Discussion 13

Adjust your audio

This is a narrated slide show. Please adjust your audio so you can hear the lecture.

If you have problems hearing the narration on any slide show please let me know.

 

1

© 2016 John Wiley & Sons, Inc.

Chapter 12 Knowledge Management, Business Intelligence, and Analytics

2

 

Opening Case: Netflix

What gave Netflix assurance that House of Cards would be a success?

What gives Netflix a competitive advantage?

© 2016 John Wiley & Sons, Inc.

3

Data from 33 million people provided strong evidence that the British version was very popular and Kevin Spacey was also a popular actor

Again, data from millions of users, showing what they watch, when they pause, when they rewind, etc. Patterns emerge that speak volumes about preferences. Their analytics algorithms provide better data than focus groups (and in real time).

3

More Real World Examples

Caesar’s and Capital One both collect and analyze customer data.

Result: They can determine who are the most profitable customers and then follow up with them.

Caesar’s: frequent gamblers

Capital One: charge a lot and pay off slowly

They provide products that would appeal to the profitable customers.

© 2016 John Wiley & Sons, Inc.

4

 

4

A Real World Example from Sports

Oakland As and Boston Red Sox baseball teams

Crunched the numbers on the potential players, such as on-base percentage

Others who did not do the analysis failed to recognize the talent

© 2016 John Wiley & Sons, Inc.

5

 

5

Five Ways Data Analytics can Help an Organization (McKinsey and Co.)

Making data more transparent and usable more quickly

Exposing variability and boosting performance

Tailoring products and services

Improving decision-making

Improving products

© 2016 John Wiley & Sons, Inc.

6

Terminology

Knowledge management: The processes needed to generate, capture, codify and transfer knowledge across the organization to achieve competitive advantage

Business intelligence: The set of technologies and processes that use data to understand and analyze business performance

Business analytics: The use of quantitative and predictive models, algorithms, and evidence-based management to drive decisions

© 2016 John Wiley & Sons, Inc.

7

Data, Information, and Knowledge (reprise)

© 2016 John Wiley & Sons, Inc.

8

8

 

The Value of Managing Knowledge

Value Sources of Value
Sharing best practices Avoid reinventing the wheel Build on valuable work and expertise
Sustainable competitive advantage Shorten innovation life cycle Promote long term results and returns
Managing overload Filter data to find relevant knowledge Organize and store for easy retrieval
Rapid change Build on/customize previous work for agility Streamline and build dynamic processes Quick response to changes
Embedded knowledge from products Smart products can gather information Blur distinction between manufacturing/service Add value to products
Globalization Decrease cycle times by sharing knowledge globally Manage global competitive pressures Adapt to local conditions
Insurance for downsizing Protect against loss of knowledge when departures occur Provide portability for workers who change roles Reduce time to acquire knowledge

© 2016 John Wiley & Sons, Inc.

9

Dimensions of Knowledge

 

 

Explicit

Teachable

Articulable

Observable in use

Scripted

Simple

Documented

Tacit

Not teachable

Not articulable

Not observable

Rich

Complex

Undocumented

Examples:

Estimating work

Deciding best action

Examples:

Explicit steps

Procedure manuals

© 2016 John Wiley & Sons, Inc.

10

10

 

Four Modes of Knowledge Conversion (and examples)

 

Transferring by mentoring, apprenticeship

 

Transferring by models, metaphors

 

Learning by doing; studying manuals

 

Obtaining and following manuals

© 2016 John Wiley & Sons, Inc.

11

Knowledge Management – Four Processes

Generate – discover “new” knowledge

Capture – scan, organize, and package it

Codify – represent it for easy access and transfer (even as simple as using hash tags to create a folksonomy)

Transfer – transmit it from one person to another to absorb it

© 2016 John Wiley & Sons, Inc.

12

12

 

Measures of KM Project Success

Example of specific benefits of a KM project:

Enhanced effectiveness

Revenue generated from extant knowledge assets

Increased value of extant products and services

Increased organizational adaptability

More efficient re-use of knowledge assets

Reduced costs

Reduced cycle time

© 2016 John Wiley & Sons, Inc.

13

13

 

Components of Business Analytics

Component Definition Example
Data Sources Data streams and repositories Data warehouses; weather data
Software Tools Applications and processes for statistical analysis, forecasting, predictive modeling, and optimization Data mining process; forecasting software package
Data-Driven Environment Organizational environment that creates and sustains the use of analytics tools Reward system that encourages the use of the analytics tools; willingness to test or experiment
Skilled Workforce Workforce that has the training, experience, and capability to use the analytics tools Data scientists, chief data officers, chief analytics officers, analysts, etc. Netflix, Caesars and Capital One have these skills

© 2016 John Wiley & Sons, Inc.

14

 

14

Data Sources for Analytics

Structured (customers, weather patterns) or unstructured (Tweets, YouTube videos)

Internal or external

Data warehouses full of a variety of information

Real-time information such as stock market prices

 

© 2016 John Wiley & Sons, Inc.

15

Data Mining

Combing through massive amounts of customer data, usually focused on:

Buying patterns/habits (for cross-selling)

Preferences (to help identify new products/ features/enhancements to products)

Unusual purchases (spotting theft)

It also identifies previously unknown relationships among data.

Complex statistics can uncover clusters on many dimensions not known previously

(e.g., People who like movie x also like movie y)

© 2016 John Wiley & Sons, Inc.

16

Four Categories of Data Mining Tools

Statistical analysis: Answers questions such as “Why is this happening?”

Forecasting/Extrapolation: Answers questions such as “What if these trends continue?”

Predictive modeling: Answers questions such as “What will happen next?”

Optimization: Answers questions such as “What is the best that can happen?”

 

© 2016 John Wiley & Sons, Inc.

17

How to be Successful

Achieve a data driven culture

Develop skills for data mining

Use a Chief Analytics Officer (CAO) or Chief Data Officer (CDO)

Shoot for high maturity level (see next slide)

© 2016 John Wiley & Sons, Inc.

18

Level Description Source of Business Value
1 – Reporting What happened? Reduce costs of summarizing, printing
2 – Analyzing Why did it happen? Understanding root causes
3 – Describing What is happening now Real-time understanding & corrective action
4 – Predicting What will happen? Can take best action
5 – Prescribing How should we respond? Dynamic correction

Five Maturity Levels of Analytical Capabilities

© 2016 John Wiley & Sons, Inc.

19

BI and Competitive Advantage

There is a very large amount of data in databases.

Big data: techniques and technologies that make it economical to deal with very large datasets at the extreme end of the scale: e.g., 1021 data items

Large datasets can uncover potential trends and causal issues

Specialized computers and tools are needed to mine the data.

Big data emerged because of the rich, unstructured data streams that are created by social IT.

 

© 2016 John Wiley & Sons, Inc.

20

Practical Example

Asthma outbreaks can be predicted by U. of Arizona researchers with 70% accuracy

They examine tweets and Google searches for words and phrases like

“wheezing” “sneezing” “inhaler” “can’t breathe”

Relatively rare words (1% of tweets) but 15,000/day

They examine the context of the words:

“It was so romantic I couldn’t catch my breath” vs

“After a run I couldn’t catch my breath”

Helps hospitals make work scheduling decisions

© 2016 John Wiley & Sons, Inc.

21

Sentiment Analysis

Can analyze tweets and Facebook likes for

Real-time customer reactions to products

Spotting trends in reactions

Useful for politicians, advertisers, software versions, sales opportunities

 

 

© 2016 John Wiley & Sons, Inc.

22

Google Analytics and Salesforce.com

Listening to the community: Identifying and monitoring all conversations in the social Web on a particular topic or brand.

Learning who is in the community: Identifying demographics such as age, gender, location, and other trends to foster closer relationships.

Engaging people in the community: Communicating directly with customers on social platforms such as Facebook, YouTube, LinkedIn, and Twitter using a single app.

Tracking what is being said: Measuring and tracking demographics, conversations, sentiment, status, and customer voice using a dashboard and other reporting tools.

Building an audience: Using algorithms to analyze data from internal and external sources to understand customer attributes, behaviors, and profiles, then to find new similar customers

© 2016 John Wiley & Sons, Inc.

23

Google Analytics

Web site testing and optimizing: Understanding traffic to Web sites and optimizing a site’s content and design for increasing traffic.

Search optimization: Understanding how Google sees an organization’s Web site, how other sites link to it, and how specific search queries drive traffic to it.

Search term interest and insights: Understanding interests in particular search terms globally, as well as regionally, top searches for similar terms, and popularity over time.

Advertising support and management: Identifying the best ways to spend advertising resources for online media.

© 2016 John Wiley & Sons, Inc.

24

Internet of Things (IoT)

Much big data comes from IoT

Sensor data in products can allow the products to:

Call for service (elevators, heart monitors)

Parallel park, identify location/speed (cars)

Alert you to the age of food (refrigerator)

Waters the lawn when soil is dry (sprinklers)

Self-driving cars find best route (Google)

© 2016 John Wiley & Sons, Inc.

25

Intellectual Capital vs Intellectual Property

Intellectual Capital: the process for managing knowledge

Intellectual Property: the outputs; the desired product for the process

Intellectual Property rights differ remarkably by country

© 2016 John Wiley & Sons, Inc.

26

Closing Caveats

These are emerging concepts and disciplines

Sometimes knowledge should remain hidden (tacit) for protection

We should remain focused on future events, not just look over the past

A supportive culture is needed in a firm to enable effective KM and BI

 

© 2016 John Wiley & Sons, Inc.

27

Summary

After you have listened to this lecture and read Chapter 12 of your text

Go to Discussion Board 13 and answer the discussion prompt

Finally complete Quiz 12

 

28

© 2016 John Wiley & Sons, Inc.

 

28

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

3-F Method

Analysis on the Demand of Top Talent Introduction in Big Data and Cloud Computing Field in China

Based on 3-F Method Zhao Linjia, Huang Yuanxi, Wang Yinqiu, Liu Jia

National Academy of Innovation Strategy, China Association for Science and Technology, Beijing, P.R.China

Abstract—Big data and cloud computing, which can help China to implement innovation-driven development strategy and promote industrial transformation and upgrading, is a new and emerging industrial field in China. Educated, productive and healthy workforces are necessary factor to develop big data and cloud computing industry, especially top talents are essential. Therefore, a three-step method named 3-F has been introduced to help describing the distribution of top talents globally and making decision whether they are needed in China. The 3-F method relies on calculating the brain gain index to analysis the top talent introduction demand of a country. Firstly, Focus on the high-frequency keywords of a specific field by retrieving the highly cited papers. Secondly, using those keywords to Find out the top talents of this specific field in the Web of Science. Finally, Figure out the brain gain index to estimate whether a country need to introduce top talents of a specific field abroad. The result showed that the brain gain index value of China’s big data and cloud computing field was 2.61, which means China need to introduce top talents abroad. Besides P. R. China, those top talents mainly distributed in the United States, the United Kingdom, Germany, Netherlands and France.

I. INTRODUCTION Big data and cloud computing is a new and emerging

industrial field[1], and increasing widely used in China[2-4]. Talents’ experience is a source of technological mastery[5], essentially for developing and using big data technologies. Most European states consider the immigration of foreign workers as an important factor to decelerate the decline of national workforces[6]. Lots of universities and research institutes have set up undergraduate and/or postgraduate courses on data analytics for cultivating talents[7]. EMC corporation think that vision, talent, and technology are necessary elements to providing solutions to big data management and analysis, insuring the big data success[8].

Bibliometrics research has appeared as early as 1917[9], and has been proved an effective method for assessing or identifying talents. Based on analyses of publication volume, journals and their impact factors, most cited articles and authors, preferred methods, and represented countries, Gallardo-Gallardo et. al[10] assess whether talent management should be approached as an embryonic, growth, or mature phenomenon.

In this paper, we intend to analysis whether China need to introduce top talents in the field of big data and cloud computing by using bibliometrics. In section 2, the 3-F method

for top talent introduction demand analysis will be discussed. In section 3, we will analysis the demand of top talent introduction in big data and cloud computing field in China.

II. METHOD In general, metering indicators contain the most productive

authors, journals, institutions, and countries, and the collaboration networks between authors and institutions[11, 12]. Based on the commonly used bibliometrics method, 3-F method for top talent introduction demand analysis is proposed. 3-F method has three steps:

Firstly, searching the literature database and forming a high-impact literature collection in a specific field. Focusing on the high-frequency keywords in the high-impact literature collection by using the text analysis method as the research hotspots. Just to be clear, the high-impact literature refers to the journal literature whose number of cited papers ranked in the top 1% in the same discipline and in the same year.

Secondly, retrieving those keywords in the Web of Science to find out where those top talents of this specific field are. Find the top talents by collected the information about talents’ country distribution, the institutions distribution and so on through the high-impact literature collection. Among them, the top talent refers to the first author or the communication author of the high-impact literatures.

Finlly, Figure out the brain gain index to determine the top talents introduction demand of a certain country. The brain gain index is calculated as following formulas:

Iik = (Twk / Tik) / (Pw / Pi) (1) Among them, Iik means the brain gain index value of

country (i) in the field (k), Twk means the number of world’s top talents in the field (k), Tik means the number of country’s (i) top talents in the field (k), Pw means the world population, Pi means the country’s (i) population. If Iik was more than 1, that means the country (i) has less top talents in the field (k), therefore the talent introduction demand will be relatively strong. In contrast, if Iik was less than 1, that means the country’s (i) has greater top talents in the field (k) than the world average, and the talent introduction demand will not be so strong.

Additionally, the literature information mainly from the ISI Web of Science (SCI, CPCI-S), and the the data analysis and visualization tools are TDA and Tableau.

2017 Proceedings of PICMET ’17: Technology Management for Interconnected World

978-1-890843-36-6 ©2017 PICMET

 

 

III. CASE STUDY

Using 3-F method to analysis the top talents introduction demand in the big data and cloud computing field. We collected the high-impact literatures from January 1, 2006 to July 31, 2016. The literature Language was English and the literature type was article. Combining with the above conditions, we got 546 high-impact literatures in the big data and cloud computing field. Then the high-frequency keywords have been obtained (Table 1) and served as the research hotspots set.

TABLE I. THE RESEARCH HOTSPOTS OF THE HIGH-IMPACT LITERATURES IN BIG DATA AND CLOUD COMPUTING FIELD

Order Keywords Frequency

1 cloud computing 48

2 big data 24

3 virtualization 11

4 cloud manufacturing 9

5 internet of things (IoT) 8

6 mobile cloud computing 8

7 bioinformatics 6

8 climate change 6

9 Hadoop 6

10 software-defined networking (SDN) 6

……

 

At the same time, we displayed the frequency distribution of research hotspots in the way of cloud chart(fig. 1).

Fig. 1. The cloud chart of research hotspots that in the field of big data and

cloud computing

Then, we find the information about nationality (Table 2), institutes (Table 3) of top talents in the high-impact literature collection. Results showed there were 662 top talents worldwide in the big data and cloud computing field. The top ten countries or regions who had the most top talents were the United States, P.R.China, the United Kindom, Germany, the Netherlands, France, Canada, Australia, Italy and Switzerland and Spain tied for the tenth.

TABLE II. THE NATIONALITY DISTRIBUTION OF TOP TALENTS IN THE BIG DATA AND CLOUD COMPUTING FIELD

Order Country or Region Number of the top talent 1 US 268 2 P. R. China 48 3 UK 47 4 Germany 39 5 Netherlands 28 6 France 27 7 Canada 22 8 Australia 21 9 Italy 19 10 Switzerland 13 Spain 13 12 Japan 10 13 Korea 8 Malaysia 8 15 Singapore 7 New Zealand 7 17 Austria 6 18 Belgium 5 Sweden 5 India 5 Chinese Taipei 5 ……

TABLE III. THE INSTITUTES DISTRIBUTION OF TOP TALENTS IN THE BIG DATA AND CLOUD COMPUTING FIELD

Order Country or Region Number of the top talent

1 Harvard University (US) 10

2 Purdue University (US) 7

University of Malaya (Malaysia) 7

University of Maryland (US) 7

Unversity of Melbourne (Australia) 7

University of Missouri (US) 7

7 Oxford Unversity (UK) 6

8 Chinese Academy of Sciences (P.R.China) 5

ETH Zurich (Switzerland) 5

Massachusetts General Hospital (US) 5

Northwestern University (US) 5

University of British Columbia (Canada) 5

UC, Berkeley (US) 5

UC, San Diego (US) 5

University of Texas at Austin (US) 5

University of Washington (US) 5

……

 

2017 Proceedings of PICMET ’17: Technology Management for Interconnected World

 

 

From table 2 and 3 we can see that China was in the second place worldwide. However, China’s top talent is much less than the United States. In addition, the overall strength of Chinese research institutions is not strong. So, whether China should introduce top talents from other countries is need to be discussed.

According to the formula of the brain gain index, and using the world population data as well as the Chinese mainland population data released by the World Bank, the value of the Chinese brain gain index of big data and cloud computing was 2.61. In comparison, the brain gain index value of the United States was 0.11. That means China need to introduce top talent in the field of big data and cloud computing.

IV. CONCLUSION

In the knowledge economy era, the international flow of top talent has become convenient and frequent. Facing the world’s top talent shortage, China and the world’s major countries have developed overseas top talent introduction programs. Until 2007, almost all European countries had introduced some skillselective migration policies in order to attract the top talents. To make the overseas top talent introduction programs more effective and targeted is helpful for occupying the strategic high ground in the global top talent competition.

This paper improved the traditional talent evaluation function of bibliometric method, and presented the 3-F analysis method, which was applied to analyze the demand of top talents. The 3F method could help the government official to make decision whether need to introduce top talents to develop a new industry field and lock these top talents geographic location.

REFERENCES [1] .Xu, B.M., X.G. Ni. Development Trend and Key Technical Progress of

Cloud Computing[J]. Bulletin of the Chinese Academy of Sciences, 2015. 30(2), pp. 170-180.

[2] Xiao, Y., Y. Cheng, Y.J. Fang, Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow, in Iaeds15: International Conference in Applied Engineering and Management, P. Ren, Y. Li, and H. Song, Editors. 2015, Aidic Servizi Srl: Milano. pp. 325-330.

[3] Zhu, Y.Q., P. Luo, Y.Y. Huo et. al, Study on Impact and Reform of Big Data on Higher Education in China, in 2015 3rd International Conference on Social Science and Humanity, G. Lee and Y. Wu, Editors. 2015, Information Engineering Research Inst, USA: Newark. p. 155-161.

[4] Wang, X., L.C. Song, G.F. Wang et.al. Operational Climate Prediction in the Era of Big Data in China: Reviews and Prospects[J]. Journal of Meteorological Research, 2016. 30(3), pp. 444-456.

[5] Dahlman, C., L. Westphal, Technological effort in industrial development——An Interpretative Survey of Recent Research[R]. 1982.

[6] Cerna, L., M. Czaika, European Policies to Attract Talent: The Crisis and Highly Skilled Migration Policy Changes, in High-Skill Migration and Recession. 2016, Springer. pp. 22-43.

[7] Jin, X., B.W. Wah, X. Cheng et. al. Significance and challenges of big data research[J]. Big Data Research, 2015. 2(2), pp. 59-64.

[8] Fang, H., Z. Zhang, C.J. Wang et. al. A survey of big data research[J]. IEEE Network, 2015. 29(5), pp. 6-9.

[9] Cole, F.J., Eales, N. B. The history of comparative anatomy[J]. science Progress, 1917. 11, pp. 578-596.

[10] Gallardo-Gallardo, E., S. Nijs, N. Dries et. al. Towards an understanding of talent management as a phenomenon-driven field using bibliometric and content analysis[J]. Human Resource Management Review, 2015. 25, pp. 264-279.

[11] Clarke, B.L. Multiple authorship trends in scientific papers[J]. Science, 1964. 143(3608), pp. 822-824.

[12] Gonzalez-Valiente, C.L., J. Pacheco-Mendoza, R. Arencibia-Jorge. A review of altmetrics as an emerging discipline for research evaluation[J]. Learned Publishing, 2016. 29(4), pp. 229-238.

 

2017 Proceedings of PICMET ’17: Technology Management for Interconnected World

 

<< /ASCII85EncodePages false /AllowTransparency false /AutoPositionEPSFiles false /AutoRotatePages /None /Binding /Left /CalGrayProfile (Gray Gamma 2.2) /CalRGBProfile (sRGB IEC61966-2.1) /CalCMYKProfile (U.S. Web Coated \050SWOP\051 v2) /sRGBProfile (sRGB IEC61966-2.1) /CannotEmbedFontPolicy /Warning /CompatibilityLevel 1.7 /CompressObjects /Off /CompressPages true /ConvertImagesToIndexed true /PassThroughJPEGImages true /CreateJobTicket false /DefaultRenderingIntent /Default /DetectBlends true /DetectCurves 0.0000 /ColorConversionStrategy /LeaveColorUnchanged /DoThumbnails false /EmbedAllFonts true /EmbedOpenType false /ParseICCProfilesInComments true /EmbedJobOptions true /DSCReportingLevel 0 /EmitDSCWarnings false /EndPage -1 /ImageMemory 1048576 /LockDistillerParams true /MaxSubsetPct 100 /Optimize true /OPM 0 /ParseDSCComments false /ParseDSCCommentsForDocInfo false /PreserveCopyPage true /PreserveDICMYKValues true /PreserveEPSInfo false /PreserveFlatness true /PreserveHalftoneInfo true /PreserveOPIComments false /PreserveOverprintSettings true /StartPage 1 /SubsetFonts true /TransferFunctionInfo /Remove /UCRandBGInfo /Preserve /UsePrologue false /ColorSettingsFile () /AlwaysEmbed [ true ] /NeverEmbed [ true ] /AntiAliasColorImages false /CropColorImages true /ColorImageMinResolution 200 /ColorImageMinResolutionPolicy /OK /DownsampleColorImages true /ColorImageDownsampleType /Bicubic /ColorImageResolution 300 /ColorImageDepth -1 /ColorImageMinDownsampleDepth 1 /ColorImageDownsampleThreshold 1.50000 /EncodeColorImages true /ColorImageFilter /DCTEncode /AutoFilterColorImages false /ColorImageAutoFilterStrategy /JPEG /ColorACSImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /ColorImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /JPEG2000ColorACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /JPEG2000ColorImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /AntiAliasGrayImages false /CropGrayImages true /GrayImageMinResolution 200 /GrayImageMinResolutionPolicy /OK /DownsampleGrayImages true /GrayImageDownsampleType /Bicubic /GrayImageResolution 300 /GrayImageDepth -1 /GrayImageMinDownsampleDepth 2 /GrayImageDownsampleThreshold 1.50000 /EncodeGrayImages true /GrayImageFilter /DCTEncode /AutoFilterGrayImages false /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /GrayImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /JPEG2000GrayACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /JPEG2000GrayImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /AntiAliasMonoImages false /CropMonoImages true /MonoImageMinResolution 400 /MonoImageMinResolutionPolicy /OK /DownsampleMonoImages true /MonoImageDownsampleType /Bicubic /MonoImageResolution 600 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.50000 /EncodeMonoImages true /MonoImageFilter /CCITTFaxEncode /MonoImageDict << /K -1 >> /AllowPSXObjects false /CheckCompliance [ /None ] /PDFX1aCheck false /PDFX3Check false /PDFXCompliantPDFOnly false /PDFXNoTrimBoxError true /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXSetBleedBoxToMediaBox true /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile (None) /PDFXOutputConditionIdentifier () /PDFXOutputCondition () /PDFXRegistryName () /PDFXTrapped /False /CreateJDFFile false /Description << /CHS <FEFF4f7f75288fd94e9b8bbe5b9a521b5efa7684002000410064006f006200650020005000440046002065876863900275284e8e55464e1a65876863768467e5770b548c62535370300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c676562535f00521b5efa768400200050004400460020658768633002> /CHT <FEFF4f7f752890194e9b8a2d7f6e5efa7acb7684002000410064006f006200650020005000440046002065874ef69069752865bc666e901a554652d965874ef6768467e5770b548c52175370300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c4f86958b555f5df25efa7acb76840020005000440046002065874ef63002> /DAN <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> /DEU <FEFF00560065007200770065006e00640065006e0020005300690065002000640069006500730065002000450069006e007300740065006c006c0075006e00670065006e0020007a0075006d002000450072007300740065006c006c0065006e00200076006f006e002000410064006f006200650020005000440046002d0044006f006b0075006d0065006e00740065006e002c00200075006d002000650069006e00650020007a0075007600650072006c00e40073007300690067006500200041006e007a006500690067006500200075006e00640020004100750073006700610062006500200076006f006e00200047006500730063006800e40066007400730064006f006b0075006d0065006e00740065006e0020007a0075002000650072007a00690065006c0065006e002e00200044006900650020005000440046002d0044006f006b0075006d0065006e007400650020006b00f6006e006e0065006e0020006d006900740020004100630072006f00620061007400200075006e0064002000520065006100640065007200200035002e003000200075006e00640020006800f600680065007200200067006500f600660066006e00650074002000770065007200640065006e002e> /ESP <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> /FRA <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> /ITA (Utilizzare queste impostazioni per creare documenti Adobe PDF adatti per visualizzare e stampare documenti aziendali in modo affidabile. I documenti PDF creati possono essere aperti con Acrobat e Adobe Reader 5.0 e versioni successive.) /JPN <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> /KOR <FEFFc7740020c124c815c7440020c0acc6a9d558c5ec0020be44c988b2c8c2a40020bb38c11cb97c0020c548c815c801c73cb85c0020bcf4ace00020c778c1c4d558b2940020b3700020ac00c7a50020c801d569d55c002000410064006f0062006500200050004400460020bb38c11cb97c0020c791c131d569b2c8b2e4002e0020c774b807ac8c0020c791c131b41c00200050004400460020bb38c11cb2940020004100630072006f0062006100740020bc0f002000410064006f00620065002000520065006100640065007200200035002e00300020c774c0c1c5d0c11c0020c5f40020c2180020c788c2b5b2c8b2e4002e> /NLD (Gebruik deze instellingen om Adobe PDF-documenten te maken waarmee zakelijke documenten betrouwbaar kunnen worden weergegeven en afgedrukt. De gemaakte PDF-documenten kunnen worden geopend met Acrobat en Adobe Reader 5.0 en hoger.) /NOR <FEFF004200720075006b00200064006900730073006500200069006e006e007300740069006c006c0069006e00670065006e0065002000740069006c002000e50020006f0070007000720065007400740065002000410064006f006200650020005000440046002d0064006f006b0075006d0065006e00740065007200200073006f006d002000650072002000650067006e0065007400200066006f00720020007000e5006c006900740065006c006900670020007600690073006e0069006e00670020006f00670020007500740073006b007200690066007400200061007600200066006f0072007200650074006e0069006e006700730064006f006b0075006d0065006e007400650072002e0020005000440046002d0064006f006b0075006d0065006e00740065006e00650020006b0061006e002000e50070006e00650073002000690020004100630072006f00620061007400200065006c006c00650072002000410064006f00620065002000520065006100640065007200200035002e003000200065006c006c00650072002e> /PTB <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> /SUO <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> /SVE <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> /ENU (Use these settings to create PDFs that match the “Required” settings for PDF Specification 4.01) >> >> setdistillerparams << /HWResolution [600 600] /PageSize [612.000 792.000] >> setpagedevice

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Exp19_Excel_Ch02_ML2_SmartPhone

Grader – Instructions Excel 2019 Project

Exp19_Excel_Ch02_ML2_SmartPhone

 

Project Description:

You have just graduated from college and before beginning your first professional job, you would like to purchase a new smartphone. You have the option to purchase the new phone in one payment or make monthly payments by taking advantage of a 36 month flex payment plan. The payment plan charges an APR of 1.75% for the service. Prior to making your payment decision, you would like to make a worksheet to calculate the monthly payment for consumer reports top three smartphones for young professionals.

 

Steps to Perform:

Step Instructions Points Possible
1 Start Excel. Download and open the file named Exp19_Excel_Ch02_Assessment_SmartPhone.xlsx. Grader has automatically added your last name to the beginning of the filename. 0
2 Rename Sheet 1 FlexPay. Hint: Double-click the sheet name tab to rename the worksheet. 4
3 Type Flex Pay Calculator in cell A1, and then merge and center the title on the first row in the range A1:C1. Apply bold, 20 pt font size, Blue, Accent 1, font color. 8
4 Merge and center the range A2:C2, type Inputs, and apply Thick Outside Borders. Note, Mac users, apply Thick Box Border. 10
5 Type APR and # of payments in the range A3:A4. 6
6 Type 1.75% in cell B3 and 36 in cell B4. Merge and center the range A6:C6, type Outputs, and apply Thick Outside Borders. 12
7 Type Model in cell A7, Price in cell B7, and Payment in cell C7. 9
8 Type iphone x in cell A8, Samsung Galaxy in cell A9, and LG V30 in cell A10. Enter the corresponding prices 949799, and 650 in the range B8:B10 and apply Currency Number Format. Resize column A as needed to display all text. 15
9 In cell C8, enter a PMT function to calculate the monthly flex payment for the first option. Be sure to use the appropriate absolute, relative, or mixed cell references. Use the fill handle to copy the function down through cell C10. Make sure each of the monthly flex payments is a positive value. 13
10 Type Highest payment, Average payment, and Lowest payment in the range A12:A14. 5
11 In cell B12, use the MAX function to calculate the highest flex payment, in cell B13, use the AVERAGE function to calculate the average flex payment, and in cell B14, use the MIN function to calculate the lowest flex payment. 12
12 Insert a footer with your name on the left side, the sheet name in the center, and the file name code on the right side of the worksheet. 6
13 Save the workbook. Close the workbook and then exit Excel. Submit the workbook as directed. 0
Total Points 100

 

Created On: 08/21/2020 1 Exp19_Excel_Ch02_ML2 – SmartPhone 1.3

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Responses

Article 1:

Question: Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications? 

 

World Wide Web (www) has advanced as a major technology since its introduction during the 1980s. In beginning web sites were primarily used only by few number of users to share information related to their academic work. As the user interface evolved over the next coming years with each new version bringing in new frameworks and techniques, it powered web as a hub of technology. Web 1.0, 2.0 and 3.0 brought more dynamic features to the users. Web 1.0 used to describe the web content in static resulting in rigid user experience. Web 2.0 which powered social networking sites became popular developing the web which ultimately served as a platform for people to create and share their own content on the web in the form of blogs, wikis, feeds, tagging systems, user-created publication systems etc. The evolution of web technology began to spread its roots into the major business areas which brought in the requirement for high speed and expanded availability for substantial number of users.

On the other hand, Web 2.0 has also brought some security’s concerns. Mainly the component of client interaction with web, it opened doors to unauthorized actions in the application. In order to provide a rich user experience majority Web 2.0 sites have adopted lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the Conventional client-server models, many of calls (requests) are handled and processed on the server side. AJAX allows a higher percentage of requests to be processed on the client side. This may give malicious users many options to modify any application code running on a client machine by exploring and testing the application for vulnerabilities.

To overcome this objective, developers should consider installing an appliance at the Internet gateway, which performs real-time code inspection of traffic flowing through the corporate network. High performance and high availability appliances capable of monitoring and acting swiftly to block any suspicious web traffic are paramount. Also, it is very important that developers develop the application with security in mind. Following the coding convention, having the code reviewed, testing the application thoroughly are all part of securing the application in the web.

 

 

Article 2:

Question: Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications? 

Web applications, or software as a service (SaaS) Web applications, has certainly revolutionized the way individuals utilize the net. Advancement as advanced and as more people have started to utilize the Internet, the net has experienced through predominant turns specially Web2.0, Web 3.0 and Internet of things. Example customer-facing applications, it has ended up exceptionally troublesome with recently presented security threats. Such applications can effortlessly enter through the conventional security measures taken and enable the programmers to break classified data.

How web 2.0 change securities for internet:

Web 2.0 capabilities serve 2 main purposes 1) to reach the public straightforward manner referred to as social media and 2) to improve the business process. They are progressively utilized by companies for superior staff collaboration and communication. Web 2.0 innovation offers numerous preferences in terms of enhancing the Web and making strides the client involvement, they are too bringing a number of security concerns and assault vectors into presence. Since one characteristic for a web2.0 application is to emerge more noteworthy client association, the presentational the person or client to security threats and vulnerabilities increases.

The following are few security issues of Web 2.0 Environment. They are:

Insufficient Authentication Controls:

In numerous Web 2.0 applications, content is confined within the hands of numerous different clients, not only a select number of affirmed clients. That implies there’s a more noticeable possibility that a less-experienced client will roll out an improvement that will adversely influence the general framework.

Cross Site Scripting (XSS):

In a stored cross-site scripting (XSS) vulnerability, malevolent info sent by a hacker is put away in the framework at that point, then showed to different users. Frameworks that enable clients to include arranged substance – like HTML for instance – are particularly defenseless to this assault

Phishing:

In spite of the fact that phishing isn’t only a hazard related with Web 2.0 applications using any and all means, the huge number of unique client programming being used makes it harder for users to recognize the honest to goodness and the phony sites. That empowers more viable phishing assaults.

Information Leakage and Integrity:

Data Integrity is one of the key components of information security. In spite of the fact that a hack could prompt loss of respectability, so can unexpected falsehood. An incredible case of this in the general population field is a mixed up alter on Wikipedia which is then acknowledged as truth by a considerable lot of the site’s guests. In a business domain, having frameworks open to numerous clients permits a vindictive or mixed up client or clients to post and distribute incorrect data which crushes the respectability of the information.

Despite many security issues, I would use Web2.0 because Web 2.0 is a people-oriented technology. Convenience, social highlights, joint effort, quick stacking applications, intelligence, snappy advancement times and continuous updates are on the whole real patterns. Rather than a million highlights stuffed into one costly programming program, you get littler, sleeker online applications that mean to do only a couple of things extremely well.

 

 

 

 

Article 3:

Question:

1.  Develop a product service idea.

A. Describe the product/service including the benefits of using the product/service

B. Discuss the potential customers for this product/service

2.  Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each.

 

While developing a new product its uniqueness should be different from others so that it can survive in the competitive world. Its features must be different and understandable so that it can be preferred by everyone easily. Further these features must provide benefits which can attract more customers by using strategies in marketing. This way we can increase sales and also profits. Based on the benefits only customers prefer your product so they must be easy to use, safe and affordable. Further purpose of the product must be easily understood by consumers. Based on products features we can find potential customers. For example say when painting your building you may chose to paint professionals or laborer to paint. But each one’s work is different to each other. While describing your product to customers, say about its benefits and qualities which will make them interest in the product. For example if the product is about athletic gear focus on durability, comfort and design of the product. We can share the social responsibility by creating the product eco friendly and attract more customers.

Social media sites are better platform for interacting with customers. It also helps in building brand among customers daily. By answering their questions and sharing, will helps in building product image and forms loyal group of customers. It has also drawbacks like problem related to customer service may change violent on facebook and twitter and this causes trolls to harass employee and consumers because of inappropriate posts on website. So organizations have to resolve these conflicts sometimes (Basu, 2017).

Web marketing:  this is another strategy for advertising which involves search engine marketing, email marketing, social media marketing, and banner advertising which are done through online. Currently pay per click marketing, SEM is best and evolving quickly in business organizations for advertising.

Consumer Review Networks: with this, consumers can find any product reviews, services and information about brands etc. these reviews will add more value to products in websites. Through this reviews organizations can build up their product value.

 

 

 

 

Article 4:

Question:

1.  Develop a product service idea.

A. Describe the product/service including the benefits of using the product/service

B. Discuss the potential customers for this product/service

2.  Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each.

This is a service of delivering cargo, especially small-sized goods what do not weigh much by drones. This will require the manufacture of programmed drones, which will use GPS to take route and travel from the point of order to the point of delivery. This will make the process of delivery of small packages fast and efficient, with the recipient receiving his cargo on time. Use of the drones will be more economical as it will save on time and money. No manpower will be required, where the time spent by delivery-persons can be taken, and the individuals find other things to do. Nonetheless, use of drones is a way of improving lifestyle.

Any products will be delivered using drones, especially in urban areas. Therefore, the drones can be used in transferring retail products between sellers and consumers. For instance, vendors of fast foods can be sending lunch boxes to individuals who may have ordered online, right in the places where they are. Therefore, every individual is fit to use the service so long as s/he may wish to transport items without necessarily traveling. The drones will, however, be limited to lifting the weight.

Use of drones in the delivery of cargo is much more economical and environmentally friendly as no burning of fuel is involved and thus, no release of carbon dioxide into the air. The drones use electric energy, which sometimes can be gotten from natural sources such as solar and wind. Among how this service can be marketed electronically include using advertisement though ads on websites, search engines, and phone applications (Gabbai, 2017; Zhang, 2017). The other possible way is through using a tell-a-friend-to-tell-a-friend, initiative after that the service being introduced, the first individuals to use it will recommend their friends using social media such as Facebook, Instagram, among others. The third way is through creating a commercial website and optimizing it using Google search engine, such that upon a customer looking up for such as service, it be popping up atop the list (Gabbai, 2017; Zhang, 2017). One basic disadvantage is that the drones may face obstacles, and they can travel limited ranges of distances. Use of this service will mean joblessness to delivery-person.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Lab #9

CS1150 Introduction to Computer Science

Lab #9 – Networking, 40 points

Objective:

To study how networks route packets to various destination hosts. Learn how networks ensure reliable delivery.

 

Instructions:

Make sure to do the Activity as outlined in the LabCH19.pdf file. The activity is actually a tutorial that will help you to solve the problems in the exercises. It is expected that you will complete the Activity before you begin the exercises.

When you are finished, save and rename the completed document as “firstname_lastname_lab9.docx”. Then, submit the saved document to Pilot.

 

 

 

 

 

 

 

 

 

 

 

 

EXERCISE 1

 

1) Start the “TCP/IP” applet.

2) Copy and paste the following text into the “Your Message” box:

 

 

Computer networking is essential in our world today.

 

 

Note that this message is exactly 52 ASCII characters long, counting spaces and the period at the end.

 

It should look like this:

 

 

 

Then, press the button “Send a message” and watch.

 

3) Count how many DAT and ACK packets were sent. (Don’t rely on the “Status” box, actually count the packets yourself.)

 

Write your answers here:

 

DEFINE DAT AND GIVE NUMBER OF DAT PACKETS:

 

DEFINE ACK AND GIVE NUMBER OF ACK PACKETS:

 

 

4) Determine the steps for calculating how many characters were sent during the entire exchange.

 

Assuming that:

· Every DAT or ACK packet has a packet header (example: DAT 1 0 221)

· Besides the packet header, every DAT packet carries AT MOST 10 characters of data.

· The last packet carried less than 10 characters of data. (52 data characters in the message, remember? 52 doesn’t divide nicely into 10)

· ACK packets have no data, just a packet header.

· Every blank space, even in a packet header, counts as a character.

· Assume that every packet header is 9 characters long

 

We calculated that exactly 171 characters were sent back and forth in total during the entire process. How did we get that number?

 

Show the mathematical steps to calculate the number 171 here, below this line.:

 

 

 

5) Calculate the overhead, expressed as a percentage. Here is the process:

· There are 52 characters of actual data in the message, including blanks and punctuation.

· Subtract the number of characters of actual data (52 characters) from the total number of characters sent in both directions in all the packets (from earlier in the lab). This gives you the number of characters sent that were not actually data, just part of the cost/overhead of sending the actual data.

· Divide the number of overhead characters by the total number of characters to calculate the overhead expressed as a percentage of the total.

 

Write the overhead percentage here, below this line:

 

 

 

 

6) Imagine you have a million-character message to send. Calculate how many packets will be needed and how many characters will be sent in total for the entire process to move the message from node 0 to node 1:

 

Write your answers here:

 

HOW MANY PACKETS TOTAL:

HOW MANY CHARACTERS TOTAL:

 

 

 

7) What would be an obvious way to decrease the overhead percentage? Why might this solution backfire? Under what conditions would that occur?

 

Write your answers here:

 

OBVIOUS WAY TO DECREASE OVERHEAD PERCENTAGE:

HOW THAT COULD BACKFIRE:

UNDER WHAT CONDITIONS:

 

 

8) What is the purpose of IP address? What is the purpose of Routers?

 

Write your answers here:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

EXERCISE 2

 

1) Start or restart the “TCP/IP” applet again. Once again, copy and paste the following text into the “Your Message” box:

 

 

Computer networking is essential in our world today.

 

 

2) This time, change the selection away from Leave packets undamaged to Delete packets that are touched.

3) Delete some data packets by clicking on them as they move along the wire, and watch the re-transmission after timeout.

 

 

 

 

 

4) What happens if you delete the re-transmitted packet? Does the TCP/IP applet need to take any special action?

 

Write what happens here, below this line:

 

 

 

Is special action needed if re-transmitted packet is deleted? Write your answer here, below this line:

 

 

 

 

5) What happens if you delete ACK or NAK packets?

 

Write your answer here, below this line:

 

 

 

 

 

 

 

 

EXERCISE 3

 

1) Start the “Network router” applet.

Select Example 3, the ring network.

 

 

2) Double-click on the node 37.61.25.46. List the nodes it is directly connected to (the nodes in its connection table).

 

Write your list of nodes here, below this line:

 

3) If 37.61.25.46 wants to send packets to a node that is not directly connected, to which node will it first send the packets? (Check the routing table by double clicking on the node.)

 

Write the address of the next node here, below this line:

 

4) Run the applet for a while, letting it generate packets continuously. Double-click on 37.61.25.46 again and look at its statistics. How many packets were sent? Received? Forwarded?

 

Write your answers here:

 

PACKETS SENT:

PACKETS RECEIVED:

PACKETS FORWARDED:

 

 

5) Which nodes are sending packets out, and to whom?

 

Write your answers here:

 

NODES THAT ARE SENDING PACKETS:

NODES THAT ARE RECEIVING PACKETS:

 

6) Click on 138.92.6.17. Write down its statistics.

PACKETS SENT:

PACKETS RECEIVED:

PACKETS FORWARDED:

 

 

 

 

 

 

EXERCISE 4

 

1) Start the “Network router” applet. Select Example 4, the star network.

2) Look at the routing and connection tables for the center node and several other nodes. Describe any pattern you can see in these tables.

 

Write your description here, below this line:

 

3) How is the connection table for the center node different from the other nodes?

 

Write your answer here, below this line:

 

4) Select Generate when I click on a node from the pull-down menu.

 

5) If you double-click on 159.121.2.13, you will see that its destination node is 126.14.5.46. Run the applet, click on 159.121.2.13, and watch the packets go. What color does the sending computer turn briefly? What color does the destination computer turn? What does it mean if a node flashes green?

 

Write your answers here:

WHAT COLOR (SENDING COMPUTER):

WHAT COLOR (DESTINATION COMPUTER):

WHAT DOES IT MEAN IF A NODE FLASHES GREEN:

 

Try it again with 8.10.20.25 to confirm.

 

 

 

6) Many early computer networks used a star topology like this example. What would happen if the center node in this type of network dies?

 

Write your answer here, below this line:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Exercise 5

 

Create a new topology using 4 nodes.

 

1) Create 4 nodes with following IP addresses

Node 1 = 130.108.7.11

Node 2 = 130.108.7.22

Node 3 = 130.108.7.33

Node 4 = 130.108.7.44

 

2) Make Node 3 as a forwarding node and connect it with all the other remaining nodes.

3) Let the sender receiver pair be as following:

Sender Receiver
Node 1 Node 2
Node 2 Node 4
Node 4 Node 1

 

 

4) Your topology should look like as given below:

5) Paste your screenshot below this line:

 

 

Rubric (40 pts possible):

Exercise   Points
1 Question 1 0
  Question 2 0
  Question 3 1
  Question 4 1
  Question 5 2
  Question 6 1
  Question 7 1
  Question 8 2
2 Question 1 0
  Question 2 1
  Question 3 1
  Question 4 3
  Question 5 3
3 Question 1 1
  Question 2 1
  Question 3 1
  Question 4 1
  Question 5 2
  Question 6 2
4 Question 1 1
  Question 2 1
  Question 3 1
  Question 4 1
  Question 5 2
  Question 6 2
5 Question 1 2
  Question 2 2
  Question 3 2
  Question 5 2
Total   40
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Exp19_Excel_Ch03_Cap_Gym

Exp19_Excel_Ch03_Cap_Gym

 

#Exp19 Excel Ch03 Cap Gym

 

Project Description:

You and a business partner opened a fitness gym three years ago. Your partner oversees managing the operations of the gym, ensuring the right equipment is on hand, maintenance is conducted, and the appropriate classes are being offered with the right trainers and staff. You oversee managing the business aspects, such as marketing, finance, and general personnel issues. The business is nearing the end of its third year. You have put together the financials, and now you want to show the data more visually because you know it will make more sense to your business partner that way. You want to create charts and insert sparklines that show the trends to discuss with your partner.

 

Start   Excel. Download and open the file named Exp19_Excel_Ch03_Cap_Gym.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

You will create a pie chart to   focus on the expenses for the current year.
Insert a 2-D pie chart using the ranges A11:A19 and D11:D19 on the Income   worksheet.

 

Move the chart to a new chart   sheet named Expenses. Move it to the right of the Membership sheet.

 

The chart needs a descriptive,   easy-to-read title.
Change the chart title to Expenses for Year 3 and change the font size to 20.

 

You want to create a clustered   bar chart.
Insert a clustered bar chart using the ranges A4:D4 and A11:D19 on the Income   worksheet.

 

You want to place this chart and   other charts on a Summary worksheet to look at trends.
Move the chart as an object on the Summary worksheet. Cut the bar chart and   paste it in cell I1.

 

The chart should have a   descriptive title to explain which expenses are excluded.
Change the bar chart title to Expenses (Without Payroll and Cost of Sales).

 

You want to filter out the   Payroll and Cost of Sales to focus on other expenses. The bar chart displays   expenses the first expense (Advertising) at the bottom of the category axis.   You want to reverse the categories to display in the same sequence as the   expenses are listed in the worksheet.
Apply a chart filter to remove Payroll and Cost of Sales. Select the category   axis and use the Format Axis task pane to display categories in reverse   order. Change the Maximum Bound to 25000.
Mac Users: Apply the filter using Select Data and Switch Row/Column. Be sure   to switch the rows and columns back after filtering the data.

 

You decide to format the pie   chart with data labels and remove the legend because there are too many   categories for the legend to be effective.
Display the Expenses sheet and remove the legend. Add Percent and Category   Name data labels and choose Outside End position for the labels. Change the   data labels font size to 10.

 

You want to emphasize the   Education & Training slice by exploding it.
Explode the Education & Training slice by 12%.

 

Add the Light Gradient – Accent   2 fill color to the chart area.

 

You create another chart showing   the Balance sheet items. You change the chart to a clustered column and   switch the row and column data to focus on each balance sheet item.
Insert a stacked column chart using the ranges A4:D4, A10:D10, A15:D15, and   A16:D16 on the Balance sheet.
Change the chart type to Clustered Column and switch the rows and columns in   the chart.

 

You want to move the column   chart to be on the Summary worksheet along with the bar chart.
Move the column chart to the Summary worksheet. Cut the chart and paste it in   cell A1.

 

The column chart needs to have a   descriptive title to indicate the data comes from the Balance
sheet.
Change the title to 3-Year Balance Sheet.

 

The last chart will be a line   chart to show the trends in Memberships.
Insert a line chart using the range I3:L15 on the Membership worksheet.

 

You want to move the line chart   to be on the same Summary sheet as column and bar charts.
Move the line chart to the Summary worksheet. Cut the chart and paste it in   cell A17.

 

Because the lowest value is   between 200 and 300, you will change the vertical axis at 200 instead of 0.
Adjust the vertical axis so the Minimum Bound is 200 and display a vertical axis title # of   Memberships for   the line chart.

 

Apply Chart Style 4 and change   colors to Monochromatic Palette 8 for the line chart.

 

Move the legend to the top of   the chart and add the chart title 3-Year Membership Trends.

 

It is a best practice to add Alt   Text for each chart for accessibility compliance.
Display the pie chart and add Alt Text: The pie chart displays percentage of   expenses for Year 3. (including the period)

 

Display the column chart and add   Alt Text: The column chart displays total assets, total   liabilities, and retained earnings for three years. (including the period)

 

Display the bar chart and add   Alt Text: The bar chart displays expenses for three years without   payroll or cost of sales. (including the period)

 

Display the line chart and add   Alt Text: The line chart displays monthly trends in   memberships for three years. (including the period)

 

You want to add sparklines to   the Daily Attendance Trends. You add high points to emphasize which time of   day is the most popular for your membership.
Select range B16:F16 on the Membership worksheet. Insert Column Sparklines using   data from the range B6:F14. Display the high points for the sparklines.

 

Insert a footer with Exploring   Series on the   left, the sheet name code in the center, and the file name code on the right   on the Membership, Expenses, and Summary sheets individually. Change to   Normal view.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Web Design

5-21bApply: Case Problem 1

Data Files needed for this Case Problem: gp_cover_txt.html, gp_page1_txt.html, gp_page2_txt.html, gp_page3_txt.html, gp_layout_txt.css, gp_print_txt.css, 2 CSS files, 21 PNG files

Golden Pulps Devan Ryan manages the website Golden Pulps, where he shares tips on collecting and fun stories from the “golden age of comic books”—a period of time covering 1938 through the early 1950s. Devan wants to provide online versions of several classic comic books, which are now in the public domain.

He’s scanned the images from the golden age comic book, America’s Greatest Comics 001, published in March, 1941 by Fawcett Comics and featuring Captain Marvel. He’s written the code for the HTML file and wants you to help him develop a layout design that will be compatible with mobile and desktop devices. Figure 5-59 shows a preview of the mobile and desktop version of a page you’ll create.

Figure 5-59Golden Pulps Sample PageA screenshot shows “Golden Pulps” sample page in mobile and desktop versions.Enlarge Image© 2016 Cengage Learning; © Courtesy Patrick Carey; Source: Comic Book Plus

Complete the following:

  1. 1Using your editor, open the gp_cover_txt.html, gp_page1_txt.html, gp_page2_txt.html, gp_page3_txt.html, gp_layout_txt.css, and gp_print_txt.css files from the html05 ► case1 folder. Enter your name and the date in the comment section of each file, and save them as gp_cover.html, gp_page1.html, gp_page2.html, gp_page3.html, gp_layout.css, and gp_print.css respectively.
  2. 2Go to the gp_cover.html file in your editor. Add a viewport meta tag to the document head, setting the width of the layout viewport to the device width and setting the initial scale of the viewport to 1.0.
  3. 3Create links to the following style sheets: a) the gp_reset.css file to be used with all devices, b) the gp_layout.css file to be used with screen devices, and c) the gp_print.css file to be used for printed output.
  4. 4Take some time to study the contents and structure of the file. Note each panel from the comic book is stored as a separate inline image with the class name panel along with class names of size1 to size4 indicating the size of the panel. Size1 is the largest panel down to size4, which is the smallest panel. Close the file, saving your changes.
  5. 5Repeat Steps 2 through 4 for the gp_page1.html, gp_page2.html, and gp_page3.html files.
  6. 6Go to the gp_layout.css file in your editor. In this style sheet, you’ll create the layout styles for mobile and desktop devices. Note that Devan has used the @import rule to import the gp_designs.css file, which contains several graphical and typographical style rules.
  7. 7Go to the Flex Layout Styles section and insert a style rule to display the page body as a flexbox oriented as rows with wrapping. As always, include the latest WebKit browser extension in all of your flex styles.
  8. 8The page body content has two main elements. The section element with the ID sheet contains the panels from the comic book page. The article element contains information about the comic book industry during the Golden Age. Devan wants more of the page width to be given to the comic book sheet. Add a style rule that sets the growth and shrink rate of the sheet section to 3 and 1 respectively and set its basis size to 301 pixels.
  9. 9Less page width will be given to the article element. Create a style rule to set its flex growth and shrink values to 1 and 3 respectively and set its basis size to 180 pixels.
  10. 10Go to the Mobile Devices section and create a media query for screen devices with a maximum width of 480 pixels.
  11. 11With mobile devices, Devan wants each comic book panel image to occupy a single row. Create a style rule that sets the width of images belonging to the panel class to 100%.
  12. 12For mobile devices, Devan wants the horizontal navigation links to other pages on the Golden Pulps website to be displayed near the bottom of the page. Within the media query, set the flex order of the horizontal navigation list to 99.
  13. 13Create a style rule to set the flex order of the body footer to 100. (Hint: There are two footer elements in the document, use a selector that selects the footer element that is a direct child of the body element.)
  14. 14Go to the Tablet and Desktop Devices: Greater than 480 pixels section and create a media query that matches screen devices with widths greater than 480 pixels.
  15. 15For tablet and desktop devices, you’ll lay out the horizontal navigation list as a single row of links. Within the media query, create a style rule that displays the ul element within the horizontal navigation list as a flexbox, oriented in the row direction with no wrapping. Set the height of the element to 40 pixels.
  16. 16For each li element within the ul element of the horizontal navigation list set their growth, shrink, and basis size values to 1, 1, and auto respectively so that each list items grows and shrinks at the same rate.
  17. 17With wider screens, Devan does not want the panels to occupy their own rows as is the case with mobile devices. Instead, within the media query create style rules, define the width of the different classes of comic book panel images as follows:
    1. Set the width of size1 img elements to 100%.
    2. Set the width of size2 img elements to 60%.
    3. Set the width of size3 img elements to 40%.
    4. Set the width of size4 img elements to 30%.
  18. 18Save your changes to the file and then open the gp_cover.html file in your browser or device emulator. Click the navigation links to view the contents of the cover and first three pages. Verify that with a narrow screen the panels occupy their own rows and with a wider screen the sheets are laid out with several panels per row. Further verify that the horizontal navigation list is placed at the bottom of the page for mobile devices.
  19. 19Devan also wants a print style that displays each comic book sheet on its own page and with none of the navigation links. Go to the gp_print.css style sheet in your editor. Add style rules to
    1. hide the nav, footer, and article elements.
    2. set the width of the section element with the ID sheet to 6 inches. Set the top/bottom margin of that element to 0 inches and the left/right margin to auto in order to center it within the printed page.
    3. set the width of size1 images to 5 inches, size2 images to 3 inches, size3 images to 2 inches, and size4 images to 1.5 inches.
  20. 20Save your changes to the file and then reload the contents of the comic book pages in your browser and preview the printed pages. Verify that the printed page displays only the website logo, the name of the comic book, and the comic book panels.

gp_back1.pnggp_cover_txt.htmlgp_designs.cssPreview the documentgp_layout_txt.cssPreview the documentgp_layout_txt.cssPreview the documentgp_logo.pnggp_next.pnggp_page1_txt.htmlgp_page2_txt.htmlgp_page3_txt.htmlgp_panel01.pnggp_panel02.pnggp_panel03.pnggp_panel04.pnggp_panel05.pnggp_panel06.pnggp_panel07.pnggp_panel08.pnggp_panel09.pnggp_panel10.pnggp_panel11.pnggp_panel12.pnggp_panel13.pnggp_panel14.pnggp_panel15.pnggp_panel16.pnggp_panel17.pnggp_prev.pnggp_print_txt.cssPreview the documentgp_reset.cssPreview the document

PreviousNext

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

6 Queztion In Artificial Inteligence

CHAPTER 1 / AI: HISTORY AND APPLICATIONS 7

Pascal’s successes with calculating machines inspired Gottfried Wilhelm von Leibniz in 1694 to complete a working machine that become known as the Leibniz Wheel. It inte- grated a moveable carriage and hand crank to drive wheels and cylinders that performed the more complex operations of multiplication and division. Leibniz was also fascinated by the possibility of a automated logic for proofs of propositions. Returning to Bacon’s entity specification algorithm, where concepts were characterized as the collection of their necessary and sufficient features, Liebniz conjectured a machine that could calculate with these features to produce logically correct conclusions. Liebniz (1887) also envisioned a machine, reflecting modern ideas of deductive inference and proof, by which the produc- tion of scientific knowledge could become automated, a calculus for reasoning.

The seventeenth and eighteenth centuries also saw a great deal of discussion of episte- mological issues; perhaps the most influential was the work of René Descartes, a central figure in the development of the modern concepts of thought and theories of mind. In his Meditations, Descartes (1680) attempted to find a basis for reality purely through intro- spection. Systematically rejecting the input of his senses as untrustworthy, Descartes was forced to doubt even the existence of the physical world and was left with only the reality of thought; even his own existence had to be justified in terms of thought: “Cogito ergo sum” (I think, therefore I am). After he established his own existence purely as a thinking entity, Descartes inferred the existence of God as an essential creator and ultimately reas- serted the reality of the physical universe as the necessary creation of a benign God.

We can make two observations here: first, the schism between the mind and the phys- ical world had become so complete that the process of thinking could be discussed in iso- lation from any specific sensory input or worldly subject matter; second, the connection between mind and the physical world was so tenuous that it required the intervention of a benign God to support reliable knowledge of the physical world! This view of the duality between the mind and the physical world underlies all of Descartes’s thought, including his development of analytic geometry. How else could he have unified such a seemingly worldly branch of mathematics as geometry with such an abstract mathematical frame- work as algebra?

Why have we included this mind/body discussion in a book on artificial intelligence? There are two consequences of this analysis essential to the AI enterprise:

1. By attempting to separate the mind from the physical world, Descartes and related thinkers established that the structure of ideas about the world was not necessar- ily the same as the structure of their subject matter. This underlies the methodol- ogy of AI, along with the fields of epistemology, psychology, much of higher mathematics, and most of modern literature: mental processes have an existence of their own, obey their own laws, and can be studied in and of themselves.

2. Once the mind and the body are separated, philosophers found it necessary to find a way to reconnect the two, because interaction between Descartes mental, res cogitans, and physical, res extensa, is essential for human existence.

Although millions of words have been written on this mind–body problem, and numerous solutions proposed, no one has successfully explained the obvious interactions between mental states and physical actions while affirming a fundamental difference

 

 

8 PART I / ARTIFICIAL INTELLIGENCE: ITS ROOTS AND SCOPE

between them. The most widely accepted response to this problem, and the one that provides an essential foundation for the study of AI, holds that the mind and the body are not fundamentally different entities at all. On this view, mental processes are indeed achieved by physical systems such as brains (or computers). Mental processes, like physi- cal processes, can ultimately be characterized through formal mathematics. Or, as acknowledged in his Leviathan by the 17th century English philosopher Thomas Hobbes (1651), “By ratiocination, I mean computation”.

1.1.2 AI and the Rationalist and Empiricist Traditions

Modern research issues in artificial intelligence, as in other scientific disciplines, are formed and evolve through a combination of historical, social, and cultural pressures. Two of the most prominent pressures for the evolution of AI are the empiricist and rationalist traditions in philosophy.

The rationalist tradition, as seen in the previous section, had an early proponent in Plato, and was continued on through the writings of Pascal, Descartes, and Liebniz. For the rationalist, the external world is reconstructed through the clear and distinct ideas of a mathematics. A criticism of this dualistic approach is the forced disengagement of repre- sentational systems from their field of reference. The issue is whether the meaning attrib- uted to a representation can be defined independent of its application conditions. If the world is different from our beliefs about the world, can our created concepts and symbols still have meaning?

Many AI programs have very much of this rationalist flavor. Early robot planners, for example, would describe their application domain or “world” as sets of predicate calculus statements and then a “plan” for action would be created through proving theorems about this “world” (Fikes et al. 1972, see also Section 8.4). Newell and Simon’s Physical Symbol System Hypothesis (Introduction to Part II and Chapter 16) is seen by many as the arche- type of this approach in modern AI. Several critics have commented on this rationalist bias as part of the failure of AI at solving complex tasks such as understanding human lan- guages (Searle 1980, Winograd and Flores 1986, Brooks 1991a).

Rather than affirming as “real” the world of clear and distinct ideas, empiricists con- tinue to remind us that “nothing enters the mind except through the senses”. This con- straint leads to further questions of how the human can possibly perceive general concepts or the pure forms of Plato’s cave (Plato 1961). Aristotle was an early empiricist, emphasiz- ing in his De Anima, the limitations of the human perceptual system. More modern empir- icists, especially Hobbes, Locke, and Hume, emphasize that knowledge must be explained through an introspective but empirical psychology. They distinguish two types of mental phenomena perceptions on one hand and thought, memory, and imagination on the other. The Scots philosopher, David Hume, for example, distinguishes between impressions and ideas. Impressions are lively and vivid, reflecting the presence and existence of an exter- nal object and not subject to voluntary control, the qualia of Dennett (2005). Ideas on the other hand, are less vivid and detailed and more subject to the subject’s voluntary control.

Given this distinction between impressions and ideas, how can knowledge arise? For Hobbes, Locke, and Hume the fundamental explanatory mechanism is association.

 

 

CHAPTER 1 / AI: HISTORY AND APPLICATIONS 9

Particular perceptual properties are associated through repeated experience. This repeated association creates a disposition in the mind to associate the corresponding ideas, a pre- curser of the behaviorist approach of the twentieth century. A fundamental property of this account is presented with Hume’s skepticism. Hume’s purely descriptive account of the origins of ideas cannot, he claims, support belief in causality. Even the use of logic and induction cannot be rationally supported in this radical empiricist epistemology.

In An Inquiry Concerning Human Understanding (1748), Hume’s skepticism extended to the analysis of miracles. Although Hume didn’t address the nature of miracles directly, he did question the testimony-based belief in the miraculous. This skepticism, of course, was seen as a direct threat by believers in the bible as well as many other purvey- ors of religious traditions. The Reverend Thomas Bayes was both a mathematician and a minister. One of his papers, called Essay towards Solving a Problem in the Doctrine of Chances (1763) addressed Hume’s questions mathematically. Bayes’ theorem demon- strates formally how, through learning the correlations of the effects of actions, we can determine the probability of their causes.

The associational account of knowledge plays a significant role in the development of AI representational structures and programs, for example, in memory organization with semantic networks and MOPS and work in natural language understanding (see Sections 7.0, 7.1, and Chapter 15). Associational accounts have important influences of machine learning, especially with connectionist networks (see Section 10.6, 10.7, and Chapter 11). Associationism also plays an important role in cognitive psychology including the sche- mas of Bartlett and Piaget as well as the entire thrust of the behaviorist tradition (Luger 1994). Finally, with AI tools for stochastic analysis, including the Bayesian belief network (BBN) and its current extensions to first-order Turing-complete systems for stochastic modeling, associational theories have found a sound mathematical basis and mature expressive power. Bayesian tools are important for research including diagnostics, machine learning, and natural language understanding (see Chapters 5 and 13).

Immanuel Kant, a German philosopher trained in the rationalist tradition, was strongly influenced by the writing of Hume. As a result, he began the modern synthesis of these two traditions. Knowledge for Kant contains two collaborating energies, an a priori component coming from the subject’s reason along with an a posteriori component com- ing from active experience. Experience is meaningful only through the contribution of the subject. Without an active organizing form proposed by the subject, the world would be nothing more than passing transitory sensations. Finally, at the level of judgement, Kant claims, passing images or representations are bound together by the active subject and taken as the diverse appearances of an identity, of an “object”. Kant’s realism began the modern enterprise of psychologists such as Bartlett, Brunner, and Piaget. Kant’s work influences the modern AI enterprise of machine learning (Section IV) as well as the con- tinuing development of a constructivist epistemology (see Chapter 16).

1.1.3 The Development of Formal Logic

Once thinking had come to be regarded as a form of computation, its formalization and eventual mechanization were obvious next steps. As noted in Section 1.1.1,

 

 

10 PART I / ARTIFICIAL INTELLIGENCE: ITS ROOTS AND SCOPE

Gottfried Wilhelm von Leibniz, with his Calculus Philosophicus, introduced the first sys- tem of formal logic as well as proposed a machine for automating its tasks (Leibniz 1887). Furthermore, the steps and stages of this mechanical solution can be represented as move- ment through the states of a tree or graph. Leonhard Euler, in the eighteenth century, with his analysis of the “connectedness” of the bridges joining the riverbanks and islands of the city of Königsberg (see the introduction to Chapter 3), introduced the study of representa- tions that can abstractly capture the structure of relationships in the world as well as the discrete steps within a computation about these relationships (Euler 1735).

The formalization of graph theory also afforded the possibility of state space search, a major conceptual tool of artificial intelligence. We can use graphs to model the deeper structure of a problem. The nodes of a state space graph represent possible stages of a problem solution; the arcs of the graph represent inferences, moves in a game, or other steps in a problem solution. Solving the problem is a process of searching the state space graph for a path to a solution (Introduction to II and Chapter 3). By describing the entire space of problem solutions, state space graphs provide a powerful tool for measuring the structure and complexity of problems and analyzing the efficiency, correctness, and gener- ality of solution strategies.

As one of the originators of the science of operations research, as well as the designer of the first programmable mechanical computing machines, Charles Babbage, a nine- teenth century mathematician, may also be considered an early practitioner of artificial intelligence (Morrison and Morrison 1961). Babbage’s difference engine was a special- purpose machine for computing the values of certain polynomial functions and was the forerunner of his analytical engine. The analytical engine, designed but not successfully constructed during his lifetime, was a general-purpose programmable computing machine that presaged many of the architectural assumptions underlying the modern computer.

In describing the analytical engine, Ada Lovelace (1961), Babbage’s friend, sup- porter, and collaborator, said:

We may say most aptly that the Analytical Engine weaves algebraical patterns just as the Jac- quard loom weaves flowers and leaves. Here, it seems to us, resides much more of originality than the difference engine can be fairly entitled to claim.

Babbage’s inspiration was his desire to apply the technology of his day to liberate humans from the drudgery of making arithmetic calculations. In this sentiment, as well as with his conception of computers as mechanical devices, Babbage was thinking in purely nineteenth century terms. His analytical engine, however, also included many modern notions, such as the separation of memory and processor, the store and the mill in Bab- bage’s terms, the concept of a digital rather than analog machine, and programmability based on the execution of a series of operations encoded on punched pasteboard cards. The most striking feature of Ada Lovelace’s description, and of Babbage’s work in gen- eral, is its treatment of the “patterns” of algebraic relationships as entities that may be studied, characterized, and finally implemented and manipulated mechanically without concern for the particular values that are finally passed through the mill of the calculating machine. This is an example implementation of the “abstraction and manipulation of form” first described by Aristotle and Liebniz.

 

 

CHAPTER 1 / AI: HISTORY AND APPLICATIONS 11

The goal of creating a formal language for thought also appears in the work of George Boole, another nineteenth-century mathematician whose work must be included in any discussion of the roots of artificial intelligence (Boole 1847, 1854). Although he made contributions to a number of areas of mathematics, his best known work was in the mathematical formalization of the laws of logic, an accomplishment that forms the very heart of modern computer science. Though the role of Boolean algebra in the design of logic circuitry is well known, Boole’s own goals in developing his system seem closer to those of contemporary AI researchers. In the first chapter of An Investigation of the Laws of Thought, on which are founded the Mathematical Theories of Logic and Probabilities, Boole (1854) described his goals as

to investigate the fundamental laws of those operations of the mind by which reasoning is performed: to give expression to them in the symbolical language of a Calculus, and upon this foundation to establish the science of logic and instruct its method; …and finally to collect from the various elements of truth brought to view in the course of these inquiries some proba- ble intimations concerning the nature and constitution of the human mind.

The importance of Boole’s accomplishment is in the extraordinary power and sim- plicity of the system he devised: three operations, “AND” (denoted by

 

∗ or

 

∧), “OR” (denoted by

 

+ or

 

∨), and “NOT” (denoted by

 

¬), formed the heart of his logical calculus. These operations have remained the basis for all subsequent developments in formal logic, including the design of modern computers. While keeping the meaning of these symbols nearly identical to the corresponding algebraic operations, Boole noted that “the Symbols of logic are further subject to a special law, to which the symbols of quantity, as such, are not subject”. This law states that for any X, an element in the algebra, X

 

∗X

 

=X (or that once something is known to be true, repetition cannot augment that knowledge). This led to the characteristic restriction of Boolean values to the only two numbers that may satisfy this equation: 1 and 0. The standard definitions of Boolean multiplication (AND) and addition (OR) follow from this insight.

Boole’s system not only provided the basis of binary arithmetic but also demonstrated that an extremely simple formal system was adequate to capture the full power of logic. This assumption and the system Boole developed to demonstrate it form the basis of all modern efforts to formalize logic, from Russell and Whitehead’s Principia Mathematica (Whitehead and Russell 1950), through the work of Turing and Gödel, up to modern auto- mated reasoning systems.

Gottlob Frege, in his Foundations of Arithmetic (Frege 1879, 1884), created a mathematical specification language for describing the basis of arithmetic in a clear and precise fashion. With this language Frege formalized many of the issues first addressed by Aristotle’s Logic. Frege’s language, now called the first-order predicate calculus, offers a tool for describing the propositions and truth value assignments that make up the elements of mathematical reasoning and describes the axiomatic basis of “meaning” for these expressions. The formal system of the predicate calculus, which includes predicate sym- bols, a theory of functions, and quantified variables, was intended to be a language for describing mathematics and its philosophical foundations. It also plays a fundamental role in creating a theory of representation for artificial intelligence (Chapter 2). The first-order

 

 

12 PART I / ARTIFICIAL INTELLIGENCE: ITS ROOTS AND SCOPE

predicate calculus offers the tools necessary for automating reasoning: a language for expressions, a theory for assumptions related to the meaning of expressions, and a logi- cally sound calculus for inferring new true expressions.

Whitehead and Russell’s (1950) work is particularly important to the foundations of AI, in that their stated goal was to derive the whole of mathematics through formal opera- tions on a collection of axioms. Although many mathematical systems have been con- structed from basic axioms, what is interesting is Russell and Whitehead’s commitment to mathematics as a purely formal system. This meant that axioms and theorems would be treated solely as strings of characters: proofs would proceed solely through the application of well-defined rules for manipulating these strings. There would be no reliance on intu- ition or the meaning of theorems as a basis for proofs. Every step of a proof followed from the strict application of formal (syntactic) rules to either axioms or previously proven the- orems, even where traditional proofs might regard such a step as “obvious”. What “mean- ing” the theorems and axioms of the system might have in relation to the world would be independent of their logical derivations. This treatment of mathematical reasoning in purely formal (and hence mechanical) terms provided an essential basis for its automation on physical computers. The logical syntax and formal rules of inference developed by Russell and Whitehead are still a basis for automatic theorem-proving systems, presented in Chapter 14, as well as for the theoretical foundations of artificial intelligence.

Alfred Tarski is another mathematician whose work is essential to the foundations of AI. Tarski created a theory of reference wherein the well-formed formulae of Frege or Russell and Whitehead can be said to refer, in a precise fashion, to the physical world (Tarski 1944, 1956; see Chapter 2). This insight underlies most theories of formal seman- tics. In his paper The Semantic Conception of Truth and the Foundation of Semantics, Tar- ski describes his theory of reference and truth value relationships. Modern computer scientists, especially Scott, Strachey, Burstall (Burstall and Darlington 1977), and Plotkin have related this theory to programming languages and other specifications for computing.

Although in the eighteenth, nineteenth, and early twentieth centuries the formaliza- tion of science and mathematics created the intellectual prerequisite for the study of artifi- cial intelligence, it was not until the twentieth century and the introduction of the digital computer that AI became a viable scientific discipline. By the end of the 1940s electronic digital computers had demonstrated their potential to provide the memory and processing power required by intelligent programs. It was now possible to implement formal reason- ing systems on a computer and empirically test their sufficiency for exhibiting intelli- gence. An essential component of the science of artificial intelligence is this commitment to digital computers as the vehicle of choice for creating and testing theories of intelligence.

Digital computers are not merely a vehicle for testing theories of intelligence. Their architecture also suggests a specific paradigm for such theories: intelligence is a form of information processing. The notion of search as a problem-solving methodology, for example, owes more to the sequential nature of computer operation than it does to any biological model of intelligence. Most AI programs represent knowledge in some formal language that is then manipulated by algorithms, honoring the separation of data and program fundamental to the von Neumann style of computing. Formal logic has emerged as an important representational tool for AI research, just as graph theory plays an indis-

 

 

CHAPTER 1 / AI: HISTORY AND APPLICATIONS 13

pensable role in the analysis of problem spaces as well as providing a basis for semantic networks and similar models of semantic meaning. These techniques and formalisms are discussed in detail throughout the body of this text; we mention them here to emphasize the symbiotic relationship between the digital computer and the theoretical underpinnings of artificial intelligence.

We often forget that the tools we create for our own purposes tend to shape our conception of the world through their structure and limitations. Although seemingly restrictive, this interaction is an essential aspect of the evolution of human knowledge: a tool (and scientific theories are ultimately only tools) is developed to solve a particular problem. As it is used and refined, the tool itself seems to suggest other applications, leading to new questions and, ultimately, the development of new tools.

1.1.4 The Turing Test

One of the earliest papers to address the question of machine intelligence specifically in relation to the modern digital computer was written in 1950 by the British mathematician Alan Turing. Computing Machinery and Intelligence (Turing 1950) remains timely in both its assessment of the arguments against the possibility of creating an intelligent computing machine and its answers to those arguments. Turing, known mainly for his contributions to the theory of computability, considered the question of whether or not a machine could actually be made to think. Noting that the fundamental ambiguities in the question itself (what is thinking? what is a machine?) precluded any rational answer, he proposed that the question of intelligence be replaced by a more clearly defined empirical test.

The Turing test measures the performance of an allegedly intelligent machine against that of a human being, arguably the best and only standard for intelligent behavior. The test, which Turing called the imitation game, places the machine and a human counterpart in rooms apart from a second human being, referred to as the interrogator (Figure 1.1). The interrogator is not able to see or speak directly to either of them, does not know which entity is actually the machine, and may communicate with them solely by use of a textual device such as a terminal. The interrogator is asked to distinguish the computer from the human being solely on the basis of their answers to questions asked over this device. If the interrogator cannot distinguish the machine from the human, then, Turing argues, the machine may be assumed to be intelligent.

By isolating the interrogator from both the machine and the other human participant, the test ensures that the interrogator will not be biased by the appearance of the machine or any mechanical property of its voice. The interrogator is free, however, to ask any questions, no matter how devious or indirect, in an effort to uncover the computer’s identity. For example, the interrogator may ask both subjects to perform a rather involved arithmetic calculation, assuming that the computer will be more likely to get it correct than the human; to counter this strategy, the computer will need to know when it should fail to get a correct answer to such problems in order to seem like a human. To discover the human’s identity on the basis of emotional nature, the interrogator may ask both subjects to respond to a poem or work of art; this strategy will require that the computer have knowledge concerning the emotional makeup of human beings.

 

 

14 PART I / ARTIFICIAL INTELLIGENCE: ITS ROOTS AND SCOPE

The important features of Turing’s test are:

1. It attempts to give an objective notion of intelligence, i.e., the behavior of a known intelligent being in response to a particular set of questions. This provides a standard for determining intelligence that avoids the inevitable debates over its “true” nature.

2. It prevents us from being sidetracked by such confusing and currently unanswerable questions as whether or not the computer uses the appropriate internal processes or whether or not the machine is actually conscious of its actions.

3. It eliminates any bias in favor of living organisms by forcing the interrogator to focus solely on the content of the answers to questions.

Because of these advantages, the Turing test provides a basis for many of the schemes actually used to evaluate modern AI programs. A program that has potentially achieved intelligence in some area of expertise may be evaluated by comparing its performance on a given set of problems to that of a human expert. This evaluation technique is just a variation of the Turing test: a group of humans are asked to blindly compare the performance of a computer and a human being on a particular set of problems. As we will see, this methodology has become an essential tool in both the development and verification of modern expert systems.

The Turing test, in spite of its intuitive appeal, is vulnerable to a number of justifiable criticisms. One of the most important of these is aimed at its bias toward purely symbolic problem-solving tasks. It does not test abilities requiring perceptual skill or manual dexterity, even though these are important components of human intelligence. Conversely, it is sometimes suggested that the Turing test needlessly constrains machine intelligence to fit a human mold. Perhaps machine intelligence is simply different from human intelli- gence and trying to evaluate it in human terms is a fundamental mistake. Do we really wish a machine would do mathematics as slowly and inaccurately as a human? Shouldn’t an intelligent machine capitalize on its own assets, such as a large, fast, reliable memory,

THE INTERROGATOR

Figure 1.1 The Turing test.

 

 

CHAPTER 1 / AI: HISTORY AND APPLICATIONS 15

rather than trying to emulate human cognition? In fact, a number of modern AI practitio- ners (e.g., Ford and Hayes 1995) see responding to the full challenge of Turing’s test as a mistake and a major distraction to the more important work at hand: developing general theories to explain the mechanisms of intelligence in humans and machines and applying those theories to the development of tools to solve specific, practical problems. Although we agree with the Ford and Hayes concerns in the large, we still see Turing’s test as an important component in the verification and validation of modern AI software.

Turing also addressed the very feasibility of constructing an intelligent program on a digital computer. By thinking in terms of a specific model of computation (an electronic discrete state computing machine), he made some well-founded conjectures concerning the storage capacity, program complexity, and basic design philosophy required for such a system. Finally, he addressed a number of moral, philosophical, and scientific objections to the possibility of constructing such a program in terms of an actual technology. The reader is referred to Turing’s article for a perceptive and still relevant summary of the debate over the possibility of intelligent machines.

Two of the objections cited by Turing are worth considering further. Lady Lovelace’s Objection, first stated by Ada Lovelace, argues that computers can only do as they are told and consequently cannot perform original (hence, intelligent) actions. This objection has become a reassuring if somewhat dubious part of contemporary technologi- cal folklore. Expert systems (Section 1.2.3 and Chapter 8), especially in the area of diag- nostic reasoning, have reached conclusions unanticipated by their designers. Indeed, a number of researchers feel that human creativity can be expressed in a computer program.

The other related objection, the Argument from Informality of Behavior, asserts the impossibility of creating a set of rules that will tell an individual exactly what to do under every possible set of circumstances. Certainly, the flexibility that enables a biological intelligence to respond to an almost infinite range of situations in a reasonable if not nec- essarily optimal fashion is a hallmark of intelligent behavior. While it is true that the con- trol structure used in most traditional computer programs does not demonstrate great flexibility or originality, it is not true that all programs must be written in this fashion. Indeed, much of the work in AI over the past 25 years has been to develop programming languages and models such as production systems, object-based systems, neural network representations, and others discussed in this book that attempt to overcome this deficiency.

Many modern AI programs consist of a collection of modular components, or rules of behavior, that do not execute in a rigid order but rather are invoked as needed in response to the structure of a particular problem instance. Pattern matchers allow general rules to apply over a range of instances. These systems have an extreme flexibility that enables rel- atively small programs to exhibit a vast range of possible behaviors in response to differ- ing problems and situations.

Whether these systems can ultimately be made to exhibit the flexibility shown by a living organism is still the subject of much debate. Nobel laureate Herbert Simon has argued that much of the originality and variability of behavior shown by living creatures is due to the richness of their environment rather than the complexity of their own internal programs. In The Sciences of the Artificial, Simon (1981) describes an ant progressing circuitously along an uneven and cluttered stretch of ground. Although the ant’s path seems quite complex, Simon argues that the ant’s goal is very simple: to return to its

 

 

16 PART I / ARTIFICIAL INTELLIGENCE: ITS ROOTS AND SCOPE

colony as quickly as possible. The twists and turns in its path are caused by the obstacles it encounters on its way. Simon concludes that

An ant, viewed as a behaving system, is quite simple. The apparent complexity of its behavior over time is largely a reflection of the complexity of the environment in which it finds itself.

This idea, if ultimately proved to apply to organisms of higher intelligence as well as to such simple creatures as insects, constitutes a powerful argument that such systems are relatively simple and, consequently, comprehensible. It is interesting to note that if one applies this idea to humans, it becomes a strong argument for the importance of culture in the forming of intelligence. Rather than growing in the dark like mushrooms, intelligence seems to depend on an interaction with a suitably rich environment. Culture is just as important in creating humans as human beings are in creating culture. Rather than deni- grating our intellects, this idea emphasizes the miraculous richness and coherence of the cultures that have formed out of the lives of separate human beings. In fact, the idea that intelligence emerges from the interactions of individual elements of a society is one of the insights supporting the approach to AI technology presented in the next section.

1.1.5 Biological and Social Models of Intelligence: Agents Theories

So far, we have approached the problem of building intelligent machines from the view- point of mathematics, with the implicit belief of logical reasoning as paradigmatic of intel- ligence itself, as well as with a commitment to “objective” foundations for logical reasoning. This way of looking at knowledge, language, and thought reflects the rational- ist tradition of western philosophy, as it evolved through Plato, Galileo, Descartes, Leib- niz, and many of the other philosophers discussed earlier in this chapter. It also reflects the underlying assumptions of the Turing test, particularly its emphasis on symbolic reasoning as a test of intelligence, and the belief that a straightforward comparison with human behavior was adequate to confirming machine intelligence.

The reliance on logic as a way of representing knowledge and on logical inference as the primary mechanism for intelligent reasoning are so dominant in Western philosophy that their “truth” often seems obvious and unassailable. It is no surprise, then, that approaches based on these assumptions have dominated the science of artificial intelligence from its inception almost through to the present day.

The latter half of the twentieth century has, however, seen numerous challenges to rationalist philosophy. Various forms of philosophical relativism question the objective basis of language, science, society, and thought itself. Ludwig Wittgenstein’s later philosophy (Wittgenstein 1953), has forced us to reconsider the basis on meaning in both natural and formal languages. The work of Godel (Nagel and Newman 1958) and Turing has cast doubt on the very foundations of mathematics itself. Post-modern thought has changed our understanding of meaning and value in the arts and society. Artificial intelli- gence has not been immune to these criticisms; indeed, the difficulties that AI has encoun- tered in achieving its goals are often taken as evidence of the failure of the rationalist viewpoint (Winograd and Flores 1986, Lakoff and Johnson 1999, Dennett 2005).

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Scrty Strgy & Plcy Exam

· Question 1

2 out of 2 points

   
  One of the processes designed to eradicate maximum possible security risks is to ________________, which limits access credentials to the minimum required to conduct any activity and ensures that access is authenticated to particular individuals.      
 
Selected Answer: Correct

harden

Correct Answer: Correct

harden

 

     

· Question 2

0 out of 2 points

   
  One of seven domains of a typical IT infrastructure is the user domain. Within that domain is a range of user types, and each type has specific and distinct access needs. Which of the following types of users has the responsibility of creating and putting into place a security program within an organization?      
 
Selected Answer: Incorrect

systems administrators

Correct Answer: Correct

security personnel

 

     

· Question 3

2 out of 2 points

   
  Which of the following user types is responsible for audit coordination and response, physical security and building operations, and disaster recovery and contingency planning?      
 
Selected Answer: Correct

security personnel

Correct Answer: Correct

security personnel

 

     

· Question 4

0 out of 2 points

   
  Imagine a scenario in which an employee regularly shirks the organization’s established security policies in favor of convenience. What does this employee’s continued violation suggest about the culture of risk management in the organization?      
 
Selected Answer: Incorrect

that the employee requires further training to gain a deeper knowledge of the policies

Correct Answer: Correct

that the organization lacks a good risk culture wherein employees have “buy in”

 

     

· Question 5

0 out of 2 points

   
  Which of the following user groups has both the business needs of being able to access the systems, network, and application to complete contracted services, and access capability that is limited to particular sections of the systems, network, and application?      
 
Selected Answer: Incorrect

guests and general public

Correct Answer: Correct

vendors

 

     

· Question 6

2 out of 2 points

   
  Security policies that clarify and explain how rights are assigned and approved among employees can ensure that people have only the access needed for their jobs. Which of the following is not accomplished when prior access is removed?      
 
Selected Answer: Correct

minimizes future instances of human error

Correct Answer: Correct

minimizes future instances of human error

 

     

· Question 7

0 out of 2 points

   
  Aside from human user types, there are two other non-human user groups. Known as account types, ________________ are accounts implemented by the system for the purpose of supporting automated service, and ___________________ are accounts that remain non-human until individuals are assigned access and can use them to recover a system following a major outage.      
 
Selected Answer: Incorrect

control partners, system accounts

Correct Answer: Correct

system accounts, contingent IDs

 

     

· Question 8

2 out of 2 points

   
  Which of the following is the most important reason why data needs to be both retrievable and properly stored?      
 
Selected Answer: Correct

Companies need to maintain data or the purpose of keeping an audit trail.

Correct Answer: Correct

Companies need to maintain data or the purpose of keeping an audit trail.

 

     

· Question 9

0 out of 2 points

   
  There are many different types of automated controls that are configured into devices for the purpose of enforcing a security policy. Which of the following is not an automated control?      
 
Selected Answer: Incorrect

network segmentation

Correct Answer: Correct

log reviews

 

     

· Question 10

0 out of 2 points

   
  One of the different manual controls necessary for managing risk is ________________, which is a type of formal management verification. In the process, management confirms that a condition is present and that security controls and policies are in place.      
 
Selected Answer: Incorrect

background checks

Correct Answer: Correct

attestation

 

     

· Question 11

2 out of 2 points

   
  The information security organization performs a significant role in the implementation of solutions that mitigate risk and control solutions. Because the security organization institutes the procedures and policies to be executed, they occupy role of ____________________.      
 
Selected Answer: Correct

subject matter expert (SME)

Correct Answer: Correct

subject matter expert (SME)

 

     

· Question 12

0 out of 2 points

   
  ___________________ are responsible for the monitoring of activities the pre, middle, and post stages of goal implementation, whereas __________________are responsible for the monitoring of activities following the implementation and are called upon to evaluate whether or not the goals have been achieved.      
 
Selected Answer: Incorrect

Project committees, management committees

Correct Answer: Correct

Management committees, government committees

 

     

· Question 13

2 out of 2 points

   
  The executive management has the responsibility of connecting many lines of business to bring resolution to strategy business issues. However, their ultimate responsibility is to ___________________________.      
 
Selected Answer: Correct

enforce policies at the executive and enterprise levels

Correct Answer: Correct

enforce policies at the executive and enterprise levels

 

     

· Question 14

0 out of 2 points

   
  There are number of issues to consider when composing security policies. One such issue concerns the use of security devices. One such device is a ____________, which is a network security device with characteristics of a decoy that serves as a target that might tempt a hacker.      
 
Selected Answer: Incorrect

threat vector

Correct Answer: Correct

honeypot

 

     

· Question 15

0 out of 2 points

   
  A ______________________ is an apparatus for risk management that enables the organization to comprehend its risks and how those risks might impact the business.      
 
Selected Answer: Incorrect

risk mitigation assess self-assessment (RMASA)

Correct Answer: Correct

risk and control self-assessment (RCSA)

 

     

· Question 16

0 out of 2 points

   
  If an organization is creating a customized data classification scheme, it is important to keep in mind the accepted guidelines. Which of the following is not one these guidelines?      
 
Selected Answer: Incorrect

Connect the classification to particular handling requirements.

Correct Answer: Correct

Make recommendations for how audits can be conducted.

 

     

· Question 17

2 out of 2 points

   
  Of the risk management strategies, _________________ refers to the act of not engaging in actions that lead to risk, whereas ____________________refers to acquiescence in regard to the risks of particular actions as well as their potential results .      
 
Selected Answer: Correct

risk avoidance, risk acceptance

Correct Answer: Correct

risk avoidance, risk acceptance

 

     

· Question 18

0 out of 2 points

   
  Despite the fact that there exists no mandatory scheme of data classification for private industry, there are four classifications used most frequently. Which of the following is not one of the four?      
 
Selected Answer: Incorrect

internal

Correct Answer: Correct

moderately sensitive

 

     

· Question 19

2 out of 2 points

   
  When constructing policies regarding data _______________, it is important that these policies offer particular guidance on separation of duties (SOD), and that there are procedures that verify SOD requirements.      
 
Selected Answer: Correct

access

Correct Answer: Correct

access

 

     

· Question 20

0 out of 2 points

   
  The term ________________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term ______________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network.      
 
Selected Answer: Incorrect

data in transit, data on record

Correct Answer: Correct

data at rest, data in transit

 

     

· Question 21

0 out of 2 points

   
  Consider this scenario: A major software company finds that code has been executed on an infected machine in its operating system. As a result, the company begins working to manage the risk and eliminates the vulnerability 12 days later. Which of the following statements best describes the company’s approach?      
 
Selected Answer: Incorrect

The company effectively implemented quality control.

Correct Answer: Correct

The company effectively implemented patch management.

 

     

· Question 22

0 out of 2 points

   
  ___________________ is a term that denotes a user’s capability to authenticate once to access the network and then have automatic authentication on different applications and devices afterward.      
 
Selected Answer: Incorrect

Access control

Correct Answer: Correct

Single sign-on

 

     

· Question 23

2 out of 2 points

   
  The ______________________ denotes the application software and technology that concerns a wide range of topics from the data management to the systems that process information.      
 
Selected Answer: Correct

system/application domain

Correct Answer: Correct

system/application domain

 

     

· Question 24

0 out of 2 points

   
  Domain security control requirements are embodied in several different types of documents. One such document is known as _______________________, which uses a hierarchical organizing structure to identify the key terms and their explanations.      
 
Selected Answer: Incorrect

a guidelines document

Correct Answer: Correct

a dictionary

 

     

· Question 25

0 out of 2 points

   
  A procure document should accompany every baseline document. Which of the following is a true statement about the circumstances for when a procedure document needs to be created to support the baseline document?      
 
Selected Answer: Incorrect

Every device configuration requires a specific procedure, so there needs to be a related procedure document.

Correct Answer: Correct

Because many configuration processes reuse the same procedure, there does not need to be a new procedure document for every configuration.

 

     

· Question 26

2 out of 2 points

   
  An important principle in information security is the concept of layers of security, which is often referred to as layered security, or defense in depth. Which of the following is not an example of a layer of security?      
 
Selected Answer: Correct

a control standard

Correct Answer: Correct

a control standard

 

     

· Question 27

2 out of 2 points

   
  Baseline LAN standards are concerned with network traffic monitoring because no matter how good firewalls and routers can be, they are still not 100% effective. Thus, _________________ offer a wide range of protection because they seek out patterns of attack.      
 
Selected Answer: Correct

intrusion systems

Correct Answer: Correct

intrusion systems

 

     

· Question 28

0 out of 2 points

   
  In general, WAN-specific standards identify specific security requirements for WAN devices. For example, the ____________________ explains the family of controls needed to secure the connection from the internal network to the WAN router, whereas the ______________________ identifies which controls are vital for use of Web services provided by suppliers and external partnerships.      
 
Selected Answer: Incorrect

WAN router security standard, Domain Name System

Correct Answer: Correct

WAN router security standard, Web services standard

 

     

· Question 29

0 out of 2 points

   
  Which of the following control standards in the system/application domain maintains control of both managing errors and ensuring against potentially damaging code?      
 
Selected Answer: Incorrect

authentication

Correct Answer: Correct

developer-related standards

 

     

· Question 30

0 out of 2 points

   
  In order to form an IRT, an organization is required to create a charter; this document identifies the authority, mission, and goals of a committee or team, and there are a number of different types of IRT models for doing this. Which of the following models permits an IRT to have the complete authority to ensure a breach is contained?      
 
Selected Answer: Incorrect

IRT that acts in a coordination role

Correct Answer: Correct

IRT that provides on-site response

 

     

· Question 31

0 out of 2 points

   
  An organization’s _______________________ is a particular group of differently skilled individuals who are responsible for attending to serious security situations.      
 
Selected Answer: Incorrect

disaster recovery plan team (DRPT)

Correct Answer: Correct

incident response team (IRT)

 

     

· Question 32

2 out of 2 points

   
  There are particular tools and techniques that the IRT utilizes to gather forensic evidence, including ____________________, which articulates the manner used to document and protect evidence.      
 
Selected Answer: Correct

chain of custody

Correct Answer: Correct

chain of custody

 

     

· Question 33

2 out of 2 points

   
  While the amount of data known as mission-critical depends on the organization and industry, such data should only represent less than ____________ percent of the data population.      
 
Selected Answer: Correct

15

Correct Answer: Correct

15

 

     

· Question 34

0 out of 2 points

   
  In general, the IRT is comprised of a team with individuals that have different specialties; one such individual is the ___________________, who offers analytical skills and risk management. This specialist has focused forensic skills necessary for the collection and analysis of evidence.      
 
Selected Answer: Incorrect

information technology subject matter experts

Correct Answer: Correct

information security representative

 

     

· Question 35

2 out of 2 points

   
  To measure the effectiveness of the IRT, which of the following does not need to be evaluated?      
 
Selected Answer: Correct

the tests provided to employees to ensure their response to incidents

Correct Answer: Correct

the tests provided to employees to ensure their response to incidents

 

     

· Question 36

2 out of 2 points

   
  ___________________ are attacks that obtain access by means of remote services, such as vendor networks, employee remote access tools, and point-of sale (POS) devices.      
 
Selected Answer: Correct

Insecure remote access

Correct Answer: Correct

Insecure remote access

 

     

· Question 37

0 out of 2 points

   
  In order to build security policy implementation awareness across the organization, there should be ____________________ who partner with other team and departments to promote IT security through different communication channels.      
 
Selected Answer: Incorrect

several IT department specialists

Correct Answer: Correct

multiple executive supporters

 

     

· Question 38

2 out of 2 points

   
  The department responsible for providing security training to new employees is the _______________.      
 
Selected Answer: Correct

HR

Correct Answer: Correct

HR

 

     

· Question 39

0 out of 2 points

   
  A major defense corporation rolls out a campaign to manage persistent threats to its infrastructure. The corporation decides to institute a ___________________ to identify and evaluate the knowledge gaps that can be addressed through additional training for all employees, even administrators and management.      
 
Selected Answer: Incorrect [None Given]
Correct Answer: Correct

needs assessment

 

     

· Question 40

2 out of 2 points

   
  Training that happens in a classroom has many benefits, but which of the following is the one of the most significant drawbacks concerning the instructors’ abilities?      
 
Selected Answer: Correct

Instructors with sufficient expertise are difficult to find.

Correct Answer: Correct

Instructors with sufficient expertise are difficult to find.

 

     

· Question 41

2 out of 2 points

   
  While there are many ways that policy objectives and goals can be described, some techniques are more effective than others for persuading an organization to implement them. Which of the following is not one of the effective techniques for persuading people to follow policy objectives and goals?      
 
Selected Answer: Correct

explaining the careful process of design and approval that went into creating the polices

Correct Answer: Correct

explaining the careful process of design and approval that went into creating the polices

 

     

· Question 42

2 out of 2 points

   
  The goal of employee awareness and training is to ensure that individuals are equipped with the tools necessary for the implementation of security policies. Which of the following is one of the other benefits of a successfully enacted training and awareness program?      
 
Selected Answer: Correct

instituting chances for employees to gather new skills, which can foster enhanced job satisfaction

Correct Answer: Correct

instituting chances for employees to gather new skills, which can foster enhanced job satisfaction

 

     

· Question 43

2 out of 2 points

   
  A ________________ is a technological term used in security policy to describe a future state in which specific goals and objectives have been achieved and which processes, resources, and tools are needed to achieve those goals and objectives.      
 
Selected Answer: Correct

target state

Correct Answer: Correct

target state

 

     

· Question 44

0 out of 2 points

   
  Microsoft domains offer _______________ in order to enhance security for certain departments or users in an organization. This method allows security gaps to close and security settings to be increased for some computers or users.      
 
Selected Answer: Incorrect

configuration management policies

Correct Answer: Correct

group policy

 

     

· Question 45

0 out of 2 points

   
  In order to assess policy compliance, many organizations will use a report card. The evaluation tools are comprised of criteria based on an organization’s requirements. Which of the following is not one the elements that would be included on a report card?      
 
Selected Answer: Incorrect

security settings

Correct Answer: Correct

number of random audits performed

 

     

· Question 46

2 out of 2 points

   
  The window of ________________ is the time between when an opportunity for risk is identified and when the risk is ultimately eliminated by a patch.      
 
Selected Answer: Correct

vulnerability

Correct Answer: Correct

vulnerability

 

     

· Question 47

0 out of 2 points

   
  There are a number of automated tools created by Microsoft that can be used to verify compliance. Once such tool is the ____________________, which is a free download that locates system vulnerabilities by sending queries. This tool can scan multiple systems in a network and maintain a history of reports for all prior scans.      
 
Selected Answer: Incorrect

Nessus

Correct Answer: Correct

Microsoft Baseline Security Analyzer (MBSA)

 

     

· Question 48

0 out of 2 points

   
  There are several different best practices available for implementation when creating a plan for IT security policy compliance monitoring. One such practice is to design a baseline derived from the security policy, which entails _________________.      
 
Selected Answer: Incorrect

using a security policy document as a blueprint

Correct Answer: Correct

using images when feasible in the implementation of new operating systems

 

     

· Question 49

2 out of 2 points

   
  A __________________________ is a term that refers to the original image that is duplicated for deployment. Using this image saves times by eradicating the need for repeated changes to configuration and tweaks to performance.      
 
Selected Answer: Correct

gold master

Correct Answer: Correct

gold master

 

     

· Question 50

0 out of 2 points

   
  In order to ensure compliance, organizations deploy both new and current technologies. Which of the following is not one these new technologies?      
 
Selected Answer: Incorrect

COSO Internal Compliance Framework

Correct Answer: Correct

Common Platform Enumeration (CPE)

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

ENGR 325

FALL 2015

 

 

 

1. (5) What is 5ED4 – 07A4 when these values represent unsigned 16-bit hexadecimal numbers? The

 

result should be written in hexadecimal. Show your work. (P&H 3.1, §3.2)

 

 

 

2. (5) What is 5ED4 – 07A4 when these values represent signed 16-bit hexadecimal numbers stored in

 

sign-magnitude format? The result should be written in hexadecimal. Show your work. (P&H 3.2,

 

§3.2)

 

 

 

3. (5) What is 4365 – 3412 when these values represent unsigned 12-bit octal numbers? The result

 

should be written in octal. Show your work. (P&H 3.4, §3.2)

 

 

 

4. (5) What is 4365 – 3412 when these values represent signed 12-bit octal numbers stored in signmagnitude format? The result should be written in octal. Show your work. (P&H 3.5, §3.2)

 

 

 

5. (5) Assume 185 and 122 are unsigned 8-bit decimal integers. Calculate 185 – 122. Is there

 

overflow, underflow, or neither? (P&H 3.6, §3.2)

 

 

 

6. (5) Assume 185 and 122 are signed 8-bit decimal integers stored in sign-magnitude format.

 

Calculate 185 + 122. Is there overflow, underflow, or neither? (P&H 3.7, §3.2)

 

 

 

7. (5) Assume 185 and 122 are signed 8-bit decimal integers stored in sign-magnitude format.

 

Calculate 185 – 122. Is there overflow, underflow, or neither?

 

 

 

8. (5) Assume 151 and 214 are signed 8-bit decimal integers stored in two’s complement format. Calculate 151 + 214 using saturating arithmetic. The result should be written in decimal. Show work

 

 

 

9. (5) Assume 151 and 214 are signed 8-bit decimal integers stored in two’s-complement format.

 

Calculate 151 – 214 using saturating arithmetic. The result should be written in decimal. Show

 

your work. (P&H 3.10, §3.2)

 

 

 

10. (5) Assume 151 and 214 are unsigned 8-bit integers. Calculate 151 + 214 using saturating

 

arithmetic. The result should be written in decimal. Show your work. (P&H 3.11, §3.2)

 

 

 

 

 

11. (5) As discussed in the text, one possible performance enhancement is to do a shift and add instead

 

of an actual multiplication. Since 9 x 6, for example, can be written (2 x 2 x 2 + 1) x 6, we

 

can calculate 9 x 6 by shifting 6 to the left three times and then adding 6 to that result. Show the

 

best way to calculate 0x33 x 0x55 using shifts and adds/subtracts. Assume both inputs are 8-bit

 

unsigned integers. (P&H 3.17, §3.3)

 

 

 

12. (5) What decimal number does the bit pattern 0x0C000000 represent if it is a two’s complement

 

integer? An unsigned integer? (P&H 3.20, §3.5)

 

 

 

13. (5) If the bit pattern 0x0C000000 is placed in the Instruction Register, what MIPS instruction will be

 

executed? (P&H 3.21, §3.5)

 

 

 

14. (5) What decimal number does the bit pattern 0x0C000000 represent if it is a floating point

 

number? Use the IEEE 754 standard. (P&H 3.22, §3.5)

 

 

 

15. (5) Write down the binary representation of the decimal number 63.25 assuming the IEEE 754 single

 

precision format. (P&H 3.23, §3.5)

 

 

 

16. Write down the binary representation of the decimal number 63.25 assuming the IEEE 754 double

 

precision format. (P & H 3.24, 3.5)

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!