how digital transformation leaders in regard to artificial intelligence

This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity.  Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

  1. What is your definition of AI?  Please explain.
  2. What is your opinion of AI, is the technology currently available? Why or why not?
  3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.
  4. How is AI perceived as different in various industries and locations? Please explain.

Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

quetion

 

Security Breach Evaluation

Learning Objectives and Outcomes

  • Analyze the given case study on security breach.
  • Recommend controls to avoid an enterprise security breach.

Assignment Requirements

Read the text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.

unit 8

 

Directions

Part I: Complete Your Original Response to the Main Topic

The requirement of this activity for this module is for every student to solve one programming problem from the book, and post the source code in the discussion board for further analysis and discussion. In order to have more diversity of problems from the chapter, each student will select a problem number using the process described below.

Selecting the Problem Number to Use

Consider the following rules in calculating the problem number to solve:

  • Divide your student ID by 20, consider the remainder and increment it by 1. The result you obtain represents the number of the programming exercise you will solve for this online discussion.

Posting the Solution

Once you determine the problem number, complete the solution to that problem. When you are satisfied with your solution, click the Reply link below to post in this discussion forum.

  • In the first line of your post, your should add the chapter number, problem number, and page number of your problem.
  • Your posting must include the source code along with explanations of how you have solved the problem.  

2 papers

 

Choose one of the following alternative techniques, summarize it and provide examples of how your selected technique is used, and how you would apply it. Minimum page count for this assignment is two (2). Make sure that this assignment is in APA format.   

Artificial neural networks
Deep learning
Support vector machines
Ensemble methods

password standard

 

Write a password standard for CSI documenting your password recommendations.  Your paper should look like a real policy document and not an academic paper.

At the end of the standard, cite one reference for your recommendations.  Remember in this exercise that CSI appears to be challenging the old-school 8-character complex password rule.  If you wish to challenge that rule yourself, or reinforce that rule and continue to use it, you need to supply at least one reference, and more would make for a more effective argument.  Your citation does not need to be in any formal citation style.  Ensure that your citation is good enough to find the reference.

This must be an original work.  Do not rely on publicly available templates to fill in.  Because this is a concise and focused paper, some matching will be detected by the SafeAssign tool.  It is common for subject headers to match previous submissions. You may get a match score in the 30% range.  Don’t worry about that.  I’ll be looking for original work in the body of the paper.  Bottom line – you’re a creator, not an editor.

Read examples of password standards online.  Some organizations may call them password policies, which is confusing, but that ‘policy’ will focus on specifics on how to put a proper password together.  You also will find some authoritative recommendations from NIST (National Institute of Standards and Technology).  Happy Googling.

Monte Carlo Method

 

Assignment Content

  1. The organization you chose in Week 1 is hosting a National Convention for all the executive staff members from all 25 international locations next week. 

    The CIO requests your team of Risk Management Analyst to create and deliver the presentation on the topic, “Deterministic versus Probabilistic Risk in IT Risk Management.” As the representative of your team, you will create and deliver the presentation with an Executive Summary at one of the Executive Round Table Meetings at the convention. Additionally, the CIO stressed you use creativity to make the presentation as interesting as possible.

    Research information about your chosen organization to complete this week’s assignment.

    Part A:
    Create a media-rich, 10-slide (does not include title or reference pages) Microsoft® PowerPoint®  (with Speaker Notes) presentation. Include the following:

    • Monte Carlo planning analyses
    • Building and running Monte Carlo models
    • The deterministic risk assessment method 
    • The probabilistic risk assessment method 
    • How does the NIST risk management framework 3-tiers ensure information security (NIST SP 800-53, revision 4)? 
    • How are data and information systems categorized? 
    • Do not use research quotes or acronyms. You must use your own words.
    • Part B: 
      Create a 1- to 2-page(does not include title or reference pages) Microsoft® Word Executive Summary on this presentation. Include the following:
    • Goals and objectives of the presentation in summary form
    • Adequate references to support your findings, information, and opinions
    • Note: Media-rich presentations should include multimedia such as graphics, charts, pictures, drawings, video clips, or audio.

      Include APA-formatted citations when necessary.

       

Swift Programming

**The programming needs to be done in Swift language. . The program is about implementing an app that shows the biography of each character of the game.**

IT206 Design and analysis of Algorithms

Assignment Question :   Design and write an algorithm to find all the common elements in two sorted lists of numbers. For example, for the lists 2, 5, 5, 5 and 2, 2, 3, 5, 5, 7, the output should be 2, 5, 5. What is the maximum number of comparisons your algorithm makes if the lengths of the two given lists are m and n, respectively?