Friday, 21 October 2022

Discuss any negative effects of using Chromium an Nickel metals

 Question: Discuss any negative effects of using Chromium an Nickel metals in stainless steel cooking kits (apparatus) on human health

Solution:

It is a strong reducing agent and reduces both aldehyde and ketch into alcohol. As only 1 equation of PhmgRrFs product, rather it will attack the more electrophilic center which is aldehyde rather than ketone.



Friday, 3 June 2022

Determine the truth value of each of the following formulas (the universe of discourse for each statement is given in parentheses).

 Question: Determine the truth value of each of the following formulas (the universe of discourse for each statement is given in parentheses).

(a) (∀x)(x + x ≥ x). (ℝ)

(b) (∀x)(x + x ≥ x). (ℕ)

(c) (∃ x) (2x = x). (ℕ)

(d) (∃ x) (2x = x). (w)

 

Solution:

a) (∀x)(x + x ≥ x). (ℝ)

False
Counter Example: x = -2
b) (∀x)(x + x ≥ x). (ℕ)

True
c) (∃ x) (2x = x). (ℕ)

False
There is no such number
d) (∃ x) (2x = x). (w)

True
Example: x = 0 and 2x = 0 

Tuesday, 24 May 2022

For each of the following AI agents, identify the following elements: Environment, Percept, Sensor

Question 1: For each of the following AI agents, identify the following elements: Environment, Percept, Sensor, Actuator, Action, Goal and Performance



ATM machine

Facial recognition system

Google translate

Environment




Percept




Sensor




Actuator




Action




Goal




Performance





Solution:



ATM machine

Facial recognition system

Google translate

Environment

User, ATM card

Humans

Users, smartphones,

computers, the

internet

Percept

ATM Card, Touch

Human faces

Keyboard strokes,

touch

Sensor

Card reader, touch,

buttons

Camera sensors

Typed words

Actuator

Display, audio, cash

withdrawal

Display, audio

Display, audio

Action

Detect card details,

withdraw cash, and

give it to the user

Detect human from

their face

Display translation of

selected language

Goal

Allow users to

withdraw cash

Detect humans from

their facial features

Translate the typed

words into the

selected language

Performance

Accurately detect

cards, complete

withdrawal

Accurate facial

recognition

Accurately translate

words into the

selected language



Question 2: Consider a robot vacuum cleaner. What type of environment is this agent subjected to. Which type of agent can be more suitable for modelling such environment. Justify your answers with some explanation.


Solution: Agent type: Utility-based Agent

Explanation: The vacuum cleaner agent has the following functions: move left, right, back, front, and suck dirt from the floor. Here, the performance of the agent can be measured by how effectively and efficiently it can complete the task. A utility-based agent doesn’t only focus on the goal but also on the best way to reach that goal i.e minimize path cost and search cost.


Question 3: The Edison Robot is a programmable coding robot for school education. What are PEAS (Performance, Environment, Actuator, Sensor) for this agent?


Solution: Agent - Edison Robot

Performance measure - Student’s test score, student’s feedback

Environment - Group of students, school

Actuators - Display or Speak(teach) about learning modules, exercises, suggestions, hints, reminders

Sensors - Keyboard strokes, sound, visibility

Thursday, 21 April 2022

Collaborative writing is an essential writing practice during the COVID-19 pandemic amongst educators and journalists.

 Question:  Collaborative writing is an essential writing practice during the COVID-19 pandemic amongst educators and journalists.

 Write an essay to rationalise how collaborative writing can be carried out effectively. Your essay should be between 800 and 900 words.

Solution:  Collaborative writing is a way of combining ideas done by individuals or members of a team.   Although it may be aggravating, there are several ways that can help you get through those dreaded group project tasks. A project's success hinges on effective communication. Everyone in the group should make sure they understand what the assignment comprises and what each person is expected to do.  

       There are many ways to achieve a successful collaborative writing within a group.  One of which is version control and how to utilize it.  Everyone should know how to get to the most current agreed-upon draft at all costs, so that the group has a frame of reference to which it can refer if an issue or disagreement arises. Whether you're working with shared files on a shared server or Alfresco Team, a person will have to make a decision about which changes to make and which sections of the document to keep. This is an example of what can happen: a paragraph that was previously cut gets reinstated, but the paragraph no longer appears to fit because the transition leading into that part has undergone additional alterations. To accommodate this, the transition will need to be redone. Documents are systems in the sense that all of their components are interconnected. 

       Secondly is making sure you know what each revision's goal is. People should be laser-focused on whatever goal they are pursuing. Is this iteration for minor concerns such as style and tone modifications, or for broader ones like as structure and flow? When a revision that was supposed to be a significant clarification comes back with nit-picky style guide modifications, "that" vs. "which" revisions, and so on, it's aggravating. The frustration can be alleviated by having a clear understanding of the revision's goal. 

        Moreover, have faith in the subject matter expert most of the time.  When it comes to content, trust your subject matter expert, but be prepared to push back if they add extra levels of complexity that threaten to confound the very individuals you're trying to reach. Communication should be staged and scheduled. As a result, some math experts aren't particularly excellent math teachers, to use a frequent example. True, but it's at a level of complexity that makes learning impossible. Make sure everyone in your group understands who your document is intended for.

          In addition, don't waste your time fighting a losing battle. When human people collaborate on a project, disagreements are bound to arise. That isn't always a bad thing. Indeed, it is frequently via the process of airing out differences that a new understanding emerges. When the group, project leader, or other decision-making organization has made a decision , the person who strongly preferred a different strategy must move on. Bringing upstream issues into downstream discussions destroys confidence since your teammates assumed the problem had been resolved. It's a unique situation. 

          Lastly, choose a final editor.  Make it clear who is in charge of putting the final copy together. It's certain that two contributors will make competing changes to their working copies of the same file and commit those changes to the repository. Even if your program detects the problem, an editor must remedy the issue before the update is applied and a new version is released.  For sure, people would believe that their changes are more valuable than someone else's. We can't help but be objective in our assessments of our own contributions. Someone has to be in charge of that work, and that person should be able to refer to a style guide that has been agreed upon.

          In conclusion, the pros and challenges of collaborative writing, including the technological component, have been widely studied. The human component in generating collaborative documents can be a source of leverage rather than an uphill struggle with sufficient buy-in from the team, as well as clear ground rules and roles.

 

What is Cause and Effect Depression Amidst Covid-19 Pandemic?

 Question: What is Cause and Effect Depression Amidst Covid-19 Pandemic?

Solution:

The COVID-19 pandemic and the ensuing economic downturn have had a detrimental impact on many people's mental health and raised additional obstacles for those who still suffer from mental illness or drug abuse problems. Approximately 4 in 10 adults in the United States have recorded anxiety or depressive disorder symptoms since the pandemic, a share that has remained relatively stable, up from one in ten adults who reported these symptoms from January to June 2019.

If the pandemic progresses, ongoing and necessary public health efforts expose a growing number of people to situations that are related to poor mental health outcomes, such as loneliness and job loss.

Concerns about mental health and drug use have increased since the COVID-19 pandemic, including concerns about suicidal ideation. In January 2021, 41% of adults reported anxiety and/or depressive disorder symptoms, a percentage that has remained relatively constant since spring 2020. According to a survey conducted in June 2020, 13% of adults reported new or increased drug use as a result of coronavirus-related stress, and 11% of adults reported suicidal thoughts in the previous 30 days. Suicide rates have been that for some time and could escalate as a result of the pandemic. Drug overdose deaths spiked from March to May 2020, coinciding with the start of pandemic-related lockdowns, according to early 2020 data.

Adults in poor general health appear to experience higher rates of anxiety and/or depression than adults in good general health, as they did prior to the pandemic. 1.2 The already high probability of developing a concurrent mental health condition in people with chronic disease could be increased by their susceptibility to serious illness from COVID-19. According to a recent survey, 18% of people who obtained a COVID-19 diagnosis were later diagnosed with a mental health condition including anxiety or mood disorders. Seniors are also more susceptible to serious coronavirus disease and have shown higher levels of anxiety and depression during the pandemic.

Prior to the current epidemic, there were high rates of mental illness and drug abuse, but mental distress during the pandemic is not surprising. Prior to the pandemic, one out of every ten adults had anxiety or depressive symptoms. Nearly one in every five people in the United States has a mental disorder. Over 48,000 Americans died by suicide in 2018,3 and nearly eleven million adults recorded serious thoughts of suicide in the previous year on average between 2017 and 2018. Furthermore, as a result of the opioid epidemic, drug overdose deaths were four times higher in 2018 than they were in 1999.

The pandemic has likely impacted mental health in a number of ways, including widespread social isolation as a result of necessary safety steps. Social alienation and depression have been linked to poor mental and physical health in a large body of study. Even before the pandemic, the widespread experience of isolation had become a public health problem due to its connection to a shorter lifespan and a higher risk of both mental and physical illnesses.

Previous epidemics also caused widespread depression and resulted in new mental health and drug abuse problems. If the COVID-19 pandemic progresses, various groups are at a higher risk of mental illness and will have difficulty getting the treatment they need.

Many young adults have experienced heightened anxiety, depression, sleep disturbances, and suicidal thoughts as a result of the pandemic. They have also dealt with a slew of pandemic-related effects, including university closures, shifts to remote jobs, and loss of income or employment, all of which could wreak havoc on their mental health.

Job loss may result in other negative mental health effects, such as drug use disorder, in addition to increased anxiety and depression. The high unemployment rate during the previous recession was also linked to a rise in suicides. According to a KFF Health Tracking Poll conducted in mid-July 2020, a higher percentage of households experiencing income or job loss reported that pandemic-related worry or stress caused them to experience at least one negative effect on their mental health and well-being, such as difficulty sleeping or eating, increased alcohol consumption, or increased anxiety.

Many schools and childcare centers in the United States have closed and switched to virtual instruction for at least some time to help slow the spread of coronavirus. Children and their parents are experiencing constant uncertainty and changes to their everyday lives as a result of these closures. During the pandemic, research revealed questions about children's and parents' mental health and well-being. Many parents of school-aged children, for example, are even more anxious than they were before the pandemic about their children's emotional well-being.

Friday, 7 January 2022

CSCB433 (Information Security Assurance) section 01

 Q1: Which of these statements are used to determine the value of information assets?
a. Which information asset is the most expensive to protect?
b. Which information asset is the most expensive to protect?
c. Which information asset generates the highest profitability?
d. Which information asset is the most critical to the success of the organization? 

Solution: Which information asset is the most critical to the success of the organization?
Which information asset is the most expensive to protect?
Which information asset generates the highest profitability?
Which information asset is the most expensive to protect? 

Q2: The final step in the risk identification process is to list the assets in order of importance. Which tool is used to achieve this goal?
a. weighted factor analysis
b. Cost Benefit Analysis
c. Thread vulnerabilities assessment
d. Quality Risk Analysis

Solution: weighted factor analysis

Q3: Which of these define Mitigation Risk control strategies
a. Applying safeguards that eliminate or reduce the remaining uncontrolled risk
b. Reducing the impact if the vulnerability is exploited
c. Understanding the consequences of and accepting the risk without control
d. Shifting risks to other areas or to outside entities

Solution: Reducing the impact if the vulnerability is exploited

Q4: Which of the Risk Control Strategy selection should be chosen when we manage risk -to limit the extent of the attack
a. When the attacker’s potential gain is greater than the costs of an attack
b. When potential loss is large
c. When a vulnerability can be exploited
d. When a vulnerability exists

Solution: When potential loss is large

Q5: Which of this statement define Single loss expectancy
a. is based on the value of the asset and the expected percentage of loss that would occur from a particular attack
b. Evaluating the worth of the information assets to be protected and the loss in value if those information assets are compromised
c. is the process of comparing the projected or estimated costs and benefits
d. the probability of a threat occurring is the probability of loss from an attack within a given time frame

Solution: is based on the value of the asset and the expected percentage of loss that would occur from a particular attack

Q6: Which of the following is NOT a task in Work Breakdown Structure (WBS)
a. estimated capital and noncapital expenses
b. Identify risk
c. identification of dependencies between/among tasks
d. start and end dates

Solution: Identify risk

Q7: Which of these define the goals of project wrap-up?
You may select more than one answer.
a. draw conclusions about how to improve process
b. resolve any pending issues
c. Patching
d. critique overall project effort

Solution: resolve any pending issues,
critique overall project effort,
draw conclusions about how to improve process

Q8: Which of the following is NOT TRUE  about the Chief Information Security Officer (CISO or CSO)
a. Drafts or approves information security policies
b. Works with the CIO on strategic plans
c. Manages the overall information security program
d. Accountable for day-to-day operation of information security program

Solution: Accountable for day-to-day operation of information security program

Q9: The ISO management model is a five-layer approach that provides structure to the administration and management of networks and systems. The core ISO model addresses management and operation through five topics:
• Fault management
• Configuration and name management
• Accounting management
• Performance management
• Security management
Which of these statements define the Fault management
a. involves the physical and logical assessment of the vulnerabilities present in information systems. This is most often accomplished with penetration testing.
b. is process of reviewing use of a system, not to check performance, but to determine misuse or malfeasance; automated tools can assist
c. is the administration of the configuration of the components of the security program.
d. the process of identifying, tracking, diagnosing, and resolving faults in the system.

Solution: the process of identifying, tracking, diagnosing, and resolving faults in the system.

Q10: Which of these statements is NOT a primary deliverable of the Monitoring Process?
a. Building and maintaining an inventory of network devices and channels, IT infrastructure and applications, and information security infrastructure elements
b. Detailed intelligence on highest risk warnings
c. Periodic summaries of external information
d. Specific warning bulletins issued when developing threats and specific attacks pose measurable risk to organization

Solution: Building and maintaining an inventory of network devices and channels, IT infrastructure and applications, and information security infrastructure elements

Q11: Most audit reports contain at least three broad sections: findings, recommendation, and follow-up. Explain each section in the audit reports.

Solution: - Findings are organised according to how closely they correspond to the standard benchmark.
- Recommendations: Make recommendations on how to mitigate the risks that have been identified.
• Implementation timeline, amount of risk, and management reaction are all important considerations.
When it is essential, auditors should plan a follow-up to confirm that suggestions have been implemented by the company.

Q12: An organization needs clearly documented personnel security policies and procedures in order to facilitate the use and protection of information. For example, the organization should conduct background checks and formal termination procedures.
(a) Describe TWO (2) reasons why background checks and verifying application information for all potential employees and contractors are important.
(b) Formal termination procedures should be implemented to help protect the organization from potential lawsuits, property theft, and destruction, unauthorized access, or workplace violence. Explain THREE (3) termination procedures that should be considered by the organization.

Solution: a. Background checks may assist in reducing the likelihood of engaging in criminal activity such as assault, abuse, and theft. They may also check the facts included in an applicant's résumé or job application, and they can aid your business in determining whether or not a certain individual is the best candidate for the position.
b. 1. All logical and keycard access is cancelled before the employee is even aware of it.
2. The employee gathers all of his or her personal things and returns all keys, keycards, and other business property to the office.
3. The employee is then escorted out of the building.

Q13: List FOUR (4) essential security testing tips and explain why it is crucial to an organization's security consideration.

Solution: 1-Choose the right tool: As if you dont use the correct tool the results might be different and misleading sometimes
2-Tools make mistake : Sometimes the tools give false positives as well
3-Protect your system: The system should be updated and must be using antivirus to protect against attacks
4-Tests should be as “real” as possible , Real Attacks: The real should be as real so that the real environment can be mimicked

Q14: (a)         Calculate the risk assessment weighted score for each of the information assets.
Table 1: Information Asset Risk Assessment
Information Asset
Criterion l:
Impact on Revenue Criterion 2:
Impact on profitability
Criterion 3:
Impact on    Public Image    Weighted Score
Criterion weight    50    20    30
Alpha    0.8    0.9    0.5
Beta    0.8    0.9    0.6
Omega    0.4    0.5    0.3
Delta    1    0.6    0.4
Gamma    0.4    0.4    0.9

Solution: Alpha = (50 * 0.8) + (20*0.9) + (30 *0.5) = 40 + 18 + 15 = 73
Beta = (50 * 0.8) + (20*0.9 + (30 *0.6) = 40 + 18 + 18 = 76
Omega = (50 * 0.4) + (20*0.5) + (30 *0.3) = 20 + 10 + 9 = 39
Delta = (50 * 1) + (20*0.6) + (30 *0,4) = 50 + 12 + 12 = 74
Gamma = (50 * 0.4) + (20*0.4) + (30 *0.9) =20 + 8 + 27 =55
 

CSCB433 (Information Security Assurance) section 01 Quiz

 Q1: The access control mechanism that requires the validation and verification of an unauthenticated entity's purported identity is known as -------------------------

a. authentication
b. accountability
c. confidentiality
d. authorization

Solution: authentication 

Q2: An attribute of information that describes how data is protected from disclosure or exposure to unauthorized individuals or systems is known as ___________________

a. Privacy
b. Integrity
c. disclosure
d. Confidentiality
 

Solution: Confidentiality

Q3: Which of these statements define threat?
a. A potential weakness in an asset or its defensive control system(s).
b. An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it.
c. Any event or circumstance that has the potential to adversely affect operations and assets.
d. A single instance of an information asset suffering damage or destruction, unintended or unauthorized modification or disclosure, or denial of use.

Solution: Any event or circumstance that has the potential to adversely affect operations and assets.  

Q4: ________________responsible for the security and use of a particular set of information
a. Data user
b. Data Subject
c. Data Custodian
d. Data owner
 

Solution: Data owner 

Q5: Recently, a ransomware incident was announced in the local news that could infect similar Operating Systems that are being used by your company.

 Identify THREE (3) most important assets in your company that could be affected by this malware threat.

Solution:  1. Bussiness Documents and Excel Sheets
2. Websites images and other resources 
3. Back up server files

 Q6: Explain why those assets are considered important.

Solution: 1. Bussiness Documents and Excel Sheets: All the business corresponding and financial data of the organization is stored in these documents
2. Websites images and other resources: This will damage the reputation of the company as the notice of the ransomware will be shown on the website
3. Back up server files: The backup data of the company will also not be available and nothing will be available for employees to do work on.

Q7: List at least TWO (2) vulnerabilities for each of the assets in (a) that are relevant to the malware threat. 

Solution: 1. Bussiness Documents and Excel Sheets:
+ Using Microsoft office macros.
+ By clicking links of downloaded word file
2. Websites images and other resources:
+ By SQL injection Attack
+ By OS command injection Attack
3. Back up server files:
+ Malware spreading from network
+ SMB protocol (Eternal Blue)

Q8: Identify ONE (1) possible RISK for each of the asset you listed

Solution: 1. Bussiness Documents and Excel Sheets:
Unavailability of the resources
2. Websites images and other resources:
Damage to the reputation of the company
3. Back up server files:
Unavailability of the resources