Write a paper discussing what are the returns on investment for “anti-social responsible investing”?

Develop a literature map of the studies on your topic [Effects of Artificial Intelligence (Public Key Encryption) on Privacy and Security in E-Commerce in the State of Mississippi]. Include in the map the proposed study and draw lines from the proposed study to branches of studies in the map so that a reader can easily see how yours will extend existing literature.
1.Suppose that two individuals, Jon and David, form a community and would like to construct a communal fort that would protect them from attacks. They both consume good X, a private good, and the protection of the fort, P. One unit of good X costs 1 unit of currency, and one unit of P costs 2 units of currency. Both Jon and David have an income of 100 and a utility function of the form:
U = log(Xi) + 2 × log(PJ + PD)
The budget constraint for each is given by:
Xi + 2 × Pi = 100
(a) Find the amount of protection Jon will provide as a function of how much David provides, and explain why the relationship is the way it is.
(b) How much protection P will be privately provided in this case?
(c) Explain the economic intuition behind this amount, and compare it to the socially optimal amount without solving for the socially optimal amount.
2Roads are typically viewed as a public good. However, some highways are financed by tolls levied on drivers instead of through taxes. Discuss why this model works for some roads and not others in terms of the properties of public goods.
3Suppose someone observes that people in areas where residents have more education tend to donate more money for local parks than do people in areas where residents are less well educated, and the observer concludes that education increases altruism. Use what you have learned in this course to evaluate the validity of this conclusion.
• Describe the organization’s environment, and evaluate its preparedness for virtualization.
• Explain Microsoft (or another product) licensing for virtualized environments.
• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Infrastructure as a Service (IaaS) and storage capabilities
Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.
Find an article that discusses attacks on Public Key encryption. Write a one to two page paper on the topic
If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?
Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves?
If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?
Discuss the most important primary sources used in the article. What are the primary sources used? If applied what type of analysis did the author use in conjunction with the primary sources? Did the author look closely at a small number of primary source evidence? Or did the author take examples from a wide range of sources? or something in between? Explain.
Discuss the secondary sources used by the author. Did the author include only sources that supported the argument? or did the article also bring up secondary sources that the author wanted to challenge or refute? Did the author try to resolve a disagreement between secondary sources? How recent are the sources relative to the article’s publication date?
Judge the article: Has the article been citied, has the author written other articles or reviews?
Write a short paragraph (5 sentences or more) indicating the scholastic value. rate the article as if you expect someone with an IT background would read your rating.
At the monthly administrator’s meeting for ABC Early Childhood Center, the regional director shared with you a grant opportunity for early childhood centers to receive a grant of $5000 to remodel your center to stimulate physical activity and promote creativity for your students. The regional director encouraged you all to apply and you have decided to take them up on their suggestion and complete a grant application.
In your grant application:
Essay: We believe that continuing education has the potential to have a significant impact on individuals, their families and/or their communities. Explain what kind of impact you would expect from your completion of this program. You can find any information regarding this program and the related essay by clicking and scrolling down on the following link: https://professionaled.utexas.edu/data-analytics-certificate-program