Artificial Intelligence

Question Description

Artificial Intelligence

Exercises:

2.5: If the current target location were to be moved, the middle layer of Example 2.5 travels to the original position of that target and does not try to go to the new position. Change the controller so that the robot can adapt to targets moving.

2.6: The current controller visits the locations in the to_do list sequentially.

(a) Change the controller so that it is opportunistic; when it selects the next location to visit, it selects the location that is closest to its current position. It should still visit all the locations.

(b) Give one example of an environment in which the new controller visits all the locations in fewer time steps than the original controller.

(c) Give one example of an environment in which the original controller visits all the locations in fewer time steps than the modified controller.

(d) Change the controller so that, at every step, the agent heads toward whichever target location is closest to its current position.

(e) Can the controller from part (d) get stuck and never reach a target in an example where the original controller will work? Either give an example in which it gets stuck and explain why it cannot find a solution, or explain why it gets to a goal whenever the original can.

2.9: Suppose you have a new job and must build a controller for an intelligent robot. You tell your bosses that you just have to implement a command function and a state transition function. They are very skeptical. Why these functions? Why only these? Explain why a controller requires a command function and a state transition function, but not other functions. Use proper English. Be concise

Textbook: https://artint.info/2e/html/ArtInt2e.Ch2.html for reference.

Discussion Question and Case Study in full APA Format

Question Description

Note: Discussion questions and Paper are independent tasks. Please provide them in separate documents.

1. Discussion Questions:

Answer the below discussion questions each in 1 full page and list out references.

a. Servant leadership emphasizes being able to serve and lead. In your opinion, is this contradictory or doable?

b. Describe the different generations that make up what some people refer to as “generational diversity” and identify their unique characteristic. What are the implications of generational diversity on effective leadership?

2. Case Study in full APA format:

Address the seven questions associated with the chapter nine Opening Case Application (Oprah Winfrey and OWN) on page 320 in a four to five page paper (excluding title, abstract, and reference pages). Completely review the company website noted in the case. Assignment should be APA compliance. (File Attached)

Please use this strategy when you analyze a case:

  1. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.
  5. Conclusion (every paper should end with a strong conclusion or summary)

Paper Writing Requirements:

  • 4–5 pages in length (excluding cover page, abstract, and reference list)
  • Use APA format to complete the paper.
  • Include proper citations and references in the paper
  • Use the page break feature
  • No Plagiarism

Discussion -InfoTech in a Global Market

Question Description

Chapter 15 – From the week’s chapter reading, we learn from the author’s case studies that, despite the alleged importance of scientific advice in the policy-making process, its evident that scientific results are often not used. Why? The authors proposed a science-policy interface that would be realized by the inclusion of information visualization in the policy analysis process. That way, the gap between both fields can be addressed based on the current challenges of science-policy interfaces with visualizations.

Q1: According to Shneiderman and Bederson (2003), information visualization emerged from research in human-computer interaction, computer science, graphics, visual design, psychology, and business. With this revelation in mind, identify, and discuss the benefits?

Chapter 16 – Following the chapter reading, the authors assert that the twentieth century is considered as the century of population explosion and fossil fuels burning, environmental policies and the transition to effective use of renewable energy sources as a priority with a strategic focus on specific countries around the world. In addition, this move has created several different projects whose main focus is to formulate policies associated with climate change and energy governance. Many of the policies and projects identified aim to support the energy sources switching between fuels like fossils and nuclear power to renewables like solar, wind, and or water. Specifically, the chapter provides the foundations of policy implementation, and methods as well investigations of five policy implementation case studies through a comparative analysis.

Q2: Looking further into the chapter, theoretical grounds of policy implementation, Buse et al., (2012) argue that policy implementation is the execution of a formulated policy – turning theory into practice. When turning theory into practice, the authors stated that it was common for certain observations. What are those observations? Briefly identify, and provide a brief discussion for each observation.

what are the compliance considerations during information security policy making?

Question Description

Question is at last

Contingency plans are measures taken by organizations to prepare and deal with unusual events if they occur. These events are characterized by adverse effects that have the potential to hinder the operations of an organization. Contingency planning creates a blueprint of how the organization will mitigate the effects of a contingency regardless of the size of the organization (Flowerday & Tuyikeze, 2016). Information security policy forms an integral part of developing contingency plans in an organization. It provides a guideline with instructions, special considerations, and recommendations that provide an organization with ways to recover its data and information services in the event of a contingency.

The information security policy provides clear and concise steps to be followed as part of the protective measures to mitigate a contingency. It enhances the protection of data and organization assets in case a disaster or a data security breach occurs (Flowerday & Tuyikeze, 2016). The policy also gives an organization appropriate approaches to undertake when conducting a root cause analysis of a disaster or security breach (Whitman, Mattord, & Green, 2013). In this regard, the information security policy provides considerations on the collection and preservation of evidence.

The information security policy also plays a vital role in identifying the essential information systems, which are the most vulnerable. On the same note, the policy identifies the kind of risks that pose a threat to the organization’s data and information system. To prevent and decrease the impact of contingencies, the policy provides a number of particular measures and assessments that should be implemented to protect the information system (Whitman, Mattord, & Green, 2013). Importantly, the above measures should be compliant with the general organization’s policy.

A question that still remains is; what are the compliance considerations during information security policy making?

Change Request Process & Documentation

Question Description

Project Objectives Checklist

  1. Enhance the project documentation
  2. Create a final project signature page
  3. Write a typical change request scenario
  4. Write a professional change request procedure
  5. Submit the module use-case document to the course Dropbox for grading

During these project objectives, you will work with project scope and handling changes to prevent catastrophic failure to the project. The project scope is usually defines as the use-case documentation is created and approved. The project manager should finally get signatures from the other managers when everyone agrees on the final draft of the project. The final draft is the scope and it will typically not change unless there is a change request.

  1. At the bottom of the project use-case documentation, add a signature page for all required manager signatures. Make sure the signature page looks and feels professional which should include the date of when a manager signed the use-case documentation for approval. You have more objectives in the course to build and integrate into your documentation but this should always be the last page of the document.
  2. Next document a typical scenario that might actually be a good reason to change the scope of a project. For instance, the documentation might not include form validation controls. As the users are testing, the validation is always necessary to keep the data clean in the database. Create your own scenario that could change the scope of the project and would cause the managers to agree and accept the change request.
  3. Document the change request procedure. This professional procedure would be used in a business when a tester found an issue that requires a project change and the requestor would need to follow through each step before the change would even be considered. Document the procedure in a chronological order as if each step was a checklist.

Port Scanning and Host Control

Question Description

Please read through this announcement carefully and completely. These are the instructions and requirements for both the paper and presentation.

PAPER

For your chosen or assigned topic, write an 8-page paper that must include all of the following:

  • Discuss the strengths/weakness of the topic and possible improvements.
  • Discuss what you have learned from this assignment and how you will apply it moving forward in your career.
  • Use at least one NIST resource as a reference.
  • Use a minimum of 10 peer-reviewed resources.
  • APA format; Times New Roman 12-point font, Double-spaced.

The title page and reference page do not count towards your 8-page minimum.

PRESENTATION

  • A 5-minute class presentation of your paper. If you go longer than 6 minutes you will be stopped.
  • A minimum of 10 slides.
  • The title slide and reference slide do not count towards your 10-slide minimum.
  • You MUST bring in your own flash drive to class residency weekend
  1. Required Slide Elements:
  • A title for each slide
  • A unified theme
  • Subtle slide animations appropriate for a business/academic environment
  • At least one SmartArt diagram
  • Reference slide(s) using APA format. Place this at the end of your presentation.
  1. Proofread your slides carefully for errors in spelling and grammar. Overall appearance counts. Consider how you can go beyond the project instructions to create an effective and visually pleasing presentation.

Using APA in a PowerPoint presentation works much the same way as in a research paper.

  • “Direct quotes” (Author/Source Material, Year)
  • Paraphrase (Author/Source Material, Year)
  • Clip Art – no citation needed
  • Personal photos – no citation needed
  • Images from the Web – assume that all images not your own are copyrighted and should receive credit with a full citation as the caption for the image.

Example: Figure1. Threat Analysis Group (TAG, 2018) Retrieved from www.website.com

  • References Slide(s): Provide complete citations as you would any research paper. Include all sources used in your slides or mentioned orally.

questions about a case study related to management information system

Question Description

Case Study 1: Should a Computer Grade Your Essays?

1. Identify the kinds of systems described in this case.

2. What are the benefits of automated essay grading? What are the drawbacks?

3. What management, organization, and technology factor should be considered when deciding whether to use AES?

Case Study 2: American Water Keeps Data Flowing

1. How did implementing a data warehouse help American Water move toward a more centralized organization?

2. Give some examples of problems that would have occurred at American Water if its data were not “clean”?

3. How did American Water’s data warehouse improve operations and management decision making?

Case Study 3: Driving Ari Fleet Management with Real-Time Analytics

1. Why was data management so problematic at ARI?

2. Describe ARI’s earlier capabilities for data analysis and reporting and their impact on the business.

3. Was SAP HANA a good solution for ARI? Why or why not?

4. Describe the changes in the business as a result of adopting HANA.

Case Study 4: Zappos

1. Define SCM and how it can benefit Zappos.

2. Explain CRM and why Zappos would benefit from the implementation of a CRM system.

3. Demonstrate why Zappos would need to implement SCM, CRM, and ERP for a connected corporation.

4. Analyze the merger between Zappos and Amazon and assess potential issues for Zappos customers.

5. Propose a plan for how Zappos can use Amazon’s supply chain to increase sales and customer satisfaction.

**Case study in attachments

Solution instructions:

  • Each answer must have at least 100 words
  • • The ‘answers’ to the questions are best formulated by reviewing the case and the reading materials up
  • Please attach the references used for the solution
  • Use APA Style for references
  • Plagiarism is strictly prohibited
  • Arrange the answers directly after each question

Midterm Question Answer

Question Description

This is 4 small research questions, it is not that hard but I don’t have the time for it right now and it is due in 3 hour.

Question 1 and 2 is related. Question 3 and 4 is related.

This is not that of a hard question thats why I expect a good answer please.

Find the parts from Amazon.com or Bestbuy or any other AMERICAN website.

1) You are to recommend a PC upgrade for a client. It is required for you to research each of the following components in the chart from 3 different vendors and based on your thorough research fill in the following chart for comparison. Assume that you have a full tower case, monitor, keyboard and a mouse available. Your total budget is $800 to $1500. (25 points)

CPU:

Type/Name

Cost

Special features

Vendor 1 (Intel)

Vendor 2 (AMD)

Motherboard:

Type/Name

Cost

Special features

Vendor 1

Vendor 2

Vendor 3

DRAM:

Type/Name/Capacity

Cost

Special features

Vendor 1

Vendor 2

Vendor 3

Graphic Card:

Type/Name/Capacity

Cost

Special features

Vendor 1

Vendor 2

Vendor 3

2) In the following chart. List your choice of components and your reasoning why you made that choice. Make sure that all components are compatible. (15 points)

Type/Name/Capacity

Cost

Justification

CPU

Motherboard

DRAM

Graphic Card

Total cost

———————————————————————————————————————————————————————-

3) You are to recommend a purchase of a Laptop a client. It is required that you research each Laptop in the chart from 4 different vendors and based on your thorough research fill in the following chart for comparison. Your total budget is $1200 to $2000. The Laptop must come with an operating system and an MS office software (or equivalents) installed. In the features section, you need to indicate the type of ports, hard drive, memory etc., the Laptop comes with. (20 points)

Type/Name

Cost

Features

Vendor 1

Vendor 2

Vendor 3

Vendor 4

4) Based on your Laptop research, fill in your choice and justifications: (10 points)

Type/Name

Cost

Justification

Vendor

Job Posting Search

Question Description

Now that you have identified a place to start with your career, take some time to figure out what it takes to get started in that area.

Please go out and identify three different positions open that you would be excited or willing to apply for at some point in your life.

Please keep track of the company web sites you visit, the job search engines you used, and maintain your documentation in a place you can find later.

• (10 points) Describe a role or position you would like to have with an organization that allows you to do the things you want to do.
• (3 points each) Name two companies that employ people doing what you want to do. These companies should be active in the area you are excited about. List the company size, location, and annual revenue.
• (4 points) Describe one company or organization you would not like to work at and explain why.
• (10 points) Describe a job you would like to apply for right now, before you finish college. List starting salary, required skills, and where you need to be to do it. Cite a link to the job posting.
• (10 points) Describe a job you would like to apply for when you graduate from college. List starting salary, required skills, and where you need to be to do it. Cite a link to the job posting.

• (10 points) Describe a job you would like to apply for later in your career, perhaps 5-10 years after graduation. List starting salary, required skills, and where you need to be to do it. Cite a link to the job posting

see the file i did, need to modify and add same

chapter 8 and 9

Question Description

Q1:

Chapter Eight (8): Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy, IG is perhaps one of the functional areas that impact legal functions most. Failure to meet them could be literally put an organization out of business or land executives in prison. Privacy, security, records management, information technology (IT), and business management functions are very important. However, the most significant aspect of all of these functions relates to legality and regulatory compliance from a critical perspective.

Q1: When we take a close look at the author’s point of view, under the Federal Rules of Civil Procedures (FRCP) amendments dating back to 1938 there has been governance and the discovery of evidence in lawsuits and other civil cases. Please name and briefly discuss the three (3) reasons why corporations must proactively manage the e-discovery process?

Q2: Chapter Nine (9): Information Governance (IG) and Records and Information Management Functions. From the Chapter, we have learned from that Records Management (RM) is a key impact area of IG – so much that in the RM space, IG is often thought of as synonymous with or a single superset of RM. From that perspective, the International Organization for Standardization (ISO) defined business records as “information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations or in the transaction in the form of records.”

Q2: To further enhance our knowledge and understanding of RM, ISO provided a more refined definition of RM to a granular level as “[the] field of management responsible for the efficient and systematic control of what…? Identify and complete the missing phrase to directly complete the granular definition?