Assignment

 

1). Download and install the “R” Programming tool (CRAN) onto your computer. First install the “Basic” version of “R”, then (2) install the “R” Studio. (3). Download and install the MySQL plug-in for Excel onto your computer. (4). Download and install the Python programming tool onto your computer. Verify successful installation of all tools by attaching one screen shot of each that display your completion of each software installation. A total of  four screen shots (2 for “R”, 1 for MySQL, and 1 for Python) is expected. Save the screen shots as a MS Word document (*.docx).

Either click the “Write Submission” link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the “.docx” extension to the filename.). Also, please summarize in 1 -6 lines (in the Comment box) how the installation went for you. That is, what problems, if any, did you have and how were they solved?  What things went right for you during the installation?

Options Menu: Forum

global discussion7

 

Chapter 11 – Andringa (2015), stated that the combination of these phenomena leads to a formal definition – the Bureaucratic Dynamic – this is where the prevalence of coercive formalization scales with what the author refers to as “institutional ignorance” – a measure of how well workers understand the consequences of their own actions both within the organization as well as the wider society…

Q1: The author argue that most people may agree with the notion that “All human activities benefit from some form of formalization, and that formalization allows automating routine tasks, to agree on how to collaborate, determine when and how tasks should be executed, and when they are finished.” The author offers key reason(s) why procedures should not be changed too often.

  • what are those reasons? 
  • provide a brief narrative “why procedures should not be changed too often” to support your response,
  • provide substantive feedback to three of your colleagues’ DF work,
  • DO NOT Copy and Paste Responses Directly from the textbooks and any other digital Internet sources, it’s Verbatim!
  • 1.25 points earned for correctly addressing ALL of the above.

4403WK7B: Chapter Discussion Forum. Options Menu: Forum

Q2: Moore (2000) identifies that Public Value Management as an emerging new management paradigm that is not so much a response to an existing paradigm but a formulation of the role of nonprofits in modern society (Stoker 2006).  In view of both the authors, Moore (2000) and Stoker (2006), public value management is a succinctly formulated public value scorecard in which an organization should target to balance three components:  What are these components?  

  • identify and name the three components? 
  • provide a brief narrative for each to support your response,
  • provide substantive feedback to three of your colleagues’ DF work,
  • DO NOT Copy and Paste Responses Directly from the textbooks and any other digital Internet sources, it’s Verbatim!
  • 1.25 points earned for correctly addressing ALL of the above.

What are the factors that influence the selection of access control software and/or hardware? Discuss all aspects of access control systems.

What are the factors that influence the selection of access control software and/or hardware? Discuss all aspects of access control systems.

initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference.

BUILDING SIMPLE ALU

Prompt

In this project, you will design and build a simple CPU on Logisim and write programs that can run on it. If you haven’t yet, you can download Logisim by following this link: http://www.cburch.com/logisim/download.html

Your design will go through four phases. In the first phase, you will design and build the ALU using Logisim. In the second phase, you will design the instruction set that implements the instructions you designed in phase one. In the third phase, you will design and implement a control unit for this ALU using Logisim. By connecting the CU to the ALU, you will get a functional CPU. In phase four of the project, you will write assembly language programs for the CPU you built.

Phase One

Start by building an 8-bit ALU using Logisim. This ALU can implement 16 instructions on 8-bit operands. We would suggest the following minimum list of instructions:

· Arithmetic addition

· Increment

· Decrement

· Comparison (with 3 outputs: one for equals, one for less than and one for greater than)

· Logic bitwise Not

· Logic bitwise And

· Logic bitwise Or

· Register right logic shift

· Register left logic shift

In addition to these nine instructions, please suggest five more instructions that the ALU can implement for a total of 14 instructions (we are reserving 2 instructions for branching). Justify the importance of the five instructions you added in a Word doc to submitted as part of this assignment. Label these instructions as ‘Phase One.’

After you’ve suggested and justified your five suggested instructions, please build at least the nine above-mentioned operations as blocks in Logisim.

Phase Two

In phase two of the project, you are required to design the instruction set of the ALU/CPU as follows:

· Create the opcode table for the ALU by giving a binary code and a name for each instruction you built in Logisim in phase one.

· Decide how many operands you want your instructions to handle and justify your choice. We suggest either one operand with accumulator or two operands with the result stored in one of the input registers.

· In Logisim, add a multiplexer to the circuit you built in phase one that chooses one of the available operations. The simplest way to create this part of the CPU is to connect the outputs of the multiplexer to the inputs of AND arrays connected to the output of the operation blocks.

Please record your answer to phase two in the same Word doc and label it ‘Phase Two.’

Phase Three

In phase three, you are required to use Logisim to implement the control unit for at least the following three operations:

· addition

· logic bitwise AND

· right logic shift

In order to finish this phase, you need to add operand registers according to the decision you took for the number of operands in phase two and, if needed, a flag register.

Please record your answer to phase three in the same Word doc and label it ‘Phase Three.’

Phase Four

In order to be able to write assembly language for the CPU we need to add to instructions (without implementation):

· branch to an address (name it JMP)

· conditional branch to an address (name it CJMP and suppose that the jump takes place if the comparison operation result is ‘equals’)

Now, write the following programs using the assembly language you designed in the previous phases of the project as well as these two branching additional instructions:

· Write a program that adds two operands.

· Write a program that adds operands until the new value to be added is 0. You do not need to implement the input operations to modify the contents of the registers. Just assume that by the end of each iteration, the register content is modified.

· Write a program that increments by 2 the content of a register 10 times.

· Write a program that shifts the content of a register until the least significant bit is 0. Think of a way to stop shifting if the content of the register is 11111111 and add it to your program.

· Please record your programs in the same Word doc and label them under the section ‘Phase Four.’

Supply Chain Management

There are fundamental challenges in managing effective supply chains (those activities that largely affect a company’s COGS and working capital deployed).  The effective supply chain manager must recognize then lead the way through these challenges.  The best explanation of the challenges is:
A.  Trying to understand true Customer Expected Lead Time (CELT) and effort to make supply chains more responsive
B.  Trying to change production mindsets from push to pull while illuminating muda.
C.  Trying to make the purchase of milk more Make-to-Order
D.  Use techniques like postponement and vendor managed inventory to shift inventory holding responsibility from our balance sheet to another supply chain partner
E.  Identifying the adjectives that describe potential supply chain segments then implementing them throughout the company.

Security Architecture & design

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples.  include at least two references.

Minimum of 500 words

simple, no plagiarism, due by 11/01/2020 1:30 PM

One of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few seconds while the reputation of potential URLs is checked. Most of us have come to expect that websites are at the immediate tips of our fingers and that access and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service exists in the cloud, the challenge can be summed up as, “How can a reputation be securely retrieved without slowing Web access down so much as to create a poor user experience?” 

Digital signature algorithm ( sage tool)

 

Question:

Use Sage to solve the following problems. 

For this questions assume that we are using dsa with domain parameters:

p = 7,877,914,592,603,328,881

q = 44449

g = 2,860,021,798,868,462,661

Use these domain parameters to determine if the signatures are valid in parts (a)-(c)

  1. public key y = 3798043471854149631, hash value H = 59367, and signature (r,s) = (31019, 4047)
  2. public key y = 1829820126190370021, hash value H = 77241, and signature (r,s) = (24646, 43556)
  3. public key y = 4519088706115097514, hash value H = 48302, and signature (r,s) = (36283, 32514)

Perform a signing operation for the below parts (a)-(b)

  1. private key x = 8146, hash value H = 22655
  2. private key x = 1548, hash value H = 3278

Assignment

#1: What are the main reasons for the recent popularity of data mining? 

 #2: Discuss what an organization should consider before making a decision to purchase data mining software. 

#3:  What are the privacy issues with data mining? Do you think they are substantiated? 

 When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.