Business Intelligence – Discuss the difficulties in measuring the intelligence of machines.

Please complete Chapter 2 – discussion question #1 & exercises 4, 5, and 15 (limit to one page of analysis for question 15)

Discussion question 1 – Discuss the difficulties in measuring the intelligence of machines. 

Exercise 4 – In 2017, McKinsey & Company created a five-part video
titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed.
 

Exercise 5 – Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report. 

Exercise 15 – Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recognition product. 

discussion online

 

The article on IRB this week discusses broad consent under the revised Common Rule. When you are doing any sort of research you are going to need to have your research plan approved by the University’s institutional review board or IRB. If you have never heard of this term before, please take a look online and find a brief summary of what it is about, before you read the article.  

Please answer the following questions in your main post:

  • What are the main issues that the article addresses?
  • What is the Common Rule?
  • How is this issue related to information systems and digital privacy?

Research Paper

Topic: Preferences for car choice in the US (Dataset as attached)

Resource File: https://s3.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/3314094?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27R_Preferences%2520for%2520car%2520choice%2520in%2520the%2520United%2520States.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200706T150000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20200706%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=08382652fd425d380da1395c5ed0d1e0de14e7008b98bc4dc678098f9e94d102

Requirements:

Must be APA format

Title page

Document body with citations

Reference Page

Section 1: Topic background

Section 2: Data Analysis(R studio-Rlanguage-Library:Mosaic)

Section 3: Data Visulizations(R studio-Rlanguage-Library:Mosaic)

Section 4: Discuss Findings(Citations are required)

Section 5: Reference List (8 references 4 must be peer-reviewed articles)

Firewall technologies

Question.  Discuss the current methodologies used to secure wired or wireless networks via current Firewall technologies and the potential exposures that currently exist 

Answer should be in apa format. Citations to reference material should be called in texts and references attached in the end. 300 minimum word limit

cloud myths

 

Review in 500 words or more the video above called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format.

SyncSession Assignment!.

 

In order to maximize the time we have in the first syncSession please complete the following activities prior to the meeting time:

Reading Assignment:

  • Trochim/Donnelly: Ch 1-1d,1-1c,1-1f, and 3-2

Assignment:

A document titled “Evaluating Data Elements” is available to you in Document Sharing. This document provides a summary of a dissertation study conducted by an alumnus of UoF. Review the summary of the research and the adaptation of the survey instrument that was developed for the study.

For this SyncSession assignment, you will assess the data collection instrument. First, select one of the three research questions identified. Using the survey map provided, identify the data being collected to measure the variables identified for that research question. For each variable associated with the research question, summarize the information about the data being collected in the following table:

Construct Variable                 Variable                              Variable                     Data Type 

Example                                 Instructor Ranking              Dependent              Ordinal

Student Satisfaction    

       After summarizing this information, write a short assessment (3-4 pages) answering the following questions about validity and reliability:

  • Do the questions fit the variables being studied?
  • Do the options provide appropriate measures of the variables?
  • Can the options skew the responses?
  • Does the instrument accurately measure the variables?
  • Will the instrument yield the same results if used again under the same circumstances?
Assignment

intro to sql data

 

  • Exercise 1: HistogramExercise 1 in the text: You may use any spreadsheet program. Submit a Word document with a screenshot from your computer showing the histogram. Comment your images with  a sentence or so of description in your  own words  of what you are doing.   Please make sure that your images are large enough and high  enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentExecise 2: Calculating QuartilesExercise 2 from the text: Use any spreadsheet program. Submit a Word document showing a screen shot from your computer with the quartiles underlined or highlighted.  Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentExercise 3: Central TendencyExercise 3: Use any spreadsheet program. Submit a Word document with a screen shot from your computer showing the highlighted median.  Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentExercise 4: DispersionExercise 4: Use any spreadsheet program. Using the data provided in the text, submit a Word document with a screen shot from your computer highlighting the range, standard deviation, IQR, and outliers of Add-on Sales.  Comment your images so the viewer knows what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results.
  • AssignmentExercise 5: Pearson CorrelationExercise 5: Use any spreadsheet program. Using the data provided in the text, create a scatter plot and calculate the Pearson Correlation Coefficient. Comment your images with  a sentence or so of description in your  own words  of what you are doing.   Please make sure that your images are large enough and high  enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentActivity 2: Exploring Sales DataThere is no activity 1.Activity 2: Use the attached dealerships.csv file and any spreadsheet program. Submit a Word document with a screen shot from your computer of your solutions to questions 2 – 7 in the text. Highlight your results.  Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results.  dealerships.csv

Mid term question

your ceo calls you into her office to discuss the recent drop in sales she would like your recommendation regarding how it might be used to generate an increase in sales  identity and discuss it application and technology that you might recommended to a small  company to help it survive and succeed in challenging economic times ? you need to cite from the required textbooks , please include page numbers

Comparing a Security Strategic Plan to a Security Policy and Aligning to Security Controls

 

The information security strategic plan and security policies are strongly interrelated within an organization’s information security program. The security plan and security policies will drive the foundation and selection of security controls to be implemented within the organization.

Part 1

Write a 1- to 2-page summary of the comparison chart of strategic plans and security policies you completed in this week’s Learning Team assignment.

Part 2

Review the control families described in this week’s reading, NIST SP 800-53a Revision 4, Assessing Security and Privacy Controls for Federal Information Systems and Organizations.

Review the controls from this week’s reading, CIS Controls V7.1.

Develop a 2- to 3-page matrix using Aligning Security Controls to NIST Security Controls Matrix Template that accurately maps CIS controls to NIST security control families. Note that some CIS controls may map to multiple NIST control families.

Cite all sources using APA guidelines.

Use the team assignment attachment for part 1. Use the matrix templete for part 2.