This is a research/dissertation at the PhD level for developing an AI model to g

This is a research/dissertation at the PhD level for developing an AI model to generate a high vulnerability score for internal users suspected of leaking data over social media platforms. This model combines data from other sources, primarily spam emails and interactions on Twitter or X. I have drafted Chapters 1, 2, and 3. This work contains a lot of AI content that requires proofreading and corrections to ensure originality and clarity, as well as to make the content plagiarism-free while maintaining its integrity and context

Your research has helped you understand how your area of focus relates to societ

Your research has helped you understand how your area of focus relates to society and trends; now identify a specific need/ issue for this area and work to develop a working solution or prototype using a design process. You should not be creating lesson plans for this project. Your process should be presented as a portfolio in PDF form or in a Web-based format. The portfolio/website should be laid out in the following format:
Cover (Main) page with name and title (5 points)
Identification of the need/problem (5 points)
Rationale and research to support the need (can be pulled from PART ONE) (10 points)
Brainstorm possible solutions as possible via journals, drawings, etc. ( Use Google to search for various Brainstorming Templates) (10 points)
Discuss the implications of each possible solution: direct/indirect; intended/unintended (10 points)
Select the best solution and work to create that solution.
Create an activity log that includes Pictures/narrative to show the ideation/construction of the prototype/solution. Be sure to include troubleshooting, feedback from peers/instructors (if you connected with others to talk through things), etc. (10 points)
Submit the final resource website, artifact, or article (must be approved) of the proposed solution. (50 points)
Remember THE PROCESS. Ask me questions before Friday so I can help you if you are struggling to wrap your head around this one.
Upload as one pdf file.
Attached is the research done for last week′s assignment part one. This is a follow-up part two assignment. My area of focus is Robotics in CTE
Important Info

The order was placed through a short procedure (customer skipped some order details).
Please clarify some paper details before starting to work on the order.

Type of paper and subject
Number of sources and formatting style
Type of service (writing, rewriting, etc)

Submit a draft of your research of DOD-specific requirements for an organization

Submit a draft of your research of DOD-specific requirements for an organization’s IT infrastructure and U.S. compliance laws that may affect the firm.
Scenario
You are a security professional for Blue Stripe Tech, an IT services provider with approximately 400 employees. Blue Stripe Tech partners with industry leaders to provide storage, networking, virtualization, and cybersecurity to clients.
Blue Stripe Tech recently won a large DoD contract, which will add 30 percent to the revenue of the organization. It is a high-priority, high-visibility project. Blue Stripe Tech will be allowed to make its own budget, project timeline, and tollgate decisions.
As a security professional for Blue Stripe Tech, you are responsible for developing security policies for this project. These policies are required to meet DoD standards for delivery of IT technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency.
To do this, you must develop DoD-approved policies, standards, and control desсrіptions for your IT infrastructure (see the “Tasks” section in this document). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies, standards, or controls in place.
Blue Stripe Tech′s computing environment includes the following:
12 servers running the latest edition of Microsoft Server, providing the following:
Active Directory (AD)
Domain Name System (DNS)
Dynamic Host Configuration Protocol (DHCP)
Enterprise resource planning (ERP) application (Oracle)
A research and development (R&D) engineering network segment for testing, separate from the production environment
Microsoft Exchange Server for email
Email filter
Cloud-based secure web gateway (web security, data loss protection, next-generation firewall, cloud application security, advanced threat protection)
Two Linux servers running Apache Server to host your website
400 PCs/laptops running Microsoft Windows 10, Microsoft 365 office applications, and other productivity tools

2. Complete lab 14.1 at the end of chapter. Be sure to add a new virtual hard d

2. Complete lab 14.1 at the end of chapter. Be sure to add a new virtual hard drive to your virtual machine before attempting this exercise. Partitioning an exist virtual hard drive will destroy your virtual machine.
3. Enter the following command:
history 1˃lab14.txt
$ Upload lab14.txt

I. Medical facilities often have more patients waiting for organ transplants tha

I. Medical facilities often have more patients waiting for organ transplants than there are available organs. Suppose you have been asked to write a computer program that selects which of several candidates should receive an available organ. What data would you want on file to be able to use in your program, and what decisions would you make based on the data? What data do you think others might use that you would choose not to use? APA Style…

I. Imagine that you wish to write program code to accomplish three tasks: output

I. Imagine that you wish to write program code to accomplish three tasks: output a user’s fortune based on which color they input as their favorite; end or continue to run the program depending on a user’s input; and greet a user with “Good morning!” or “Good afternoon!” depending on the time of day option they input. Which control structure would you choose for each of these tasks? Justify your choice. APA style…

In the Week 1 and Week 2 labs, you used a virtual machine to practice creating i

In the Week 1 and Week 2 labs, you used a virtual machine to practice creating instances, groups, a virtual private cloud (VPC), and other related components. These design tasks replicate tasks you may be asked to complete in your future career as an information systems manager.
Preparation
This summative assessment consists of completing lab exercises from Weeks 1 and 2 followed by reflecting and connecting to the lab experience.
Assessment Details
Write a 350- to 700-word summary on your experience completing these tasks. Include the following in your summary:
Using specific examples from this week’s labs, explain what it means to design secure workloads and applications.
Analyze why scalability is an important part of this design.
Explain how the labs provided insights for understanding the importance of scalability and how it can be used in your current or future career.

Check cross-referencess in text to all tables and figures: https://drive.google.

Check cross-referencess in text to all tables and figures: https://drive.google.com/file/d/1fCvvenpuOZY1YPG5MYSZsGrCYCJVgWTT/view
Check also the references to tables and figures in the text. E.g. Table 5: Syntax comparisons for Bicep, JSON, and HashiCorp Language (HCL) cover parameter creation, resource declaration, loops, conditional operators, and variable declaration, showcasing their respective syntax approaches. -˃ In table (Table 5) Syntax comparisons for Bicep, JSON, and HashiCorp Language (HCL) cover parameter creation, resource declaration, loops, conditional operators, and variable declaration, showcasing their respective syntax approaches.
Captions above the pictures (not below): Figure 1: Program code 1 highlighting project tree
– the introduction is 6 pages long, when it should be 1 page. The summary and the rest of the texts could be made into a new main chapter or sub-chapter in Chapter 2.
– According to the instructions, the titles of chapters 2 and 2.1 should describe the content
– Title 4.1 can be removed as unnecessary.
– material management plan is missing
In chapter 3.2 Sampling, Data, and Data Collection, can you describe in more detail the target group of the quantitative part, where and how the target group was selected, in which tasks the target group works? It would also be valuable if you attached the questions, what was asked to the target group and their answers to the questions.