the control families described in this week’s reading, NIST SP 800-53a Revision 4, Assessing Security and Privacy Controls for Federal Information Systems and Organizations.

    Review the controls from this week’s reading, CIS Controls V7.1.

    Develop a 2- to 3-page matrix using Aligning Security Controls to NIST Security Controls Matrix Template that accurately maps CIS controls to NIST security control families. Note that some CIS controls may map to multiple NIST control families.

    Cite all sources using APA guidelines.

    Submit your assignment.

2-1 Discussion: Intellectual Property and Copyright

 After reading about intellectual property this week, create an original post in which you discuss the following: Why do we care about intellectual property? How successful have our attempts to protect intellectual property been? Have all countries defined and protected intellectual property the same way?

Finally, in responding to your peers’ posts, reflect on the impact that copyright infringement has had on information technology by referencing a recent story in the news that is an example of this impact. 

Scenario #3 (Team Building, Solution Building, and Release Management)

Before you begin this assignment, be sure you have read the “XYZ Corporation Case”.

Please refer to the attachments to complete your scenario #3 assignment

Overview of Scenario #3 Task Assignment

Refer to the News post from the instructor and use the Lecture Notes and assigned readings to better understand assignment requirements that follow. Your task assignment is to develop for this Agile project scenario four deliverables:

1. Product Vision (Vision Box & Elevator Test Statement) – Deliverables: 1) Group discussions in the Workgroup Discussion forum; 2) Product Vision PowerPoint Submitted (MS PowerPoint recommended) (4-slide presentation of the front, back, and left side, and right side of a box (with no top and bottom); 

2. Project Data Sheet (PDS) – Deliverables: 1) Group discussions in the Workgroup Discussion forum; 2) Project Data Sheet Submitted (MS Word recommended); (Please see P105 of the PDF (Agile Project Management Creating Innovative Products.pdf) attached to this assignment for additional details.

3. Agile PM Release Plan (for a 4-month project with 4 monthly sprints). Deliverables: 

1) Release plan and iteration discussions in the Workgroup Discussion forum; 2) Release Plan (MS Word or MS PowerPoint recommended); 

4. Team Building and Evaluation Narrative. In this narrative, you will describe how your team came together or did not, and who did what and an overall score for each team member. Be sure to describe who did the work products and how work assignments were decided. 1) Team building posts in the Workgroup Discussion forum, including appropriate role playing (Scrum Master, Product Owner, or Team Coordinator); 2) Team Building and Evaluation Narrative (MS Word recommended). Note: A form is not provided. It’s up to you to develop this narrative and /or scoring table you think are appropriate.   However, each team member needs to use the same scoring method and table as determined by the team.   Note: You will reuse the scoring method/table for Scenario #4.

bi-7

 What are the common challenges with which sentiment analysis deals? What are the most popular application areas for sentiment analysis? Why?
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts  

1 page required

5s week 6 assignment PL

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. what do each of these terms refer to: copyright, patent, trademark, trade secret?

2. Why is intellectual property entitled to legal protection? 

3. Why did copyright laws become stricter and more punishing in the late 20th century?

4. What is the Fair Use doctrine?

5. Make an argument for legalizing the copying of music or software. 

6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?

7. What was the 1984 Sony Supreme Court case about?

8. Was Napster responsible for the actions of its users?

9. Why did the court find in favor of Diamond in the Rio case? 

10. What is Digital Rights Management?

Include references. No copy paste strictly.

Securing Network Components

Compare and contrast the difference and similarities between the OSI Model and TCP/IP Model.

Also, consider:

  • The layers
  • How is data processed during transmission

Minimum 3 pages (not including the title page, abstract and reference)

APA

BYOD Deployment Plan

Along with mobility, users want to use their own devices on your network accessing e-mail, calendar events, and contacts. Every device that is allowed on a network introduces unique security challenges.

In a 500- to 750-word essay, develop a plan for implementing BYOD security in an enterprise network. Make sure to address the following:

  1. Summarize at least four security challenges that BYOD and IoT would bring to your organization.
  2. Discuss how will you handle each devices’ unique security challenges. What areas of the network can these devices connect too? Will you limit their access to certain data?
  3. Defend the strategy for your design.