Wk 4 – Apply: Country Presentation to the Board of Directors

 

Assignment Content

  1. Based on readings in Rising Powers, Global Governance, and Global Ethics and related discussions, choose 1 of the countries or regions from the book into which your company might wish to expand. 

    Develop a 1-to 2-page table using either Microsoft Word, PowerPoint, or Excel that accurately compares your U.S.-based company’s ethics, based on classical ethical theory as well as its ethical stance on privacy, protection of intellectual property, and protection of PII to those within your country of choice. The column headings are “U.S.-based Company” and “Country of Choice.” The row headings are “Classical Ethical Theory,” “Privacy,” “Protection of Intellectual Property,” and “Protection of PII.”

    Create a PowerPoint presentation containing 8 to 10 slides for your corporate Board of Directors logically depicting at least 3 ethical challenges you might anticipate along with a policy statement for each. Include research concerning the country’s stance on issues, such as privacy, protection of intellectual property, corruption index, major religions, or indigenous tribal groups in the speaker notes.

    Include supportive graphics and appropriate backgrounds and styles. All references need to adhere to APA guidelines, and images should not be copied unless you obtain author permission or use copyright-free images.

    Note: You may use other applications like Adobe® Spark®,, Microsoft® Sway®, or Mix instead of PowerPoint.

    Submit your assignment.

     

risk management strategies

Compare s and explain a risk management strategies situation in school life or in life where you applied risk management strategies.

Provide enough details so your classmates understand the situation and risk strategy employed.

Choose two of situation and risk strategies and offer a suggestion on how using controls could mitigate certain risks.

R vs Python

Several Big Data Visualization tools have been evaluated in this weeks paper. While the focus was primarily on R and Python with GUI tools, new tools are being introduced every day. Compare and contrast the use of R vs Python and identify the pros and cons of each. Provide an example of both programming languages with coding examples as well as your experience in using one or both programming languages in professional or personal work. If you have no experience with either language, please discuss how you foresee using either/both of these languages in visualizing data when analyzing big data.

Organ Leader and decision making PHDIT-

 

  1. Organizational performance is the fifth aspect of the model, reflect on the question, do certain leadership behaviors improve and sustain performance at the individual, group, and organizational level?  Please explain your response.
  2. There were two types of innovation addressed this week (product and process innovation), please note your own personal definition of these concepts and offer an example of both.

Please be sure to answer all of the questions above in the initial post.

reflection paper-Cloud computing

Provide a reflection of at least 300 words that summarizes what you feel are the most important or interesting concepts you have learned so far in this cloud computing course. would be good to include an insight as to whether the learning was new to you or reinforced knowledge that you already had

(syllabus till now: understanding cloud comp types, cloud services models, saas, paas, iaas.

Requirements: 

Provide a (1 page with in next 3 hours)

APA format.

Preview the document

read the attachment and answer the question

1. Download and read attached report: “Metrics for the Second Curve of Health Care”Preview the document. You need to concentrate your reading on contents related to “Strategy 4: developing Integrated Information Systems”.

Write a report to explain

  • what is the Second Curve Health Care? (10 points)
  • why Strategy 4 is important in the transition from the First Curve to the Second Curve (40 points)? Your explanation should be written from the informatics perspective focusing on how the three components of Informatics are involved in this strategy.

If you choose to supplement your writing with resources besides the attached document, you need to include their references in APA format.

Save your report as a Word document and name it as SecondCurve_FL where FL are your first and last name initials. Your Word document should be formatted using Times New Roman font (no smaller than 10 pt but no bigger than 11 pt), single spacing, 1″ margins on all sides, and the report length (2 page minimum,

……………………………………………………………………………………………………………………………………………………………….

2. Download and read a document on Quality Data Model (QDM)Preview the document. Focus your reading on sections 1.1-1.5, and 2.1 – 2.8.

Tasks: Write a report that contains your answer to the following questions:

1. Why a quality data model is needed? Explain QDM’s importance in healthcare information system using examples you have seen or discussed in this Module’s required readings. (10 points)

2. Figure 1 in section 2.5 shows an example QDM element structure on the left. The diagram to the right is an example of QDM element called “Laboratory Test”. Suppose you are member of an interprofessional team working a quality health database project for a hospital. Explain how you would design a database table to store data containing in the ODM element “Laboratory Test”. For example, what is the name of this table? What are the columns to include in this table? (10 points)

3. Suppose the same database contains other tables describing ODM elements such as Doctor, Patient, Medication, Pharmacy, Pharmaceutical Company, etc. Describe ONE scenario where you can use this database to address questions related to QDM element “Laboratory Test”. (40 points)

In order to help you understand this question, please consider the following sample scenario: Doctor A needs to find if any of his/her patients in the age group 35-55 has low HDL so that s/he can recommend them to practice regular aerobic exercise and loss of excess weight to increase the HDL level. Doctor A asks you for help since you are a health informatics analyst. Describe how you would use the database to find the answer. For example, do you need to use the database table representing QDM element “Laboratory Test”? What other tables in this database do you need to use? How will you generate the answer for Doctor A from theses database tables?

Save your report as a Word file and save it as H3_FL2.docx where FL are your first and last name initials.

……………………………………………………………………………………………………………………………………………………………

3. The attached Ethics-III.pdfPreview the document continues the discussion on what other ethical obligations software engineers are under.

Then proceed to answer the questions inside the reading:

  • Questions 5.1 to 5.12

Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones. There are three grade levels for this assignment based on your responses to all the questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).

Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides.

Save your file as Ethics_3_FL where FL is your first and last name initial and Submit.

……………………………………………………………………………………………………………………………………………………………….

4. Answer the following two questions based on what you have learned from “Head First” book Chapter 4 and Chapter 5.

Q1. Describe the usage of the Burn Down chart in the Head First book Chapter 4. Explain how to calculate the value and update it on the chart for any particular day? (Your answer should explain the relationship between the Burn Down chart and the other techniques discussed in Chapter 4 such as the Big Board and the Standup Meeting.) (20 points)

Q2. Suppose that you are asked to add a new event to the iSwoon system: The event is “Party at a friend’s place” and it is only allowed to occur on the 4th date or later. Describe what you would have to do to add this Event to the original iSwoon design(Ch 4) AND the “fixed” iSwoon design (Ch 5) respectively.(10 points)

Give your own evaluation of the latter “fixed” design; does it address the problems of the original design? What problems might the original design have and how might you fix them? (20 points)

Save your file as iSwoon_FL where FL is your first and last name initial and Submit.

………………………………………………………………………………………………………………………………………………………………………….

5. you are going to complete a midterm paper and it’s based on the movie “Office Space”. You choose the way to watch the movie in a comfortable setting.

Write your review in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides, and the paper’s length is no more than 2 pages. Any direct quotes from the movie do not count into the length of the paper.

In the midterm paper, you need to identify at least three problems (problems identified must be from the software engineering perspective, not from the general ethics perspective) that could have been avoided if a good software development method is applied in “Office Space”.

  1. Identify the problems related to software engineering and describe what the consequences of these problems are respectively; (15 points)
  2. Explain what actions you, as a member working on a software project, would have taken in order to avoid those problem respectively; (30 points)
  3. Describe if your actions (described above) are related to any knowledge that you learned from the first 5 modules of this semester. (5 points)

Save your file as Movie_FL where FL is your first and last name initial. Submit your file through the dedicated link under the Submissions tab.

IDM W 8 A

 

Question 1

Suppose that you are employed as a data mining consultant for an Internet search engine company. Describe how data mining can help the company by giving specific examples of how techniques, such as clustering, classification, association rule mining, and anomaly detection can be applied.

Question 2

Identify at least two advantages and two disadvantages of using color to visually represent information.

Question 3

Consider the XOR problem where there are four training points: (1, 1, −),(1, 0, +),(0, 1, +),(0, 0, −). Transform the data into the following feature space:

 Φ = (1, √ 2×1, √ 2×2, √ 2x1x2, x2 1, x2 2).

Find the maximum margin linear decision boundary in the transformed space.

Question 4

Consider the following set of candidate 3-itemsets: {1, 2, 3}, {1, 2, 6}, {1, 3, 4}, {2, 3, 4}, {2, 4, 5}, {3, 4, 6}, {4, 5, 6}

Construct a hash tree for the above candidate 3-itemsets. Assume the tree uses a hash function where all odd-numbered items are hashed to the left child of a node, while the even-numbered items are hashed to the right child. A candidate k-itemset is inserted into the tree by hashing on each successive item in the candidate and then following the appropriate branch of the tree according to the hash value. Once a leaf node is reached, the candidate is inserted based on one of the following conditions:

Condition 1: If the depth of the leaf node is equal to k (the root is assumed to be at depth 0), then the candidate is inserted regardless of the number of itemsets already stored at the node.

Condition 2: If the depth of the leaf node is less than k, then the candidate can be inserted as long as the number of itemsets stored at the node is less than maxsize. Assume maxsize = 2 for this question.

Condition 3: If the depth of the leaf node is less than k and the number of itemsets stored at the node is equal to maxsize, then the leaf node is converted into an internal node. New leaf nodes are created as children of the old leaf node. Candidate itemsets previously stored in the old leaf node are distributed to the children based on their hash values. The new candidate is also hashed to its appropriate leaf node.

How many leaf nodes are there in the candidate hash tree? How many internal nodes are there?

Consider a transaction that contains the following items: {1, 2, 3, 5, 6}. Using the hash tree constructed in part (a), which leaf nodes will be checked against the transaction? What are the candidate 3-itemsets contained in the transaction?

Question 5

Consider a group of documents that has been selected from a much larger set of diverse documents so that the selected documents are as dissimilar from one another as possible. If we consider documents that are not highly related (connected, similar) to one another as being anomalous, then all of the documents that we have selected might be classified as anomalies. Is it possible for a data set to consist only of anomalous objects or is this an abuse of the terminology?

Database Assignment

 

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one  full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. 

 

https://www.youtube.com/watch?v=h-9rHTLHJTY

https://www.youtube.com/watch?v=_jKylhJtPmI

https://www.youtube.com/watch?v=ciNHn38EyRc

Watch this video on the SQL Slammer worm

https://www.youtube.com/watch?v=Zbd4Vk9LO3g

Watch these videos on inference attacks

https://www.youtube.com/watch?v=Z9ZjtvcgOcs

https://www.youtube.com/watch?v=rrwUCOEJFJM

https://www.youtube.com/watch?v=dx-R_AFQsc0