solution

  • How do prototypes influence the opinions of a potential user? Is there a method that you have studied in the academic literature that neutralizes potential users opinions of an end-product.

    • Instructions
      • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
      • Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.
      • Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is a termination from the university.
 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

solution

An educational institute suffers from very low information security in terms of maturity across many elements of infosec and information assurance, including cyber resilience and application of cybersecurity good practice. Data breaches could have the institute puts its reputation at risk, and students expect a high level of protection of their data. It is highly recommended that there is a need to impose a certain level of filtering for the network to be secure to sustain from threats and attacks. To add restrictions on a particular network it is necessary to identify the possible threats to the organization. For example, it is necessary to identify the important services that run on the network. In order to get this done, there is a need to perform scanning on the network to identify the services and ports of the applications. Furthermore, the firewall needs to be configured by adding rules to block and allow the services based on the requirements of the organization and the security perspectives of the network.

Run TCP scan will scan for TCP port like port 22, 21, 23, 445 and ensure for listening port (open) through 3-way handshake connection between the source and destination port. Analyse the ports’ status. – Run UDP Scan where it sending a UDP packet to every destination port; it is a connectionless protocol. A maximum of 8 Nmap commands used with screenshots and results with a very clear discussion

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

solution

  • There are generally three methods of usability evaluation: testing, inspection, and inquiry. Which evaluation framework approach and method do you think yields the greatest success for quickly achieving measurable results.

    • Instructions
      • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
      • Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.
      • Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is a termination from the university.
 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

solution

  1. Expressivity of neural networks. Recall that the functional form for a single neuron is given by y = s( + b, 0), where x is the input and y is the output. In this exercise, assume that x and y are 1-dimensional (i.e., they are both just real-valued scalars) and s is the unit step activation. We will use multiple layers of such neurons to approximate pretty much any function f . There is no learning/training required for this problem; you should be able to guess/derive the weights and biases of the networks by hand.

    1. A box function with height h and width d is the function f(x) = h for 0 < x < d and 0 otherwise. Show that a simple neural network with 2 hidden neurons with step activations can realize this function. Draw this network and Clearly identify all the weights and biases. (Assume that the output neuron only sums up inputs and does not have a nonlinearity.)

    2. Now suppose that f is any arbitrary, smooth, bounded function defined over an interval [-B, B]. (You can ignore what happens to the function outside this interval, or just assume it is zero). Use part a to show that this function can be closely approximated by a neural network with a hidden layer of neurons. You don’t need a rigorous mathematical proof here; a handwavy argument or even a figure is okay here, as long as you convey the right intuition.

    3. Do you think the argument in part b can be extended to the case of d-dimensional inputs? (i.e., where the input x is a vector – think of it as an image, or text query, etc). If yes, comment on potential practical issues involved in defining such networks. If not, explain why not.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"