bi-7

 What are the common challenges with which sentiment analysis deals? What are the most popular application areas for sentiment analysis? Why?
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts  

1 page required

5s week 6 assignment PL

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. what do each of these terms refer to: copyright, patent, trademark, trade secret?

2. Why is intellectual property entitled to legal protection? 

3. Why did copyright laws become stricter and more punishing in the late 20th century?

4. What is the Fair Use doctrine?

5. Make an argument for legalizing the copying of music or software. 

6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?

7. What was the 1984 Sony Supreme Court case about?

8. Was Napster responsible for the actions of its users?

9. Why did the court find in favor of Diamond in the Rio case? 

10. What is Digital Rights Management?

Include references. No copy paste strictly.

Securing Network Components

Compare and contrast the difference and similarities between the OSI Model and TCP/IP Model.

Also, consider:

  • The layers
  • How is data processed during transmission

Minimum 3 pages (not including the title page, abstract and reference)

APA

BYOD Deployment Plan

Along with mobility, users want to use their own devices on your network accessing e-mail, calendar events, and contacts. Every device that is allowed on a network introduces unique security challenges.

In a 500- to 750-word essay, develop a plan for implementing BYOD security in an enterprise network. Make sure to address the following:

  1. Summarize at least four security challenges that BYOD and IoT would bring to your organization.
  2. Discuss how will you handle each devices’ unique security challenges. What areas of the network can these devices connect too? Will you limit their access to certain data?
  3. Defend the strategy for your design.

fw

 

This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

  1. What is your definition of AI?  Please explain.
  2. What is your opinion of AI, is the technology currently available? Why or why not?
  3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.
  4. How is AI perceived as different in various industries and locations? Please explain.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

Week 3

1)  Do a bit of research on CWE, Common Weakness Enumeration.

Write a brief overview of their scoring system.

Pick one of the common weaknesses identified on their site and describe it.

Discussion

 

Data architecture and security must evolve in parallel, evaluate this statement and support your statements with a real-life example 

Your response should be 250-300 words. Respond to two postings provided by your classmates.

Access control

 Research access control system and provide at least a 1000 word assessment of the system to discuss its pros and cons. 

Assignment

Discussion 1 (Chapter 10): There have been many books and opinion pieces written about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented?

Discussion 2 (Chapter 11): Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses.

Each Discussion should be 250-300 words.  

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.