two page essay
apa style citation
two page essay
apa style citation
Create a discussion thread (with your name) and answer the following question:
Discussion 2 (Chapter 2): Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.
Q 1: What are the advantages and disadvantages of having interactivity in data visualizations? Provide at least three advantages and three disadvantages. Why do you consider each an advantage and disadvantage? – 1-2pages.
Q2: For this discussion, please use your weekly readings to compose a response to the following prompt/question(s):
Graph 2 (You must select a different graph than one that you have previously discussed)
Select a data presentation from chapter 6 of the text (Grey Section).
Answer the following:
What is the visual that you selected?
What is the purpose of the visual?
What kind of data should be compiled in the selected visual?
What kinds of data should not be compiled in the selected visual?
How can you avoid making the visual misleading? – 1-2 pages.
Research about “OAuth” and provide the following. It must consist of:
1. 5 sources annotated bibliography
2. slide presentation with 12 or more slides
3. Summary or Abstract containing at least 750 words.
In the following scenario you are the CISSO of a Major E-commerce Organization. The organization has decided to migrate their entire IT infrastructure and associated processes to the cloud. Considering the ecosystem of the cloud and the ever-present threats, you’ve been tasked to develop a secure implementation plan which includes the ability for threat modeling and simulations.
· Minimum 700 words
Paper should be developed in accordance to APA
· Use citations with appropriate references
This assignment should be in APA format and have to include at least two references.
TS834 Course Wiki Chapter 7 Discretion
Wikis for Learning and Collaboration
A wiki is a collaborative web site that collects and organizes content, created and revised by its users. The most well-known example is Wikipedia. Wikis are a way to grow a knowledge base around a particular content area, be it best practices in a particular field or how to use a specific piece of hardware/software. A hallmark of Web 2.0 is that it improves as more people use it and this approach underlies wiki-based learning. It is based on the idea that within any enterprise, a great deal of knowledge exists among the members. Sharing this knowledge and information can raise the organization’s intelligence level, be it a university, an association, a corporation or club.
How basic discretion steps can help in countermeasures?
Conduct your own research and post a short relevant summary of your findings. ( Post current information, not older than five years ). Use not more than three (3) references.
You must provide AT LEAST 2 substantive comments on other student’s views.
1. In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. (Note: This is a class project.)
2. Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.
3. Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recognition product
4. Discuss the difficulties in measuring the intelligence of machines.
his week’s journal articles focus on the digital retail sector and how it is constantly growing each year. The case study/article reviews the top four digital retail company’s financial performance. After reviewing the reading, please answer the following questions:
requirnments:
The paper should meet the following requirements:
· 5-7 pages in length (not including title page or references)
· APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
· A minimum of five peer-reviewed journal articles.
The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.
Instructions
Write 1 thread of at least 300 words on topic below and reply of at least 150 words to thread below.
Topic
The need for network security grows each and every day. What biblical principles can you think of that could realistically decrease this need? If you cannot think of a single principle, then what biblical principle would you identify as guiding your responsibilities as a network security manager? Your thread must include: an introduction statement/paragraph, body paragraph(s), and a conclusion statement/paragraph.
Reply to thread below of at least 150 words.
As a network security manager, you may be responsible for many employees. The job may be more managerial than technical. As a network security manager, you may have many responsibilities. Troubleshooting issues, monitoring potential threats, and providing secure passwords to users are just some of the important work you will have to do. Delegating actions to others is very important, making sure that the task goes to the most knowledgeable of IT’s. Security managers must stay on top of their game like medical doctors. If new procedures emerge such as computing trends and security protocols, you will be responsible in implementing them in a timely fashion. Maintaining the company’s network infrastructure is vital. Installing security hardware and software, scanning networks for security threats are also on your list of to-dos’. Some managers may even develop data encryption methods and programs to protect information and privacy.
A biblical principle that would guide me in performing my duties would be integrity. Integrity is the quality of being honest and having strong moral principles; moral uprightness, the state of being whole and undivided. As a security manager you are privy to confidential information, network protocols and system operations. You may be tempted to steal information for money, you may even be tempted to create malicious software such as ransomware that can financially stun an organization. Staying honest in a world that sees cyber-crimes as a lucrative business is challenging; However, with the strength of God anything is possible. Proverbs 10:9 Whoever walks in integrity walks securely, but he who makes his ways crooked will be found out (ESV).
In conclusion being a network security manager is very challenging. There are many obstacles and roadblocks standing in your path. The difference between a security manager and a hacker is integrity, the ability to do right even when wrong is more profitable. The Bible is the absolute truth it can guide us in the darkest of times. Rely on your faith of God and you will be successful at anything you do.