Cryptography

Random numbers (or, at least,  pseudorandom numbers) are essential in cryptography, but it is extremely  difficult even for powerful hardware and software to generate them. Go  online and conduct research on random number generators. What are the  different uses of these tools besides cryptography? How do they work?  Explain your answer using your own words in 2-3 paragraphs. 

 

– No Plagirism

– References required

13 – Imoprtance of strategic IT planning

 Discussion :IT Project Management

In your initial post, answer the following questions about IT Project Management. 

What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents.

In your peer responses, be sure discuss your thoughts on project management, your views on project’s attributes, and your thoughts on successful project management. You can take opposing/differing views than your peers but be sure to provide applicable resources as needed. Properly provide examples in your peer responses as well and any additional challenges you see with IT projects.

Note: Answer should be a minimum of 300 words and Please don’t copy and paste the answer from google or any other resources. Should use atleast 2 scholary artcles and APA format

I am giving two questions please go through that

 1) Choose any two questions

  Discussion #1: Explain the relationship among data mining, text mining, and sentiment analysis. Discussion #2: In your own words, define text mining, and discuss its most popular applications. Discussion #3: What does it mean to induce structure into text-based data? Discuss the alternative ways of inducing structure into them.

Discussion #4: What is the role of NLP in text mining? Discuss the capabilities and limitations of NLP in the context of text mining.

2) This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

  1. What is your definition of AI?  Please explain.
  2. What is your opinion of AI, is the technology currently available? Why or why not?
  3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.
  4. How is AI perceived as different in various industries and locations? Please explain.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-4 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. 

Discussion – Are machine learning based intrusion detection system always secure? An insight into tampered learning.

Provide a summary of the attached paper by going through the hypothesis and conclusion (attached paper link). Discussion post has to on where you discuss? what you found interesting? in the dissertation.

http://eds.a.ebscohost.com/eds/detail/detail?vid=5&sid=31a624dc-02d8-443c-9bbe-886bfcc3a1a5%40sessionmgr4007&bdata=JkF1dGhUeXBlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=132098629&db=buh

1 page is needed.

APA format

Citation is needed.

References should also be added.

Cyber Law

1)  Using a Microsoft Word document, please discuss the case involving the United States of America versus Ross Ulbrecht. Please include what took place at the United States Supreme Court. The minimum word count shall be not less than 500 words.

2)  Using a Microsoft Word document, please review ONE of the following films  and tell how that film represents a contribution to the field of CyberLaw.
War Games (1983)Citizen Four (2014AlphaGo (2017)Google and the World Brain (2013) .The minimum word count shall be not less than 1000 words.

3)  Using a Microsoft Word document, please list in order of your preference the five top areas in which you think computer-based laws should be passed or strengthened by legislatures, and a brief description of  why you chose this law and its ranking. The minimum word count shall be not less than 250 words.

4s week 3 assignment EH

Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack:  1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption. 

 Include references, no copy-paste strictly. use your own words.