Develop a literature map of the studies on your topic [Effects of Artificial Intelligence (Public Key Encryption) on Privacy and Security in E-Commerce in the State of Mississippi].

Develop a literature map of the studies on your topic [Effects of Artificial Intelligence (Public Key Encryption) on Privacy and Security in E-Commerce in the State of Mississippi]. Include in the map the proposed study and draw lines from the proposed study to branches of studies in the map so that a reader can easily see how yours will extend existing literature.

Explain the economic intuition behind this amount, and compare it to the socially optimal amount without solving for the socially optimal amount.

1.Suppose that two individuals, Jon and David, form a community and would  like to construct a communal fort that would protect them from attacks.  They both consume good X, a private good, and the protection of the fort, P. One unit of good X costs 1 unit of currency, and one unit of P costs 2 units of currency. Both Jon and David have an income of 100 and a utility function of the form:

U = log(Xi) + 2 × log(PJ + PD)
The budget constraint for each is given by:
Xi + 2 × Pi = 100

(a)  Find the amount of protection Jon will provide as a function of how  much David provides, and explain why the relationship is the way it is.

(b) How much protection P will be privately provided in this case?

(c)  Explain the economic intuition behind this amount, and compare it to  the socially optimal amount without solving for the socially optimal  amount.

2Roads are typically viewed as a public good. However, some highways are  financed by tolls levied on drivers instead of through taxes. Discuss  why this model works for some roads and not others in terms of the  properties of public goods.

3Suppose someone observes that people in areas where residents have more  education tend to donate more money for local parks than do people in  areas where residents are less well educated, and the observer concludes  that education increases altruism. Use what you have learned in this  course to evaluate the validity of this conclusion.

Write a paper discussing the challenges your chosen organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.

Write a paper discussing the challenges your chosen organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.

Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Describe the organization’s environment, and evaluate its preparedness for virtualization.
• Explain Microsoft (or another product) licensing for virtualized environments.
• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Infrastructure as a Service (IaaS) and storage capabilities
Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves? attachment Spring2020ISOL536Week4IndividualAssignment4112.docx

Find an article that discusses attacks on Public Key encryption.  Write a one to two page paper on the topic

If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?

Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack?

If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?

Discuss the most important primary sources used in the article.

Discuss the most important primary sources used in the article. What are the primary sources used? If applied what type of analysis did the author use in conjunction with the primary sources? Did the author look closely at a small number of primary source evidence? Or did the author take examples from a wide range of sources? or something in between? Explain.

Discuss the secondary sources used by the author. Did the author include only sources that supported the argument? or did the article also bring up secondary sources that the author wanted to challenge or refute? Did the author try to resolve a disagreement between secondary sources? How recent are the sources relative to the article’s publication date?

Judge the article: Has the article been citied, has the author written other articles or reviews?

Write a short paragraph (5 sentences or more) indicating the scholastic value. rate the article as if you expect someone with an IT background would read your rating.

Describe your current educational setting, including the age of children (0-2, 3-5, or 6-8), number of children you work with, and the philosophy of your education setting.

At the monthly administrator’s meeting for ABC Early Childhood Center, the regional director shared with you a grant opportunity for early childhood centers to receive a grant of $5000 to remodel your center to stimulate physical activity and promote creativity for your students. The regional director encouraged you all to apply and you have decided to take them up on their suggestion and complete a grant application.

In your grant application:

  • 1. Describe your current educational setting, including the age of children (0-2, 3-5, or 6-8), number of children you work with, and the philosophy of your education setting.  You can base this either on the education setting in which you are currently working or you can create a fictitious center.
  • 2. Design the classroom environment that you would create with the grant money that is based on developmentally appropriate strategies and tools to promote optimal cognitive development and learning in young children.  To create your illustration you may use Classroom Architect (Links to an external site.), Scholastic Class Set-Up Tool (Links to an external site.), or Kaplan Floor Planner (Links to an external site.). Attach a copy of your classroom design to your grant proposal.
  • 3. Discuss how the design of your classroom environment aligns with Figure 1.1 from the text and is supported by current research about optimal classroom environments.
  • 4. Explain how the environment you have created would promote optimal physical development and learning in young children in each area of your classroom. Use specific examples from your illustration and research to support your decisions.
  • 5. Explain how the environment you have created would encourage development of the creative self in young children in each area of your classroom. Use specific examples from your illustration and research to support your decisions.
  • 6. Summarize how the grant money will help you to ensure you can create a learning environment that promotes child-centered active learning and 21st-century skills.

Explain what kind of impact you would expect from your completion of this program.

Essay: We believe that continuing education has the potential to have a significant impact on individuals, their families and/or their communities. Explain what kind of impact you would expect from your completion of this program. You can find any information regarding this program and the related essay by clicking and scrolling down on the following link: https://professionaled.utexas.edu/data-analytics-certificate-program