IT 402- Integrated Enterprise Systems questions

Q1:
Comparison between three BPMS product examples “Cordys BPMS” [OpenText Process suit], “Oracle BPM Suite”, and “IBM WebSphere BPM Suite” is provided in book. Your task is to pick any two BMP Suite examples from internet (other than the names BPMS discussed above) and provide comparison between them.
Q2:
Maturity models define five levels of increasing maturity. Discuss the main differences between Level 4 (Predictable Organizations) and Level 5 (Optimizing Organizations).
Q3:
Discuss the purpose of employing business process modeling and notation in organizations, why it is essential, and when should you implement BPMN.
Q4:
Based on the following BPMN diagram:
List the main elements in the diagram.
Illustrate the model scenario and situation.

Discussion question

What is the difference between a deterministic variable versus a probabilistic variable?
What makes one model deterministic and another model probabilistic? Give examples.
Identify and discuss the steps in the decision-modeling process. Give example
Rubric :
Provides concrete
examples from the readings to support postings Integrates prior readings in
postings
Integrates
personal observations and knowledge in an accurate and highly insightful way Presents
new observations
Posts are organized and
information is presented in a logical sequence Word choice and sentence
structure are suitable
Includes 2 or
more outside sources to support and enrich the discussion. Sources are properly
cited in APA format.

Abstract of Qualitative Research Article on Cyberbullying and there Effects

Overview: The term “abstract” is a homophone which can mean one of two scholarly writing activities. One, is the abstract that you will write to introduce your dissertation. The other meaning is a shortened writing assignment whereby you write a condensed summary of an academic journal. For this week, we will focus on writing a scholarly abstract of a qualitative journal. More information about writing an abstract can be found via the web resource “Writing Scholarly Abstracts.”
Directions: View the rubric and examples to make sure you understand the expectations of this assignment. Create a 1-2 (more is fine) page single-spaced Analysis of Research abstract published qualitative scholarly article related to your mock dissertation topic/research question from week 1.
Brevity and being concise are important as this analysis is intended to be a brief summation of the research. Do NOT use direct quotations. All information should be paraphrased synthetically. Do not copy or past from the article itself or its abstract. The abstract assignment in this situation is not like an abstract that appears at the top of most scholarly articles. See the example 2.1 Samples.pdf 2.1 Samples.pdf – Alternative Formats and rubric! Rubric for Abstract.docx Rubric for Abstract.docx – Alternative Formats
Each abstract must therefore consist of the following in this order:
Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.
Author Qualifications – name and qualification of each author conducting the research
Research Concern – one paragraph summary of the reason for the overall research topic
Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research
Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)
Research Methodology – description of the population, sample, and data gathering techniques used in the research
Instrumentation – description of the tools used to gather data (surveys, tests, interviews, etc.)
Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)
Please create a template that uses each of the eight items as the level headings (see samples).

Computer Science Question

TOPIC: DNS attacks
Title
Abstract
Introduction
Previous work
Your Research/what you learned or peaked your interest the most.
Conclusions
Bibliography
Expected is a 5 to 8 page report (This is at least 5 pages of content, not including the Title Page, or Bibliography, Double spaced, 12pt font). Images/Screenshots are encouraged, however, they should not compose of the majority of the document. Also, it is expected that the work be primarily in your own wording. Citation is fine for supporting your work, but the majority of the work should be in your own wording, not quoted and quotes will and images will not count towards the page count.

implement DevOps practices in my case study

The Task is: DevOps is now the project development practice that guarantees good quality, fast product delivery and efficient system integration.
Find a research paper about DevOps practices and use the paper’s suggested method to create your IT project DevOps plan and strategy.
To make your strategy works also find suitable DevOps automated tools. List them in tables with a brief description of each tool.
Adapt your selected DevOps strategies, methods, and tools suitable for your project process.

AI python

IntroductionIn this project, you will implement value
iteration and Q-learning. You will test your agents first on Gridworld
(from class), then apply them to a simulated robot controller (Crawler)
and Pacman.
As in previous projects, this project includes an
autograder for you to grade your solutions on your machine. This can be
run on all questions with the command:
python autograder.py
It can be run for one particular question, such as q2, by:
python autograder.py -q q2
It can be run for one particular test by commands of the form:
python autograder.py -t test_cases/q2/1-bridge-grid
The code for this project contains the following files, available as a zip archiveDownload zip archive.
Files you’ll edit:valueIterationAgents.pyA value iteration agent for solving known MDPs.qlearningAgents.pyQ-learning agents for Gridworld, Crawler and Pacman.analysis.pyA file to put your answers to questions given in the project.Files you should read but NOT edit:mdp.pyDefines methods on general MDPs.learningAgents.pyDefines the base classes ValueEstimationAgent and QLearningAgent, which your agents will extend.util.pyUtilities, including util.Counter, which is particularly useful for Q-learners.gridworld.pyThe Gridworld implementation.featureExtractors.pyClasses for extracting features on (state, action) pairs. Used for the approximate Q-learning agent (in qlearningAgents.py).Files you can ignore:environment.pyAbstract class for general reinforcement learning environments. Used by gridworld.py.graphicsGridworldDisplay.pyGridworld graphical display.graphicsUtils.pyGraphics utilities.textGridworldDisplay.pyPlug-in for the Gridworld text interface.crawler.pyThe crawler code and test harness. You will run this but not edit it.graphicsCrawlerDisplay.pyGUI for the crawler robot.autograder.pyProject autogradertestParser.pyParses autograder test and solution filestestClasses.pyGeneral autograding test classestest_cases/Directory containing the test cases for each questionreinforcementTestClasses.pyProject 3 specific autograding test classesFiles to Edit and Submit: You will fill in portions of valueIterationAgents.py, qlearningAgents.py, and analysis.py during the assignment. Please do not change the other files in this distribution or submit any of our original files other than these files.
Evaluation: Your code will be autograded for technical correctness. Please do not
change the names of any provided functions or classes within the code,
or you will wreak havoc on the autograder (to the detriment of your
score). However, the correctness of your implementation – not the
autograder’s judgments – will be the final judge of your score. If
necessary, we will review and grade assignments individually to ensure
that you receive due credit for your work.
Academic Dishonesty:
We will be checking your code against other submissions in the class
for logical redundancy. If you copy someone else’s code and submit it
with minor changes, we will know. These cheat detectors are quite hard
to fool, so please don’t try. We trust you all to submit your own work
only; please don’t let us down. If you do, we will pursue the strongest consequences available to us.
Getting Help:
You are not alone! If you find yourself stuck on something, contact the
course staff for help. Office hours are there for your support; please
use them. If you can’t make our office hours, let us know and we will
schedule more. We want these projects to be rewarding and instructional,
not frustrating and demoralizing. But, we don’t know when or how to
help unless you ask.
MDPsTo get started, run Gridworld in manual control mode, which uses the arrow keys:
python gridworld.py -m
You will see the two-exit layout from class. The blue dot is the agent. Note that when you press up, the agent only actually moves north 80% of the time. Such is the life of a Gridworld agent!
You can control many aspects of the simulation. A full list of options is available by running:
python gridworld.py -h
The default agent moves randomly
python gridworld.py -g MazeGrid
You should see the random agent bounce around the grid until it happens upon an exit. Not the finest hour for an AI agent.
Note:
The Gridworld MDP is such that you first must enter a pre-terminal
state (the double boxes shown in the GUI) and then take the special
‘exit’ action before the episode actually ends (in the true terminal
state called TERMINAL_STATE, which is not shown in the
GUI). If you run an episode manually, your total return may be less than
you expected, due to the discount rate (-d to change; 0.9 by default).
Look at the console output that accompanies the graphical output (or use -t for all text). You will be told about each transition the agent experiences (to turn this off, use -q).
As in Pacman, positions are represented by (x,y) Cartesian coordinates and any arrays are indexed by [x][y], with ‘north’ being the direction of increasing y, etc. By default, most transitions will receive a reward of zero, though you can change this with the living reward option (-r).
Question 1 (4 points): Value IterationRecall the value iteration state update equation:

Write a value iteration agent in ValueIterationAgent, which has been partially specified for you in valueIterationAgents.py.
Your value iteration agent is an offline planner, not a reinforcement
learning agent, and so the relevant training option is the number of
iterations of value iteration it should run (option -i) in its initial planning phase. ValueIterationAgent takes an MDP on construction and runs value iteration for the specified number of iterations before the constructor returns.
Value iteration computes k-step estimates of the optimal values, Vk. In addition to runValueIteration, implement the following methods for ValueIterationAgent using Vk.
computeActionFromValues(state) computes the best action according to the value function given by self.values.
computeQValueFromValues(state, action) returns the Q-value of the (state, action) pair given by the value function given by self.values.
These
quantities are all displayed in the GUI: values are numbers in squares,
Q-values are numbers in square quarters, and policies are arrows out
from each square.
Important: Use the “batch” version of value iteration where each vector Vk is computed from a fixed vector Vk−1
(like in lecture), not the “online” version where one single weight
vector is updated in place. This means that when a state’s value is
updated in iteration
k based on the values of its successor states, the successor state values
used in the value update computation should be those from iteration k−1 (even if some of the successor states had already been updated in iteration k). The difference is discussed in Sutton

Need help in homework

Assignment:
Provide a reflection on Artificial Intelligence at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

integrated enterprise systems

You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.

implement DevOps practices in my case study

The Task is: DevOps is now the project development practice that guarantees good quality, fast product delivery and efficient system integration.
Find a research paper about DevOps practices and use the paper’s suggested method to create your IT project DevOps plan and strategy.
To make your strategy works also find suitable DevOps automated tools. List them in tables with a brief description of each tool.
Adapt your selected DevOps strategies, methods, and tools suitable for your project process.

Problem sloving

Question 1 (10 pts): Prove that, if every user code is orthogonal to every other user code in CDMA, unwanted signals can easily be filtered out. Note: you have to show me a generalize proof. Showing me examples of three or more instances or examples is NOT a proof!

Question 3 (10 pts): Using the Hamming algorithm, determine whether the received 24-bit Hamming code 0x616FB3 is error-free. If it is not error-free and assuming that there is no error masking, fix the error. Note: read the binary values from left to right, i.e. the leftmost bit is bit # 1

Question 4 (10 pts): Using CRC, calculate the transmitted data for a message M = 1011011101001010 and a dividing polynomial P = x5 x3 x2 1.

implement DevOps practices in my case study

The Task is: DevOps is now the project development practice that guarantees good quality, fast product delivery and efficient system integration.
Find a research paper about DevOps practices and use the paper’s suggested method to create your IT project DevOps plan and strategy.
To make your strategy works also find suitable DevOps automated tools. List them in tables with a brief description of each tool.
Adapt your selected DevOps strategies, methods, and tools suitable for your project process.

Power Point presentation

Hello there. I have to do a presentation about anything on computer culture. it’s 10 minutes presentation. It need to be organized and scripted. If you have any topic that will help that’s fine but I have an idea for the topic (Kaspersky security)
the grading
Grade A:Organization and development: Topic, purpose, and content are expertly fitted to audienceand setting and presentation is easy to follow.Vocal delivery: Speaker projects and articulates exceptionally; there are no distractions (i.e.slang pauses, umms) that detract from the presentation.Relevance and novelty: Topic is interesting, gives insight, is not obvious, is sufficientlydetailed, and was not covered by another student previously.

Power Point presentation

Hello there. I have to do a presentation about anything on computer culture. it’s 10 minutes presentation. It need to be organized and scripted. If you have any topic that will help that’s fine but I have an idea for the topic (Kaspersky security)
the grading
Grade A:Organization and development: Topic, purpose, and content are expertly fitted to audienceand setting and presentation is easy to follow.Vocal delivery: Speaker projects and articulates exceptionally; there are no distractions (i.e.slang pauses, umms) that detract from the presentation.Relevance and novelty: Topic is interesting, gives insight, is not obvious, is sufficientlydetailed, and was not covered by another student previously.

IT 402integrated enterprise systems

You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.

According to the ERD, Identify Entities, Discover the semantic relationships between entities, and • Descriiption. Define the data requirement

According to the ERD, Identify Entities, Discover the semantic relationships between entities, and • Descriiption. Define the data requirement of your entities. For example:
• Student Entity: Members of the public who register and pay for courses are considered students. The data stored on each student includes student number, name, address, email address, previous classes, and experience. Also stored is the date for registration and the classes they are registered in. The student number is unique for each student.
• Course Entity: The school offers a variety of Online design courses through its website (these are considered course, not the on-location seminars). The data stored on each course includes the course number, the name of the course, the course descriiption, and prerequisites (if any). The course number is unique, etc.

Toastmasterstool Box Using Python Or Java

Toastmaster Toolbox You are tasked with designing, documenting, and implementing a Toastmasters Toolbox system. This system is intended to aid a presenter during a Toastmasters speech. The core features that are required of this system are described below. You are responsible for the details of the system.
Core Features:
Facial Expression Analysis • The system SHALL provide a mirror display to the presenter utilizing a webcam. • The system SHALL analyze the presenter’s facial expressions and provide feedback and cues based on the perceived mood of the presenter.
Speech Disfluency Feedback • The system SHALL provide a means for a designated “Ah-Counter” (or “AhCounters”) to indicate when a speech disfluency (ah, um, etc.) was spoken by the presenter. • The presenter SHALL receive this feedback in real time via a visual cue and audio cue on a presenter display. • The “Ah Counter” SHALL use a separate networked PC from the presenter.
Timing Cue • The system SHALL provide timing cues to the presenter indicating how much time remains in the allotted speaking time. • The system SHALL provide warnings when reaching the end of the allotted time. • The system SHALL support user configurable speaking times and thresholds for warning via the GUI.
Reporting • The system SHALL display a report to the presenter at the end of the speech. • The report SHALL be able to be saved to a file and viewed later.
Additional Features
Grammar Analysis – This feature will analyze the user’s usage of vocabulary and grammar principles and offer suggestions.
– Speech Upload – A prewritten speech will be uploaded in the system. Then the user can see the speech and read it.
– Reminders – The presenter can the event details and the system can remind him of the event

Computer Science Question

Hello,
Please answer the following exercise in word document
Exercise 1
Submit your answers to the exercise questions at the end of chapter 1 in the free text book in a single Word document. Do not include the questions. Use your own words.
Note :: Textbook attached below
===========================================================
SQLZoo1
Submit screenshots of your successful completion of SELECT basics and the quiz. Please copy and paste into one word document.

Computer Science Question

Question 1
Comparison between three BPMS product examples “Cordys BPMS” [OpenText Process suit], “Oracle BPM Suite”, and “IBM WebSphere BPM Suite” is provided in book. Your task is to pick any two BMP Suite examples from internet (other than the names BPMS discussed above) and provide comparison between them.
Answer:
Question 2
Maturity models define five levels of increasing maturity. Discuss the main differences between Level 4 (Predictable Organizations) and Level 5 (Optimizing Organizations).
Answer:
Question 3
Discuss the purpose of employing business process modeling and notation in organizations, why it is essential, and when should you implement BPMN.
Answer:
Question 4
Based on the following BPMN diagram:
List the main elements in the diagram.
Illustrate the model scenario and situation
Answer:

NA Pr K – Organizational dynamics module 1 discussion

Hello,
Please answer the below discussion in 350 words inn word document
Module 1 Discussion
Prompt
Now that you have read Chapters 1–4, form an educated opinion on the question posted below:
Based on the learning resources this week, provide justification for why the study of organizational behavior matters. Identify one to two challenge(s) and one to two opportunities that exist for organizational behavior.
Be sure to review the sample post before creating your post to ensure you understand what is expected. Include citations from resources that you have read that will support your position here.
“ https://2012books.lardbucket.org/books/an-introduc… “ chapter link

NA Nithya – Organizational dynamics module 1 discussion

Hello,
Please answer the below discussion
Module 1 Discussion
Prompt
Now that you have read Chapters 1–4, form an educated opinion on the question posted below:
Based on the learning resources this week, provide justification for why the study of organizational behavior matters. Identify one to two challenge(s) and one to two opportunities that exist for organizational behavior.
Be sure to review the sample post before creating your post to ensure you understand what is expected. Include citations from resources that you have read that will support your position here.
“ https://2012books.lardbucket.org/books/an-introduc… “ chapter link