Parallel Algorithms

Q1: Let Array A [1: 60] = 51, 52, …., 109, 110. How many element comparisons are performed by Algorithm BINARYSEARCH when searching for the following values of x?

(a) 20   (b) 57   (c) 150

Q2: (a)  Illustrate the operation of Algorithm SELECTIONSORT on the following array, showing the contents of the array after each outer-most iteration.

9

14

11

3

4

7

(b)  How many element comparisons are performed by the algorithm?

Q3: (a)  Illustrate the operation of Algorithm INSERTIONSORT on the following array, showing the contents of the array after each outer-most iteration. 

9

14

11

3

4

7

(b)  How many element comparisons are performed by the algorithm?

Q4: (a)  Illustrate the operation of Algorithm BOTTOMUPSORT on the following array, showing the contents of the array after each outer-most iteration. 

9

14

11

3

4

7

(b)  How many element comparisons are performed by the algorithm?

Q5: In your own words (not more than 50 words), explain how do the below algorithm sorts an array of n elements. 

* the SELECTIONSORT

* the BOTTOMUPSORT 

* the INSERTIONSORT

Google and the future of computing.

  

Google and the future of computing.

Your task is to research Google and discover at least 5 technologies they have developed (or are currently developing), other than the search and advertising features. write at least one full page (500 words) about at least 5 different Google technologies

INTERNET OF THINGS

INTERNET OF THINGS (Topic)

Research paper 

At least five appropriate, properly cited sources . Your project (paper) will comprise 2500 to 3000 words (not including title and reference pages). Your project (paper) must be formatted according to APA guidelines as a Word document, double spaced, Times New Roman, 12-font, with one-inch margins.

Preparing Data for analytic solution

  

Assignment 4  Data preparation for an analytics solution

You are a data analyst working with a team of data scientists and statisticians for a large healthcare system called Acme Healthcare. This healthcare system includes numerous clinics and hospitals. Your mission is to provide analytical solutions to the executive leaders at Acme Healthcare to help them solve the following analytical problem: 

 Some providers at Acme Healthcare may be engaging in fraud with respect to documentation and billing. How can they be identified after controlling for patient-level risk factors? 

Your task is to provide a PDF report for the executive leaders of Acme Healthcare who are mandated to solve the problem you have selected. The report has multiple steps and will include a description of the problem area you want to focus on, the data, and how you might address the necessary challenges and possible solutions to the problem. Your report will include an Appendix to illustrate how you would modify the data dictionary and where you can put additional descriptive text or examples about how you plan to solve some of the complex ETL issues. 

Here is a summary of the steps for this report, which build on each other and for what you will be graded on:

1. Choose one of the analytical problems and suggest possible analytical solutions. 

2. Evaluate how groupers can help you solve aspects of the analytical problem. You can consider how to group diagnoses, procedures, and medication codes into analytical categories. 

3. Create a one-paragraph analytical plan about how you will solve the problem. 

4. Answer questions about what ETL processes are required to create the analytical file. 

5. Create an appendix where you include suggestions for improvements to the data dictionary and summarize likely analytical output.

Tools and Data

The tools and data you will use for this assignment are: 

· Excel

· Access to the already transformed CMS 2008-2010 Data Entrepreneurs’ Synthetic Public Use File (from lessons in Module 4)

· Optional (statistical software or various programming languages to transform and analyze the data)

Note:

This assignment in a PDF report must answer the questions posed in the step-by-step instruction to score a passing grade. Step 1 is done. Please work on steps 2 to 5. Please incorporate step 1 into the final PDF report. Thanks.

Need help in Homework in Info Governance

  

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

  

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Need 1 page literature review

applications of networking techonolgies

 You must obtain prior approval for your topic from the professor via a 1-paragraph
proposal submitted on the CS553 Project Request Form prior to the second week of
class. Do not begin the project until you have obtained approval from the professor.

The topic should illustrate specific applications of Networking Technology principles. If
applicable, data and software for these projects can be obtained from various Internet
sites, or developed by students.   

 You may also use your own creativity to pick an interesting topic, but your instructor
must approve it.

Your assignment is to write a research paper and presentation. The paper must be at
least 20 typed pages plus a bibliography in APA format.  
 

Research Project

  

Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

§ Understand and document the purpose of each access control change request

§ Know what access controls were in place before any changes

§ Get an approval of change by management

§ Understand the scope of the change, both with respect to users, computers, and objects

§ Have evaluated the expected impact of the change

§ Know how to evaluate whether the change meets the goals

§ Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

§ Status or setting prior to any change

§ Reason for the change

§ Change to implement

§ Scope of the change

§ Impact of the change

§ Status or setting after the change

§ Process to evaluate the change

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

Create a robust plan for a law firm

 Make sure that for this network plan you are investigating, researching, and brainstorming stakeholder needs, identifying and addressing data access issues, identifying and planning for security concerns, considering disaster recovery and maintenance issues, and including a researched but estimated consideration of costs related to the network.  

 

Make sure you robustly address the following topics/areas:

  • network topology (physical and logical/functional) – be sure to include both textual descriptions as well as visual diagrams with captions.
  • hardware considerations (routers, gateways, switches, cabling, wireless access points, physical servers/nodes, etc.) – be sure to discuss both physical hardware as well as any virtualized hardware (IAAS).
  • software servers/services (web, database, file, source control, patient portals, training intranet resources, etc.)- be sure to consider the needs of stakeholders and what servers/services, clients, and security or maintenance utilities should be considered.
  • security policies/procedures and network systems/services (firewalls, IDS/IPS, spam/virus filtering, network monitoring/scanning, chokepoints, guest networks, DMZ’s VPNs, encryption, BYOD policies, etc.)
  • disaster recovery/continuity of service/maintenance needs (backup hardware/software, storage locations, communication policies/procedures, recovery policies/procedures, etc.)

 

Make your arguments as to why your solutions make sense for your chosen organization’s network. Don’t just say, “you need a wireless mesh network”, explain, discuss, and schematize why that makes sense for your context and stakeholder needs.

Network Plan Format Requirements 

Submission of your Network Plan should be at least 10 pages in length, using no larger than 11point Times New Roman Font, single spaced,  with 1in margins (top, bottom, left, and right).

Assignment – (Course – Malware Analysis & Mitigation)

Search for a scholarly source on the topic of the “Solar Winds Cybersecurity incident” on Google Scholar (https://scholar.google.com/) or using other searches. Summarize the article and discuss your opinion on the article. Use APA formatting and be sure to cite your sources or references using APA Style.

Note: this is relevant and happened recently so knowing this is useful!

Note – NO Plagarism, Follow APA & Article should be Scholarly source.       Please follow these three things.