Categories
post

Excel Practice: Two Sample T-Test and One-Way ANOVA

Prompt: For all Excel Practice assignments, submit only ONE Excel document but answer each question on separate worksheets within the document.
(Worksheet 1) Using the data in the file named Chapter 12: Data Set 2, test the null hypothesis that urban and rural residents both have the same attitude toward gun control. Use the T.TEST function to test the hypothesis. Assume that the variance from each group is equal. Create the table and write the APA description following the example in How to Do a Two Sample (Independent) t-Test in Excel 2016: Worksheet 2) Using the data in Chapter 14: Data Set 1 and Excel, compute the F-value for a comparison among the three levels representing the average amount of time that swimmers practice weekly (<15 hours, 15–25 hours, and >25 hours), with the dependent or outcome variable being their time for the 100-yard freestyle. Answer the question of whether practice time makes a difference. Use the Data Analysis tools and follow the example How to Perform A One-Way ANOVA Test in Excel:

Categories
post

“Exploring the Impact of Social Media on Society” 1. How has the rise of social media affected our communication and relationships with others? 2. In what ways has social media influenced our perceptions of self-image and self-worth? 3

The presentation should be no more than 20 minutes. develop at least 3 discussion questions at the end that your classmates can respond to.

Categories
post

“Exploring the Value of a Social Science Lens in Understanding Technology: Examining BCIs and Drones”

For your response posts, address the following: Provide feedback on their topic analysis.
Describe the value of the social science lens for understanding technology. _________________________________________________________________
PEER POST # 1 Social science insights into the one-size-fits-all brain-computer interface (BCI) program’s development may enhance our knowledge of the technology and its implications: Inclusion and accessibility are common themes in social science research. By recognizing the different requirements and capacities of users, including those with disabilities, a one-size-fits-all BCI program emphasizes the need for accessible technology. Understanding the social dynamics of inclusion may show how this development promotes equality and technology-driven activities. Technological advances’ ethical effects are studied in social science. BCIs may raise consent, privacy, and autonomy concerns. What privacy protections do the BCI program take with user data? These ethical issues help us grasp BCI technology’s dangers and obligation. Social science studies may illuminate how society embraces new technology. Understanding social views regarding BCIs may help predict stigma and technological anxiety. Developers may improve BCI acceptability and trust by addressing these challenges early on. Culture affects technology uptake and usage. Social science study may explore how cultural values affect BCI views and implementation in various societies. Cultural context helps developers adjust BCI programs to varied communities’ requirements and preferences. Technology policy are influenced by social science. BCIs may need to address data privacy, informed consent, and technological equity. Understanding social and regulatory issues helps create and implement BCI programs ethically.
By putting a social science lens to the one-size-fits-all BCI program creation illuminates accessibility, ethics, societal acceptability, cultural relevance, and governance. These larger social consequences help us comprehend BCI technology and deploy it responsibly and equitably.
PEER POST # 2
Our technology has come a long way, as shown by drones. It can help countries that aren’t as well off or technologically advanced as we are by getting the word out to their people earlier about weather and natural disasters. This could help them save more lives and protect more of their things. When people who live in storm-prone places get more time to get ready, they may feel less afraid to leave their homes. This is because they will know sooner rather than later if needed.
Examining drones from a social science perspective is a highly alarming subject that needs to be discussed as soon as possible. Drones are becoming more and more common in civilian applications, however even with these advantages, there remain concerns because drones can take, distribute, and keep pictures of people and activities that adhere to undefined rules. The primary issues raised by drone use are mostly related to the regulatory loopholes that now exist and the difficulties of enforcing established norms.
According to what I understand, the social science lens provides a broader perspective that improves our comprehension of technology. It acknowledges the significance of the social and cultural settings in which scientific discoveries are made and put into practice, in addition to the advances. We may critically assess technology’s advantages and possible drawbacks by viewing it through a lens, which results in more comprehensive and well-informed knowledge.

Categories
post

“Implementing a Secure Chat Application using UDP and TCP Sockets in C/C++ on Unix Environment” Chit Chat Client and Server Communication Design Chat Client-Server Implementation with Fork() Function

Objectives:
To implement a client and a server application using UDP and TCP sockets;
To use C/C library functions for implementing socket applications;
To get familiarized with the Unix programming environment.
Introduction:
For this project, you will be writing programs that will implement Chit, a secure chat application between two users using TCP socket streams. A Chit chat communication will be implemented using end-to-end encryption on messages exchanged between users.
You may use the Public Key (PK) Server program from Project 1 to manage the users’ public keys.
You will be writing an Address Server program to manage the “listening” addresses of the client processes being used by individual users who are currently logged in. Chit chat clients should look up another user’s “listening” address to enable a direct chat with that other user. All user-to-user communication should be through a TCP socket and all communication between a client and the servers will be through UDP sockets. All Chit chats between users should be encrypted using RSA public key encryption (PKE).
The components to this programming project are:
A. Chit Chat Client:
Provides a user interface that implements secure communication with other Chit users through TCP sockets.
Performs chat message encryption and decryption using RSA PKE.
B. Public Key Server:
Manages users’ public-key.
Communicates with Chit clients through UDP sockets.
C. Address Server:
Maintains the listening addresses of Chit users who are currently logged-in.
Communicates with Chit clients through UDP sockets.
Description:
Secure communication requires a Chit client to encrypt a message using the recipient user’s public key. Therefore, a user must register their public key with the Public Key server before sending a login message to the Address server.
In order to allow any two client processes to communicate with each other, the initiating client must have the “listening” TCP port number (and IP address) that the other client is using for receiving messages.
During login, the client process should send a message to the Address server containing the user’s userid and the TCP port number it will be listening on. The Address server should store this information for each logged in user. A user could then determine who are currently logged in by having the client process send a who query to the Address server. The server should then respond with the corresponding list of userids from users who have sent a login message. A user then has the option to initiate a Chit chat session with another user or wait for a request to chat from another user. A chat request should be performed by first sending an “address lookup” message for a particular userid to the server. The server then responds with the corresponding address information (IP address and TCP port number), which the initiating client could then use to setup a direct TCP connection with the other client. The receiving user should be given the option to accept or decline the request to chat. If the chat request was accepted, the two users should be able to chat directly by sending their messages over a TCP connection.
Before messages can be exchanged, each user must send a request for the recipient user’s key from the Public Key server. All messages should be encrypted before transmission during a chat session.
You only need to implement a one-to-one chat session for this programming project, i.e., the user need not be able to receive another chat request while participating in a “chat” session. Either user can terminate the chat session by sending an end-of-file character or CTRL-D. Each client should be able to send or receive another chat request after each session without terminating the process. Each client should also send a logout message to the server before exiting to allow the server to clear any entries corresponding to the user. Messages between client and server should be implemented using only UDP sockets.
You are expected to design the structure of the messages exchanged between a client and the server and messages between clients.
Procedure:
A. Chit Chat Client
The Chit chat client process should perform the following activities:
Register keyA client should register a public key to the Public Key server once with the corresponding user’s ID.
Wait to receive an acknowledgement message to confirm registration was
Login messageA client should automatically send a login message to the server at startup to allow the Address server to store user’s ID, “listening” TCP port, and IP
An acknowledgement message should be received from the server to confirm login information.
Who queryThe user should be able to send a who query to the server, between chat sessions, for the list of users who are currently logged in.
The received list should then be displayed for the user.
Initiate a Chit chat sessionThe user should be able to initiate a chat session with another user who is currently logged in.
This should be accomplished by the client process first sending an address lookup request to the server, and using the received information to initiate a chat request directly with the other user.
Receive Chit chat requests The user should be able to receive chat requests from other Chit users.
The user need not be able to receive chat requests while engaged in a chat session.
Request public keyThe user should be able to send a request for public to the Public Key server, at the beginning of a chat.
Exchange secure Chit chat messagesSend encrypted messages using recipient’s public key
Decrypted received messages using own private key
Accept/Decline Chit chat requestsOnce a TCP connection has been established, the receiving user should be given the option to accept or decline the request before any messages are received. The TCP connection should be terminated when a request to chat is declined.
Send logout message to the serverBefore a client exits, it should automatically send a logout message to the server to allow the server to clear any entries corresponding to the user.
Quit The user should be able to quit at any time using a quit command (not Ctrl-C).
B. Public Key Server
The Public Key server process performs the following activities. The server should maintain a table of public keys that have been registered and a table to store all messages.
Process key registrationReceive register key messages from Chit clients
Store the received for each registered user
Process key requestsReceive request public key messages from Chit clients
Respond with the requested in the response public key message
C. Address Server
The Address server process performs the following activities:
Receive login messages from clientsThe server should maintain a table of TCP addresses for all users who are currently logged-in.
Receive who queries from clientsThe server should be able to receive who queries from clients and process each accordingly.
Send login list to clientsWhen the server receives a who query from a client, the server should immediately respond with a message containing the list of users who are currently logged in.
Receive logout messages from clientsThe server should clear the entry in its table of addresses for every client who logs out and send an acknowledgement.
Each running process should display messages describing pertinent activities as they occur (i.e, display a message describing what message has been sent or received whenever each happens). This is particularly important and useful in verifying the correctness of your programs.
Lastly, the Chit client, Public Key server, and Address server processes should behave sensibly when dealing with exceptional conditions.
For Graduate Credit: To obtain graduate credit for this project, your programs should have the following additional functionalities:
Address Server: Upon receiving a login message, the server should also send to the client process the list of userids of currently logged in users as part of its acknowledgement message. In addition, for each login message received, the server should also send a notification to all other currently logged in users the userid of newly logged in user.
Chat Client: The client process should be able to receive the list of userids sent by the server for display to the user. All clients should also be able to receive notification messages from the server at any time (while idle or while actively participating in a chat session).
Implementation:
Two separate processes will be needed to enable a client to perform the various activities needed to communicate with the server, another client, and interact with the user. To enable a client to do this, the parent process should be given the responsibility of interacting with the user and communicating with the server while a child process must be fork()ed to handle the receiving of messages from another client. (Note to graduate students: You’ll need another child process to receive the notifications from the server.)
Below are sample code to demonstrate the use of the fork()function.
/* Sample1: This program illustrates the use of the fork() function. Note how the two processes do not share the contents of memory variable ptr.*/
#include
#include
void main ()
{
int x;
int * ptr;
ptr = &x;
if (fork() == 0){
for (x=1; x < 5; x ){ printf("child: %dn", (*ptr) ); } exit(0); } for (x=1; x < 5; x ){ printf("parent: %dn", (*ptr) ); } } /* Sample2: This program illustrates the use of the fork() function. Note how the two processes share the contents of memory variable ptr using the mmap() function.*/ #include
#include
void main ()
{
int x;
int * ptr;
ptr=mmap(NULL,sizeof(int),PROT_READ|PROT_WRITE,MAP_SHARED|MAP_ANON,-1,0);
if (fork() == 0){
for (x=1; x < 5; x ){ printf("child: %dn", (*ptr) ); sleep(1); } exit(0); } for (x=1; x < 5; x ){ printf("parent: %dn", (*ptr) ); sleep(1); } } Submission Requirements: You may work with a partner for this activity. You are allowed to modify the given echo client/server programs. (Review the course policy on Academic Dishonesty.) All code should be written in GNU C or C++ Make sure you provide sufficient documentation in the form of comments, white space, readable identifiers, and a README text file describing the system operation (i.e., how to compile and run each program) and its components. Store all source code and the README file in a folder called your_last_name(s) Project2. Use zip to compress the entire folder and upload your file using the designated project submission Grading Criteria: Documentation 10% ImplementationCorrectness 65% User interface 25%

Categories
post

Title: The Role of AI in Business Intelligence: Evolution, Applications, and Analysis of ChatGPT for Strategic Decision-Making

Background: Companies face many strategic decisions, such as what product lines to offer, what type of customers to target, and where to invest time and resources. Strategic decisions often involve millions or billions of dollars and may impact the long-term viability of a company. A wrong decision based only on gut feel could spell disaster. In addition, companies face many tactical decisions involving the profitability of specific product lines, customer segments, and individual locations. Operational decisions are those made daily, such as what materials need to be reordered.
ChatGPT is an artificial intelligence (AI) system known as a large language model (LLM). Large language models involve software that can discern word and sentence patterns after reading millions of pages of text. These AI systems are designed to produce grammatically and syntactically correct responses, but the results are not always factually correct. Just as a customer relationship management system cannot be used for the computer-aided design of new products, AI systems generally can do only one or two things. For instance, a specific AI system can generate English-language responses or identify faces in pictures and videos, but not both. Even though people can easily do many different things, individual AI systems cannot. ChatGPT was not designed as a business intelligence tool, so it cannot necessarily analyze data specific to a particular company. However, it can describe how AI technology could be used for business analysis.
Assignment: This assignment aims to understand how AI can be used as a business intelligence tool to improve tactical and strategic decision-making.
Research and describe the evolution of AI for natural language processing (NLP) from rule-based systems, to statistical models, to neural networks. Identify the information sources fed into ChatGPT to train the system. Include in-text citations.
Specify a decision necessary for the company you chose in Week 1. Determine the source of the data that an AI system would need to address your decision.
Ask ChatGPT, or another AI system, to describe how AI could be used to improve business intelligence for your Week 1 company. After you get a response, ask the AI system to explain at least one of its suggestions. Copy and paste the entire AI conversation including your questions and its answers (up to the first ten pages) into the appendix of your paper.
Summarize and analyze the AI chat in the body of your paper. Determine if the responses from the AI were accurate. Identify whether the AI responses focused on strategic, tactical, and/or daily operational decisions. Based on the AI responses and your own research, describe how AI might be used to address the important decision you identified above.
This paper must follow the formatting guidelines in The Publication Manual of the American Psychological Association (2020), (7th ed.) using Times New Roman 12-point font. The paper, as a minimum, must contain:
A title page as described here: https://apastyle.apa.org/style-grammar-guidelines/… to an external site.
Three to four pages of text-based content with in-text citations for sources used in your paper.
One or more reference pages in APA format. (Only sources cited in the paper should appear on the reference page.)
An appendix that includes up to 10 pages of your conversation with an AI system.

Categories
post

Title: “The Moral Imperative of a Path to Citizenship for Undocumented Immigrants in the United States”

Question: Should the US Government provide a path to citizenship for undocumented immigrants?
Thesis: Create and develop your position statement.
Make it compelling, debatable, focused and specific.
Sources: Use at least three sources (must be from class). Document only the sources you use in your paper. Apply MLA style (in-text citations and works cited page). MLA Formatting and Style Guide – Purdue OWL You are free to use outside sources in addition to the sources from class.
MORE DIRECTIONS ATTACHED

Categories
post

Research Question and Hypothesis: The research question for this study is: How does social media usage affect self-esteem in young adults? The hypothesis is that increased social media usage will be associated with lower levels of self-esteem in young adults. Setting

add the next three sections to your methodology Be sure to be extremely specific in your descriptions. We want the readers to not only clearly understand what you will be doing, but set the study up to be replicated in the future. Please address each part of the outline below clearly using APA format. Show evidence of your revisions using the highlighter tool. If you received a 100%, leave a short note stating that and highlight it as well.
Research Question and Hypothesis – this is from week 1. If you are using the final project template, this would be included anyway, but make sure this is stated in your week 2 and week 3 assignments.
Setting – Where will you conduct your study? Will it be conducted online (e.g. survey research) or in-person? If it is in-person, will it be in a controlled environment (e.g. lab) or in a more natural setting (e.g. public park)?If this will be conducted in-person, give a specific location, even if it is hypothetical. Never make the location personal, like your home.
If the study will be conducted online, provide a website, like Survey Monkey, and include a URL. This may also be hypothetical.
Participants -What is your population and sample size? What type of sample is it? (e.g. random sample; purposive sample; convenience sample)
What are their demographics (age range, ethnicities, gender distribution, etc)? Why have you chosen them? What are the eligibility requirements for your study?
Measure(s) – What are the variables used in your study, and how will you measure those variables? (e.g. standardized scale, observation, interview). access the database called PsycTests. , find an appropriate psychometric test to assess the behavior you are trying to measure in your study. You should include a description of the test. This may include relevant measures, observations, scales, questionnaires, observation guides, and document characteristics. If you will be using physical instruments only (like a blood pressure cuff), find as much descriptive information as you can on those items. When in doubt, consult your instructor if you are not sure how to proceed.

Categories
post

“The Power of Authentic Leadership: A Review and Reflection on Peter Northouse’s Article” In his article “Authentic Leadership: A Review and Reflection,” published in the Harvard Business Review, Peter Northouse explores the concept of authentic leadership and its impact

Leadership paper. Read an article relevant to leadership, and write a two-page paper about the 6 article. The article should be from one of these: Harvard Business Review, California Management Review, and MIT Sloan Management Review. The article you will read must be at least 5 pages long. On the first page, summarize the article, and on the second page, discuss your reaction to the article. When discussing your reaction, be sure to use two concepts from the textbook-ch.14. When submitting your paper, you should also submit a copy of the article you read in a separate file.
textbook: 1) (Required) Textbook: Management: A Practical Introduction (10th Edition) By Angelo Kinicki, Denise Breaux Soignet ISBN10: 1260735168 | ISBN13: 9781260735161

Categories
post

“The Importance of Resilience: Overcoming Adversity in Life”

as long as the