whats the best Web design & development service for kajabi website ?
Is it https://webdesignerxx.online/ ?
whats the best Web design & development service for kajabi website ?
Is it https://webdesignerxx.online/ ?
Q1. evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES. You must use at least one scholarly resource. Every discussion posting must be properly APA formatted. (250 to 300 words)
Q2. What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?Your response should be 250-300 words. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.
Q3.List and briefly describe the nine-step process in con-ducting a neural network project.Your response should be 250-300 words. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.
Q4. Complete the following assignment in one MS word document and include at least two APA formatted references (and APA in-text citations) to support the work this week. (Each below question 150 words)
1.What is an artificial neural network and for what types of problems can it be used?
2.Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by arti- ficial ones? What aspects are similar?
3.What are the most common ANN architectures? For what types of problems can they be used?4.ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.
5.Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe com- monalities and differences among their findings and prepare a report to summarize your understanding.
6.What is deep learning? What can deep learning do that traditional machine-learning methods cannot?
7.List and briefly explain different learning paradigms/ methods in AI.
8.What is representation learning, and how does it relate to machine learning and deep learning?
9.List and briefly describe the most commonly used ANN activation functions.
10. What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.
11. Cognitive computing has be come a popular term to define and characterize the extent of the ability of machines/ computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real- world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.
Identify one key concept that you learned in chapters covered through week 3 that you think is important for your professional career. Write a 2 page paper on the concept you chose. In your paper, cover these key points:
Reflect deeply when you write this paper as this a personal reflection and not just a research paper on the topic. Think about how you will apply what you learned and your writing will be evaluated on the quality of your reflection on your chosen topic. Describing how you will apply what you learned is a very important part of this assignment.
For this paper, you will research potential and existing security issues affecting digital government websites. Government websites enable customers to enroll in programs and services, check the status of benefits, and receive information about the federal government’s activities. Your audience for this research report is the Chief Information Officer for a small federal agency who asked for assistance in developing a risk assessment and risk mitigation strategy for the agency’s digital government websites.
Note: this research report is separate from the report you previously prepared about OPEN data and may not reuse information from that report. This paper must address other types of government services. See Table 1 for the list of websites to use in your research.
For this report, you should begin by reviewing three or more specific digital government websites (from the list provided in Table 1) to determine:
(a) the types of information provided by the websites
(b) the types of services provided by the websites
(c) security issues which could impact the delivery of digital government services by the websites
After you have reviewed these websites, review the Federal Cybersecurity Risk Determination Report and Action Plan https://www.whitehouse.gov/wp-content/uploads/2018/05/Cybersecurity-Risk-Determination-Report-FINAL_May-2018-Release.pdf to identify additional sources of risk that the agency must be aware of and should address in its planning. You should also review Executive Order 13800 Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/
Table 1. List of Digital Government Websites
Base URLs
BENEFITS.GOV
CANCER.GOV
CONSUMERFINANCE.GOV
DATA.GOV
DIGITALGOV.GOV
DISASTERASSISTANCE.GOV
FOODSAFETY.GOV
GRANTS.GOV
HEALTHCARE.GOV
HEALTHFINDER.GOV
MEDICARE.GOV
READY.GOV
RECREATION.GOV
REGULATIONS.GOV
RESEARCH.GOV
SAFERCAR.GOV
SERVE.GOV
STOPFAKES.GOV
USA.GOV
VOLUNTEER.GOV
1. Read / Review the Weekly readings
2. Research three or more attacks that could compromise the security of a Digital Government Website that uses Web Applications, a Web Server, and a Database Server. Here are some sources to get you started:
a. Web Applications Architectures and Security (in the Week 3 content module).
b. Cyber Vandalism — https://www.digitalgov.gov/resources/readiness-recovery-response-social-media-cyber-vandalism-toolkit/
c. Cybersecurity: Actions needed to address challenges facing federal systems (GAO 15-573T) http://www.gao.gov/assets/670/669810.pdf
3. Review three or more websites that deliver digital government services (select from those listed in Table 1). What types of information or services are available via these websites? What population do these websites serve (who is in the intended audience for each website)?
4. As part of your Digital Government websites review, determine the types and sensitivity of information collected, displayed, processed, and stored by the Web applications that implement the Digital Government services.
a. See http://www.digitalgov.gov/resources/checklist-of-requirements-for-federal-digital-services/ for general security and privacy requirements.
b. See FIPS 199 for additional guidance on determining the sensitivity level of a Federal IT system. (See the section on public websites.)
5. Using FIPS 200, the NIST Cybersecurity Framework, and NIST SP 800-53, research the general types of security controls required by IT systems hosting the Digital Government service that you reviewed.
a. FIPS 200 https://doi.org/10.6028/NIST.FIPS.200
b. NIST Cybersecurity Framework https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
c. NIST SP 800-53 https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-53r4.pdf
6. Find three or more additional sources that provide information about best practice recommendations for ensuring the security of the Web Applications used to deliver Digital Government information and services. These additional sources can include analyst reports and/or news stories about recent attacks/threats, data breaches, cybercrime, cyber terrorism, etc. that impacted the security of digital government services.
Write a five- to seven-page summary of your research. At a minimum, your summary must include the following:
1. An introduction or overview of digital government that provides definitions and addresses the laws, regulations, and policies that require federal agencies to provide information and services via the Web. This introduction should be suitable for an executive audience.
2. An overview of the information and services provided by the digital government Websites that you reviewed. Answer the following questions:
a. What types of information or services are available via your selected Websites?
b. What populations do the websites serve (who is the intended audience)?
c. What sensitivity level are applicable to each Website (use FIPS 199 criteria).
d. What security issues did you observe during your review?
3. A separate section that addresses the architectures and security issues inherent in the use of Web applications when used to deliver the services provided by your selected digital government Website. Include 5 or more examples of security issues and address how these issues contribute to increased risk.
4. A separate section that includes recommendations for best practices for ensuring Web application security during the design, implementation, and operation of digital government websites. Include five or more best practice recommendations in your recommendations. (Hint: at least one of your recommendations should address use of the NIST Cybersecurity Framework. Another recommendation should address use of NIST SP 800-53 controls for ensuring security and privacy.)
5. A closing section in which you summarize your research and your recommendations.
Submit your work in MS Word format (.docx or .doc file) using the Project 2 Assignment in your assignment folder. (Attach the file.)
1. Consult the grading rubric for specific content and formatting requirements for this assignment.
2. Your 5- to 7-page paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.
3. Your paper should use standard terms and definitions for cybersecurity. See Course Content > Course Resources > Cybersecurity Concepts Review for recommended resources.
4. The CSIA program recommends you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. You can find APA formatting guidelines and examples under Content > Course Resources > APA Resources. You can use the provided APA template file (MS Word format) CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.
5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be a separate page at the end of your file. These pages do not count towards the assignment’s page count.
6. You should write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct, and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
7. You must credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).
Create a JSON object with five elements. Explain the definitions of object serialization and deserialization. Write and explain the Python code to apply these concepts to the created JSON object.
Demonstrate how to explain these concepts to the created JSON object.
In developing your initial response, be sure to draw from, explore, and cite credible reference materials, including at least one scholarly peer-reviewed reference. In responding to your classmates’ posts, you are encouraged to examine their opinions, offering supporting and/or opposing views.
You are required to reply to at least two peer responses to this week’s discussion question and/or your instructor’s response to your posting. Your replies need to be substantial and constructive in nature. They should add to and evaluate/analyze the content of the post answer. Normal course dialogue doesn’t fulfill these two peer replies but is expected throughout the course. Answering all course questions is also required.
Big Data – Hadoop Ecosystems
Import the accounts table into HDFS file system:
1) Import account:
$ sqoop import
–connect jdbc:mysql://localhost/loudacre
–username training –password training
–table accounts
–target-dir /loudacre/accounts
–null-non-string ‘\N’
2) List the contents of the accounts directory:
$ hdfs dfs -ls /loudacre/accounts
3) Import incremental updates to accounts
As Loudacre adds new accounts in MySQL accounts table, the account data in HDFS must be updated as accounts are created. You can use Sqoop to append these new records.
Run the add_new_accounts.py script to add the latest accounts to MySQL.
$ DEV1/exercises/sqoop/add_new_accounts.py
Incrementally import and append the newly added accounts to the accounts directory. Use Sqoop to import on the last value on the acct_num column largest account ID:
$ sqoop import
–connect jdbc:mysql://localhost/loudacre
–username training –password training
–incremental append
–null-non-string ‘\N’
–table accounts
–target-dir /loudacre/accounts
–check-column acct_num
–last-value
4) You should see three new files. Use Hadoop’s cat command to view the entire contents of these files.
hdfs dfs -cat /loudacre/accounts/part-m-0000[456]
Please find out the attached document. Need answers for all question
In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history. The writing assignment requires a minimum of two written pages to evaluate the history. You must use a minimum of three scholarly articles to complete the assignment. The assignment must be properly APA formatted with a separate title and reference page.
Your work so far has been well-received, and the management team is very interested in quickly bringing the rest of the organization into the process. The management team has expressed interest in incorporating cloud technology as part of the Auburn Regional’s IT architecture.
To integrate both of these requests, you decide to create an infographic that could, on a single diagram, give the reader an idea of what cloud technology is and how it could be used by Auburn Regional as these enterprise systems updates are in action. As you might imagine, there is a wealth of information on the internet involving the use of cloud computing.
Consider the following information, and outline your answers:
IOT threats to database security