Mobile -9 Miss

 

QUESTION 2 : Which one you would use for the Mobile application for health services. Assume that the mobile app is going to be used by the patient to do the followings;

Schedule an appointment, see the bold test results, refill a prescription and communicate with Doctor, Nurse and the Pharmacy.

Questions

Question 1

This Internet threat uses targeted fraudulent messages from reputable companies to elicit information from end users.

Crypto malware
Spear phishing
End-point attack
Supply chain attacks

Question 2

An SMB server should only allow access to which port?

443
445
80
22

Question 3

The Internet started as a project to route network communications around failed hardware.
True
False

Question 4

An HTTPS server should only access to which port?
443
445
80
22

Question 5

This Internet threat uses holes in the manufacturing process to insert malware or vulnerabilities.

Crypto malware
Spear phishing
End-point attack
Supply chain attacks

Question 6

A DMZ is a?

Demilitarized zone
Delta metal zone
Data message zero
None of these

Question 7

Port 80 is typically used by which protocol?

HTTP
HTTPS
SMTP
IMAP

Question 8

This Internet threat encrypts your hard disk and ransoms the keys to decrypt it.
Crypto Malware
Phishing
End-point attack
Supply chain attacks

ple week14 p14

Hello,

i need this paper by 4/28 afternoon 12am.

Strictly No plagiarism please use your own words.

Answer each these questions in a paragraph with five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

technical report

Please read the attached instruction very very carefully 

  

The topic for Technical Report

“Cyber-theft of trade secrets”

Assignment

 

The game of “Geography” is played by 2 (or more, but let’s stick with 2) players. The idea is that one player lists out the name of a place (say, “California”). The next person needs to list out a name whose first letter is the same as the last letter of the previous name (So, since “California” ends with an “A”, the next name needs to star with an A.  Perhaps the “Alps”). The game continues until one player can’t find a name that hasn’t been used already, and they lose.

Your job is to think about how you’d design an agent to play this game. DO NOT create a program! This is just a design.

You can assume that the agent has access to a “place list” of all legal names.  It may be a directed graph, with places as vertices and an edge (x, y) existing if the last letter of the place name x corresponds to the first letter in the place name y. You can think of it as represented in other ways if you want. 

  • If the agent has multiple choices for the next location, what should it pick?
  • What strategy will you use to pick a move?
  • How will you evaluate whether a move is good or not?

  

Python

 This is the topic: You are the IT manager of a large corporation. You are planning to use Python to develop statistical models to aid in analyzing your sales data. You are preparing a report for management. Here are the basic requirements for your report: Prepare in APA format Include references Report length: 500 – 700 words Briefly describe Telecommunication company (Ex: Charter communication, ATT, TMO) Briefly describe Python Give an overview of Machine Learning Report on:’ Implementation plans, Technical training, Python libraries required, How Python will be used And Types of reports that will be produced.

IT476 week 2

1A)- What is a relational Model?
1B) – Define entity, attribute, relationship, and constraints in an ERD (Entity Relationship Diagram).

2- What is a Primary Key?

CBSC 630 Case Study 5.1

 

Conduct additional research and write a 3 to 4 page paper explaining the steps you would take in detecting and removing a trojan horse from a computer system.. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited