Discussion

With the advent of ML/AI, what effect do you think this will have on the future of firewalls? What kinds of new implementation techniques do you think will emerge because of ML/AI?

physical security

 

Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.

Please make your post has a min 500-600 words in APA format with 2 references. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Data Structures & Algorithms Graphs

Assignment 5: Graphs

Family tree’s and genealogy software has become more and more prevalent in recent years. From the name you might expect that a family tree would be easily represented by a tree structure, but that is not the case! A more appropriate data structure to

represent a family tree would be a type of graph. Using the description of the family that accompanies this assignment, you must represent this family using a graph structure. The graph needs to be a weighted graph. The weights will constitute the types of

relationships, I recommend using some kind mapping between numbers and strings to represent the relationships. When adding family members to the graph, this can be done programmatically for the provided family members within the description file.

Additionally, I also want there to be an interface in which a user can create a new family member and add them to the tree. This can be a simple CLI where the user provides a name, gender, and age to create a person. Then another simple CLI where they select

which member of the family they want the original relationship to be with and what kind of relationship it should be. Finally, they can edit the family member using another CLI and selecting the family member they wish to edit, the operation they wish to

perform (edit name, edit age, edit relationship), and then add new relationship between family members which can call a function that you create in order to add the original relationship. Remember the DRY philosophy, where code can be modularized or made

into a function, it should be if you plan on using the logic again.

Finally, I want you to make data assertions within the FamilyTree class that enforce certain “rules” that exist in a typical human family. An example would be a person should not have any kind of relationship to itself (a person can not marry themselves, a person

can not be their own brother, sister, father, mother, etc.). There should be at least 3 data assertions. These should exists as part of the family tree, not as part of the graph.

As a hint, for a successful design: I would recommend using layers of abstraction. Your graph class is the backing structure to the family tree class. Your family tree should implement methods that interface with the graph class, i.e. add_family_member() should

call the constructor to create a node and then call a function within the graph class to add a node to the graph. Then using the relationships function parameter, you can add edges to the graph between the new nodes and the existing nodes. The family tree

should be what enforces what relationships can exist through the data assertions, the graph does not care about what relationships are made between family members. Your functions that the user would interface with would be greatly reduced compared to the

total number of methods within the classes themselves. The user should be able to add, remove, and modify family members and that’s about it. Therefore those should be your function calls.

Submission Goals

(120 pts.) Create a FamilyTree class that will represent a family tree for a given family.

The class should contain several types of relationships that commonly happen within a family (siblings, marriage, offspring, etc.)

(40 pts.) Programmatically add the family members to the graph as described by the accompanying family description file.

(40 pts.) Give data assertions to the FamilyTree class to enforce restrictions for basic family structure (at least 3); i.e A person can not marry themselves.

(40 pts.) Provide a simple CLI the enables users to add, remove, and edit family members.

* Note that there is a total of 240 points on the table here. The assignment is only worth 200 points. You have 40 points of optional goals.

Your

Disc

Complete the “Forensic Designs Assessments” Exercise located at the following link:

Data Representation(http://book.visualisingdata.com/chapter/6)

(1). FORENSIC DESIGN ASSESSMENTS

This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the data representation choices:

  1. Start by identifying all the charts and their types
  2. How suitable do you think the chart type choice(s) are to display the data? If they are not, what do you think they should have been?
  3. Are the marks and, especially, the attributes appropriately assigned and accurately portrayed?
  4. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  5. Are there any data values/statistics presented in table/raw form that maybe could have benefited from a more visual representation?

Cloud Security Myths.

 

Review in 500 words or more the video above called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested. 

essay

 

In a virtual world (VW) of massively multiplayer online role-playing games (MMORPGs), collaboration and communication are provided through the Internet between MMORPG-ready devices such as the Microsoft Xbox, and Sony PlayStation, and by using the Web browser. Gamers around the world can play against other gamers without seeing their opponent face-to-face. The Internet and MMORPG devices have become a social phenomenon. For example, a mobile game, called “Game of War” enables players to play against each other anywhere around the world. Other diversions include Second Life which isn’t really a game at all, but rather just that, another life people can live online through their online persona. 

Before you begin this assignment, engage in an online game or experience such as Game of War, Second Life, or Words with Friends, which has a phone app you can download free or play from your computer on the internet or even as a Facebook app.  Any game where you are playing against a live person over the web.  If you have difficulty finding an online multiplayer game, reach out to your instructor for guidance.

Write a paper with screen shots from your experience in which you complete the items below. Be sure to include what your choice was in the introduction paragraph. 

  1. Describe cognitive social phenomena that occur specifically to the context of the MMORPG that wouldn’t happen in a face-to-face checkers game.
  2. Compare and contrast the MMORPG user interaction environment to the face-to-face environment where a board game like Scrabble is being played. Next, identify whether or not the environment has an impact on the player’s ability to play Words With Friends in an online environment.
  3. Outline and describe the user interface requirements that a game designer needs to include in order to engage players in a MMORPG environment.
  4. Use at least (3) quality resources in this assignment. NOTE:Wikipedia and similar Websites do not qualify as quality resources
  5. Format your assignment according to the following formatting requirements:
    1. This course requires use of new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details.
    2. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    3. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.
    4. Include a reference page. Citations and references must follow SWS format. The reference page is not included in the required page length.

NOTE:  Although there is not a specific page length, you should fully explore and answer the questions asked.  Typically you’ll have two or three paragraphs with your main point supported by a few sentences of fact for each. The goal is to convince the reader that you have done your assigned reading and the additional research being asked. 100% original work is required. 

The specific course learning outcomes associated with this assignment are:

  • Compare and contrast the various cognitive models.
  • Construct evaluation techniques to the user experience and system usability in the design process.
  • Describe the differences in developing user interfaces for different application environments.
  • List the general principles used in the heuristic evaluation of a user interface design.
  • Use technology and information resources to research issues in human-computer interaction.
  • Write clearly and concisely about human-computer interaction topics using proper writing mechanics and technical style conventions.

Operational Excellence Discussio.

Discussion: This week we focus on the concept of the balanced scorecard.  Please note what it is and how organizations use balanced scorecards.  Note any alternative methods organizations use instead of the balanced scorecard and why they would use these methods over the balanced scorecard.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

D&L

 

Inspect 5 doors in your building with locks

Topic :Physical security