Category: uncategorised

  • Digital Marketing: Helping People in the Modern World

    Introduction

    Online marketing is the process of promoting products or services using the internet. It helps businesses reach more people, increase sales, and connect with customers easily. Today, online marketing is very important because many people use mobile phones and the internet daily.

    Meaning of Online Marketing

    Online marketing refers to advertising and selling products or services through digital platforms such as websites, social media, email, and search engines. It allows businesses to communicate with customers quickly and effectively.

    Importance of Online Marketing

    It helps businesses reach a large number of people.

    It saves time and money compared to traditional marketing.

    It allows businesses to work from home or anywhere.

    It helps in building trust with customers.

    It increases sales and brand awareness.

    Types of Online Marketing

    1. Social Media Marketing

    This involves promoting products on platforms like Facebook, Instagram, YouTube, and WhatsApp. Businesses share photos, videos, and posts to attract customers.

    2. Website Marketing

    Creating a website where customers can see product details, prices, and contact information.

    3. Email Marketing

    Sending emails to customers about offers, discounts, and new products.

    4. Search Engine Optimization (SEO)

    Improving website content so that it appears at the top of search results on search engines like Google.

    5. Online Advertising

    Running paid ads on search engines or social media to reach more people quickly.

    Steps to Start Online Marketing

    Choose the product or service you want to promote.

    Create a business name and logo.

    Make accounts on social media platforms.

    Post attractive photos and videos regularly.

    Reply to customer messages quickly.

    Offer discounts and special deals to attract customers.

    Advantages of Online Marketing

    Low cost compared to offline marketing.

    Easy to reach customers worldwide.

    Saves time and effort.

    Helps small businesses grow faster.

    Improves customer communication.

    Disadvantages of Online Marketing

    Requires internet and digital skills.

    High competition in the online market.

    Risk of cyber security problems.

    Negative reviews can affect business reputation.

  • fixing the portfolio in InDesign

    Portfolio:

    Content: Edit Content. You are not listing the Bio, statemetn and the CV, along with the contact as part of your content page. Pleas ere-design to include these. Alternatively, re-arrange the order pf page so yo ucan resolve this in a creative manner. Alignment inconsistency with the title and the paeg numbers. Add a white background to the drawings they are too blended with the background. Edit the CV as per the feedback written below. Avoid placing it as an image and rather place the content as text on Indesign your font size should remain consistent. You should start with Biography, followed by the statement. Statement: third paragraph needs re-phrasing in noticable parts due to spelling mistakes, typos, and/ or incorrect grammer. Biography: double spacing at the first sentence. Also, why do you need from/ at Zayed..? There are double spacing and some sentences that require re-phrasing and re-writing. I had requested that you pay a visit to Al Waha in my project I feedback, so I advise to do the same again to refine this writing, and revert back to show me the progress on the week of April 13th before the portfolio submission o nthe portal. Typo with purpose. Also, this is a quote by who? Place quotaion marks and write the source. There is a white line on the top part of the orange/ brown background either bleed this image or fill the stroke. Wall Luminaire: capitalise softwares so Illustrator. Place your page numebrs. Next page: An exhibition… Next page: Alignment inconsistency with the text. Imaegs can be placed in a better grid alignment. Page 26: statement needs attention. Page 28: typo with Drawing. There are a lot of those inconsistencies and spelling mistakes or grammer inaccruacy that seems to have been placed ina rush. Please read every sentence and review every word to apply appropriate edits throughout all of your documents. There is no senior project pages which was a clear requirement. The Nissan car key project is unnecessary amongst tese Interior Design focused projects. It is clear the work was concluded in a rush despite offering ample of feedback sessions and resources.

    Documentation: Selected projects need further edits. See notes above.

    Branding: The branding guidelines are lacking required details including your name, choosing 3 keywords rather than 5, adding the font examples as a reference rather than just the name, and adding more of yoru clors that you have used in the portfolio and the CV. You have used shapes as well that seem to be part of your branding identity, so they needed to be included. Colors should be added with their codes as well. The brief is clear in its requirements, along with the presentation, and the recorded video lesson. I have reviewed these components with all students on the last feedback session as well which was the expectation. Edit this document.

    CV: The CV can be further designed to follow your branding, using Adobe softwares. This looks like a Canva tempalte and all students were required to design using Adobe softwares, not Canva. This is CV is the same as in project I so not sure if any edits were made? After the CV updates and the EDAAD workshops? For instance, it was advised to remove high school mention in the CV. Also, you have a lot of inconsistent font sizes, and formats still. Why is the Certificate in such a large font for the title and the content? References are missing? And in project I you hadnt completed this requirement well so this is consideerd an incomplete componet at this stage. Its been two months since we had feedback regarding the CV. Edit accordingly.

    Overall, the submited work is rushed and is showcasing some inaccuracies and inconsistencies. Please improve on your time management to progress your project well, rather than leaving a big chunk at the end of it. The branding needs to be more visible in your CV, and your branding guidelines needs to be edited. Edit accordingly.

  • Management Question

    MedTech Solutions is considering expanding their manufacturing capabilities to support a new AI-powered diagnostic device. The leadership team must decide whether to build a new production facility, upgrade the existing facility, or outsource production. Each option carries different costs, probabilities of market demand scenarios, and potential payoffs.

    Option 1: Build New Facility

    • Cost: $1.2 million
    • Strong Demand (60%): Gain $2.5 million
    • Weak Demand (40%): Gain $1.0 million

    Option 2: Upgrade Existing Facility

    • Cost: $600,000
    • Strong Demand (50%): Gain $1.6 million
    • Weak Demand (50%): Gain $900,000

    Option 3: Outsource Production

    • Cost: $300,000
    • Strong Demand (40%): Gain $1.2 million
    • Weak Demand (60%): Gain $500,000

    Part 1: Excel Decision Tree Model

    Build a decision tree in Excel that includes:

    1. All three options
    2. Chance nodes (with demand probabilities)
    3. Associated payoffs (subtracting the cost from revenue)
    4. Expected Monetary Value (EMV) for each branch

    Highlight your final recommendation based on the EMV calculation.

    Part 2: Sensitivity Analysis

    Perform a sensitivity analysis by:

    1. Adjusting the probability of strong demand by 10% for each decision path
    2. Adjusting the strong demand payoff by 20% for at least one option
    3. Recalculating EMVs and determining if the optimal decision changes

    In Excel, clearly show the impact of these changes in a side-by-side comparison.

    Part 3: Video Presentation (1015 Minutes)

    Create a narrated video walkthrough in which you:

    Explain your decision tree step-by-step:

    1. Why each node, branch, and payoff was set up the way it was
    2. How you calculated EMV

    Demonstrate your sensitivity analysis:

    1. Show how the EMVs and decisions change when inputs are modified
    2. Explain which factors had the biggest impact on the final decision

    Discuss stakeholder engagement:

    1. Explain how your analysis and modeling can be used to build stakeholder confidence
    2. Share strategies for communicating your recommendation persuasively and transparently
    3. Use visuals (Excel spreadsheet, PowerPoint if needed), and speak clearly as though presenting to executives or a project team.

    Written Summary (400600 Words)

    Along with your Excel file and video, submit a brief summary that includes:

    • Final decision and rationale
    • Key takeaways from the sensitivity analysis
    • Stakeholder communication strategy

    Submission Checklist:

    Excel file with decision tree and sensitivity analysis

    1015 minute video presentation

    Written summary ( Word)

    Useful Videos for Project:

    Requirements:

    • There is no minimum or maximum required number of pages. Your analysis will be considered complete, if it addresses all the components outlined above.
    • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. A minimum of 4 sources (excluding the course textbook) from scholarly articles or business periodicals is required.
    • Include your best critical thinking and analysis to arrive at your justification.
  • Case Studies in Data Protection and Privacy

    Assignment Instructions Summary (Track B: Membership Inference)

    This assignment is based on the official assignment brief document and the materials covered in Weeks 14 lectures and tutorials. The main objective is to perform a security and privacy review of an AI service, focusing on identifying vulnerabilities, testing them practicly, and proposing suitable defences.

    The analysis must follow the structure provided in the assignment file, including:

    • System understanding (architecture and trust boundaries)
    • Identification of assets, attackers, and risks
    • Designing an attack workflow
    • Proposing defence strategies with justification
    • Supporting analysis with figures, tables, and experimental evidence

      I will choos Track B: Membership Inference.This track focuses on analysing whether an attacker can determine if a specific data record was used in training the model, based on the models outputs.The implementation will be based on the provided file:

      • membership_inference_track.py

        Report Requirements

        The final submission will be:

        • One PDF report only
        • No code files will be submitted

        The report must:

        • Be scenario-specific (AI hiring API)
        • Include:
          • Figures (system architecture, attack workflow, defence workflow)
          • Tables (assetattackerharm)
          • Screenshots from code execution as evidence
        • Demonstrate:
          • Understanding of the system
          • Identification of vulnerabilities
          • Clear attack methodology
          • Justified defence design with trade-offs

            Coding Task (Track B)

            The coding task is minimal and only requires completing two missing lines in the provided script, After completing these lines, the script must be executed to generate results for analysis

            Required Screenshots

            Only screenshots are required (NOT full code submission). The report must include:

            1. Code Screenshot

            • Show ONLY the modified lines (the two completed lines in run_mia())

            2. Output Screenshot

            • Show the program output after running the code, including:
              • Baseline case results
              • Defended case results
            • Important values to capture:
              • member_mean_signal
              • nonmember_mean_signal
              • mia_attack_accuracy
              • threshold

            These outputs will be used as evidence in your discussion.

            Expected Analysis (Track B)

            In the report, you will:

            • Compare baseline vs defended model
            • Explain how defence techniques (e.g. regularization, label smoothing, dropout) reduce membership inference risk
            • Use your code results as supporting evidence

              please reffer to the attached files and read the assignment instructions careflly

          • After you finished, provied a (Turnitin + AI) reports. Al
  • Bio article

    Please download the document and answer the questions using a different colored font. Use your own words when answering the questions. DO NOT copy-paste portions of the research paper or quote verbatim – this is considered plagiarism.

    Even if you are working with your team, you are submitting this as an individual assignment.

  • Complex Designs

    Assignment Summary (Module 14: Complex Designs)

    Part 1: Create a Study Using AI

    You need to:

    1. Write a prompt for an AI tool (such as ChatGPT).
    2. Your prompt must ask for:
      • A factorial research study (at least 2 independent variables + 1 dependent variable).
      • A study related to your career .
      • A study that is 150200 words.
      • The AI must NOT identify the type of design and must NOT mention strengths or weaknesses.
    3. Then:
      • Copy and paste:
        • Your prompt
        • The full AI-generated response

    Part 2: Analysis (YOU DO THIS ON YOUR OWN)

    Answer 3 questions (23 sentences each):

    1. Variables
      • What are the independent variables?
      • How many levels does each one have?
      • Write the design notation (example: 2 x 2)
    2. Type of design
      • Is it between-subjects, within-subjects, or mixed?
      • Explain how you know
    3. Advantage and disadvantage
      • One advantage of the design
      • One disadvantage
      • IMPORTANT:

    You must complete this part on your own (no AI)

  • Modifications needed

    This is a follow-up to the previous question.

  • Business Question

    Please put 34 days IF YOU Want to be selected

  • Case Studies in Data Protection and Privacy

    Assignment Instructions Summary (Track B: Membership Inference)

    This assignment is based on the official assignment brief document and the materials covered in Weeks 14 lectures and tutorials. The main objective is to perform a security and privacy review of an AI service, focusing on identifying vulnerabilities, testing them practicly, and proposing suitable defences.

    The analysis must follow the structure provided in the assignment file, including:

    • System understanding (architecture and trust boundaries)
    • Identification of assets, attackers, and risks
    • Designing an attack workflow
    • Proposing defence strategies with justification
    • Supporting analysis with figures, tables, and experimental evidence

      I will choos Track B: Membership Inference.This track focuses on analysing whether an attacker can determine if a specific data record was used in training the model, based on the models outputs.The implementation will be based on the provided file:

      • membership_inference_track.py

        Report Requirements

        The final submission will be:

        • One PDF report only
        • No code files will be submitted

        The report must:

        • Be scenario-specific (AI hiring API)
        • Include:
          • Figures (system architecture, attack workflow, defence workflow)
          • Tables (assetattackerharm)
          • Screenshots from code execution as evidence
        • Demonstrate:
          • Understanding of the system
          • Identification of vulnerabilities
          • Clear attack methodology
          • Justified defence design with trade-offs

            Coding Task (Track B)

            The coding task is minimal and only requires completing two missing lines in the provided script, After completing these lines, the script must be executed to generate results for analysis

            Required Screenshots

            Only screenshots are required (NOT full code submission). The report must include:

            1. Code Screenshot

            • Show ONLY the modified lines (the two completed lines in run_mia())

            2. Output Screenshot

            • Show the program output after running the code, including:
              • Baseline case results
              • Defended case results
            • Important values to capture:
              • member_mean_signal
              • nonmember_mean_signal
              • mia_attack_accuracy
              • threshold

            These outputs will be used as evidence in your discussion.

            Expected Analysis (Track B)

            In the report, you will:

            • Compare baseline vs defended model
            • Explain how defence techniques (e.g. regularization, label smoothing, dropout) reduce membership inference risk
            • Use your code results as supporting evidence

              please reffer to the attached files and read the assignment instructions careflly

          • After you finished, provied a (Turnitin + AI) reports. Al
  • math talk

    Please follow the instructions down below!