In this assignment, you should include the specific technology area that you pla

In this assignment, you should include the specific technology area that you pla

In this assignment, you should include the specific technology area that you plan to cover for your final presentation. You can pick any area you find interesting and want to do research on. You should review research information on the topic from the PCC Shatford library or other credible sites through web searches (Google, Bing, DuckDuckGo, Yahoo, etc.) This is not intended to be a “How To” or “Informational” research project but rather why this specific technology will matter in the future to society. Write a two-page (or longer) Word document about the technology or the area of technology you are researching. Grammar, sentence structure, and overall readability will be graded. Use Word to correct any spelling or grammar errors before submitting. The paper should include at minimum a title, a one-paragraph introduction to the topic, two or more paragraphs describing the basis of your research about the topic, and a one-paragraph conclusion about why this technology matters and the potential impact to society in the future. As the final page, create a Works Cited page citing at least 3 resources to support your topic.

Deliverables
Title: The title should reflect what the paper is about. Do not use “Final Project” as a title. That’s too generic!
Introduction: The introduction should briefly describe the topic. The purpose of the introduction is to establish what the reader should expect in the body of the paper.
Body: The body of the paper supports the ideas established in the introduction. Use at least three resources to support the information in your project. Credit the appropriate source when quotes or concepts are paraphrased.
Conclusion: Summarize the main points of the paper. Indicate why this topic interested you and what you learned about the topic you chose.
Works Cited or Bibliography – Give at least 3 resources that you used to support the information in your project. Resources should not be more than three years old and, at a minimum, contain the author(s) name and date and/or the specific link.

Respond to the following in a minimum of 175 words: Discuss digital rights manag

Respond to the following in a minimum of 175 words:
Discuss digital rights manag

Respond to the following in a minimum of 175 words:
Discuss digital rights management. Why do organizations use technology to protect intellectual capital? Describe a typical DRM application that can be used to manage access to digital content. Discus any disadvantages to using DRM.

attached is a screen shot of the work required. I just want a 3-5 minute screen

attached is a screen shot of the work required. I just want a 3-5 minute screen

attached is a screen shot of the work required. I just want a 3-5 minute screen recording of the work load. I do not want any tabs open other then splunk. I do not want to see your task bar or anything besides the splunk window.

A goal is to write professional research report in Controllable Text Generation

A goal is to write professional research report in Controllable Text Generation

A goal is to write professional research report in Controllable Text Generation using Transformer
• Present your report and demonstrate your understanding of the topic and associated SW
tools.
• Perform implementation and explain your work.
Use Vancouver style and follow the instructions attached

Cybersecurity is a growing concern for all Americans.Develop an in-depth analysis of a key problem/challenge in your career field, or other area of interest.

Cybersecurity is a growing concern for all Americans.Develop an in-depth analysis of a key problem/challenge in your career field, or other area of interest.

Cybersecurity is a growing concern for all Americans
Develop an in-depth analysis of a key problem/challenge in your career field, or other area of interest.
• Present your well-researched recommendations for solving this problem in a 5-7 page essay, using 5-7 credible sources.
• Research can be a combination of scholarly print, electronic, Internet, and audio-visual sources. Sources must be credible, so use caution when using Internet sources.
• Include a title page, abstract, references, and table/figure page (these do not count towards the minimum 5-7 pages of text). APA guideline formatting must be used.
• At least one self-created visual aid to present and interpret research data.
♦ The visual will either be a table or a figure and must be original, use research, and be properly cited in APA.
♦ It should appear on a separate page at the end of the essay as a figure or table – review the reading and videos provided in Week 5 and the Visual Citation Example Google doc
• Use only third person point of view (forms of “he,” “she,” “it,” “they,” and “one”)
Persuasive Research Paper Rubric
200 Possible Points
Requirements: 15 Points Possible
The essay shows an understanding of how to format a research essay in appropriate APA style and has the following requirements met: 5-7 pages of text, double-spaced, Times New Roman, pt. 12 font, 1” margins, etc. The essay includes an appropriate title page and an abstract.
Organization and Unity: 30 Points Possible
Uses good paragraph construction, has a solid intro and conclusion and has an easily identifiable thesis. Organizes ideas in a logical, easy-to-follow manner (paragraphs transition smoothly, sentences are clearly written). Material correlates to the thesis.
Critical Thinking/Content: 60 Points Possible
Presents a persuasive stance that convinces readers to support the action or thought without delivering a personal opinion – persuasion is based on research and persuasive techniques. Clearly and thoroughly refutes counterarguments. Solution is presented, limitations addressed. Demonstrates high-level critical thinking.
Research: 25 Points Possible
5-7 credible sources are used. Research is smoothly incorporated into the essay and supports the thesis.
Grammar/Mechanics/Style: 25 Points Possible
Proofreading is evident. No more than a few minor errors in grammar, spelling, mechanics, diction, or syntax. Errors do not disrupt readability. 3rd person narrative only is used.
APA Citations: 25 Points Possible
Shows correct APA formatting of sources, both in-text and on the reference page. All sources are cited. Essay is plagiarism free.
Visual: 20 Points Possible
Draft includes an original visual (table or graph) with data that correlates to the topic, is clearly represented, and formatted in APA on a separate page after the references
Submit in Assignments via the left-hand navigation menu.
Review the Course Calendar for the specific due date.
Important Info

The order was placed through a short procedure (customer skipped some order details).
Please clarify some paper details before starting to work on the order.

Type of paper and subject
Number of sources and formatting style
Type of service (writing, rewriting, etc)

For this paper you will need to login to my wgu.edu account in order to access t

For this paper you will need to login to my wgu.edu account in order to access t

For this paper you will need to login to my wgu.edu account in order to access the virtual machine required to run NMAP and Wireshark and receive the correct output. I will send you my login credentials once you have accepted the paper. You will need to take screenshots at certain times while running NMAP and Wireshark and include them into the paper. Here are the guidelines for the paper as given by the instructor:
In the changing field of cybersecurity, you will need to continually identify new threats to your network as evidenced in the network itself and the traffic on that network. You will need to know how to run network mapping and monitoring software to find vulnerabilities and anomalies that could impact the security of your network in order to recommend sound solutions.
For this task, you will use the virtual world at the “Performance Assessment Lab” web link and access the files and lab environment necessary to run both Nmap and Wireshark on the network associated with this task. You will need to save the output of both Nmap and Wireshark to include in your submission. You will then recommend solutions to address any issues you find.
REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
A. Describe the network topology you found when running Nmap. Include screenshots as evidence of running Nmap.
B. Summarize the vulnerabilities on the network and their potential implications based on your Nmap results.
C. Describe the anomalies you found when running Wireshark, on the network capture file, and include evidence of the range of packets associated with each anomaly.
D. Summarize the potential implications of not addressing each of the anomalies found when running Wireshark.
E. Recommend solutions for eliminating or minimizing all identified vulnerabilities or anomalies from Wireshark and Nmap. Use current, industry-respected, reliable research and sources to support your recommendations for each vulnerability or anomaly.
F. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
G. Demonstrate professional communication in the content and presentation of your submission.

Your text describes five traditional foundations and five approaches to ethics (

Your text describes five traditional foundations and five approaches to ethics (

Your text describes five traditional foundations and five approaches to ethics (pages 67-68). Select one of them to evaluate in your post.
In at least 250 words, discuss the following in your main post.
Expand on the descriiption provided in the text from your perspective.
Give an example of when this approach has been used. Describe the situation and outcome. Did the ethical decision in your example have any derived legal implications? …any cultural implications?
Cited textbook: Whitman, M. E., & Mattord, H. J. (n.d.). Management of Information Security. Retrieved from https://platform.virdocs.com/read/2415691/37/#/4/2[NYNJAGZP2RWPMW1VP091]/10[VHME4VR8T6L3P1RQD850]/10[LBKP6GY6L7VDUFFPZ389],/1:0,/1:0

Deepfakes use AI technology in a number of fairly different ways that impact how

Deepfakes use AI technology in a number of fairly different ways that impact how

Deepfakes use AI technology in a number of fairly different ways that impact how we think about its effect on a person’s privacy. We’ll consider two significantly different uses of AI in this exercise.
The first approach uses AI technology to make small changes to a video captured of a person in a particular situation. The key point here is that the person in the resulting AI-doctored video was actually in that particular situation doing many, but not all of the things shown.
A good example of this approach is the use of AI to create better dubbing of a film into a foreign language (i.e., not the language spoken in the original shoot). The approach works as follows: Given the original film with an actor saying her lines in one language and a video of another actor performing the script in another language, the AI system produces a resulting film where the original actor’s lips are seamlessly replaced with those of the other actor. It would also replace the original actor’s soundtrack with that of the other actor.
You might use this same technology to create a funny video of your family dog saying something, in the way that today’s memes caption a picture or short video of a dog with a humorous saying. You’d need only the video of your dog, a video of you saying the humorous line, and the earlier described dubbing software.
Now let’s consider a different approach. This time, instead of using AI technology to make small changes to a video of a person in a particular situation, we use the technology to make it look like the person was in a completely different situation. The key point here is that the person in the resulting AI-doctored video was never in that situation doing any of the things shown.
An example of this alternative approach is what is done to create revenge-porn videos. The approach works as follows: Given a video of some person in a compromising situation and a collection of videos or digital images of the target person, the AI system produces a video where the target person’s face is seamlessly placed on the head of the actual person in the compromising video. The system may also make changes to the video’s soundtrack to make it even more believable.
Now let’s flip things. Spend a few minutes thinking about harmful uses of the first approach and harmless uses of the second.
Reflect on the ease or difficulty of what we just asked you to do. Categorize the benefits and harms as accruing to an individual or to society. Record your thoughts in the text box below. What you write will NOT be shared with anyone else.