Research Paper

Step 3: complete a report based on your understanding of the Quality Data Model (QDM).

Download and read a document on Quality Data Model (QDM). Focus your reading on sections 1.1-1.5, and 2.1 – 2.8.

Tasks: Write a report that contains your answer to the following questions:

1. Why a quality data model is needed? Explain QDM’s importance in healthcare information system using examples you have seen or discussed in this Module’s required readings. (10 points)

2. Figure 1 in section 2.5 shows an example QDM element structure on the left. The diagram to the right is an example of QDM element called “Laboratory Test”. Suppose you are member of an interprofessional team working a quality health database project for a hospital. Explain how you would design a database table to store data containing in the ODM element “Laboratory Test”. For example, what is the name of this table? What are the columns to include in this table? (10 points)

3. Suppose the same database contains other tables describing ODM elements such as Doctor, Patient, Medication, Pharmacy, Pharmaceutical Company, etc. Describe ONE scenario where you can use this database to address questions related to QDM element “Laboratory Test”.  (40 points)

Cloud Vender Presentation

 

In this project, you will develop a detailed comparative analysis of  cloud vendors and their services. A comparative analysis provides an  item-by-item comparison of two or more alternatives, processes,  products, or systems. In this case, you will compare the pros/cons of  the cloud service providers in terms of security, ease of use, service  models, services/tools they provide, pricing, technical support, cloud  service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers.  Include their service models (i.e., SaaS, PaaS, IaaS),  services/tools/solutions (i.e., compute, storage, database, developer  tools, analytics tools, networking and content delivery, customer  engagement), pricing, accessibility, technical support for companies,  global infrastructure.
  • One to two slides on a recommended cloud service provider based on  the comparative analysis and the cloud vendor’s abilities to meet the  service needs of the company.
  • One slide on the conclusion.
  • All slides must be narrated by you, the student.

   

How Will My Work Be Evaluated?

As a professional, you will likely make presentations to customers,  client audiences, and management. By summarizing your results and  recommendations in an effective presentation, you are demonstrating how  you use your technical knowledge to convey your ideas to others in a  professional setting. Your ability to express recommendations to  decision makers with the right mix of technical detail in an accepted  format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.2.2: Evaluate sources of information on a topic for relevance and credibility.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.
  • 10.1.3: Define the specifications of required technologies.
  • 13.1.1: Create documentation appropriate to the stakeholder.
  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

20210112

  

Data Base Security:

1) Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

2) Write an essay of at least 500 words discussing discussing IAM in a federated cloud application. 

3) Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use. 

4) Write an essay of at least 500 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies? 

5) Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.  

6) Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework. 

7) Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

8)   Learning About Cookies as Spyware. Research what kind of information cookies store. You might find the following  websites helpful:

www.allaboutcookies.org/

www.howstuffworks.com/cookie1.htm

Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.

IT345 week 6B

 Find a recent article that relates to either employee monitoring that is conceived as too invasive or a recent incident of where employee data has been breached. Summarize the article and discuss how you believe this will impact the company, and application (if applicable). Also, was the data exploited through an application or storage location that is not necessarily needed to run a business? Is it a nice to have? Example: a social media type application. 

300 words and citation

Business Intellegence

 Discussion: There have been many books and opinion pieces written about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented?

Exercise: 

1. Identify applications other than those discussed in this chapter where Pepper is being used for commercial and personal purposes. 

2. Go through specifications of MAARS at https://www. qinetiq-na.com/wp-content/uploads/brochure_ maars.pdf. What are the functions of MAARS? 

3. Conduct online research to find at least one new robotics application in agriculture. Prepare a brief summary of your research: the problem addressed, technology summary results achieved if any, and lessons learned. 

4. Conduct online research to find at least one new robotics application in healthcare. Prepare a brief summary of your research: the problem addressed, technology summary, results achieved if any, and lessons learned. 

5. Conduct online research to find at least one new robotics application in customer service. Prepare a brief summary of your research: the problem addressed, technology summary, results achieved if any, and lessons learned. 

6. Conduct online research to find at least one new robotics application in an industry of your choice. Prepare a brief summary of your research: the problem addressed, technology summary, results achieved if any, and lessons learned. 

7. Conduct research to identify the most recent developments in self-driving cars. 

Questions:
1. Based upon the current state of the art of robotics applications, which industries are most likely to embrace robotics? Why? 

2. Watch the following two videos: https://www. youtube.com/watch?v=GHc63Xgc0-8 and https:// www.youtube.com/watch?v=ggN8wCWSIx4 for a different view on the impact of AI on future jobs. What are your takeaways from these videos? What is the more likely scenario in your view? How can you prepare for the day when humans indeed may not need to apply for many jobs? 

graded assignment

Using a web search tool,identify cases in which private information was disclosed when computer equipment was discarded.Recent examples have included smartphones (like blackberry) that were sold without proper data cleasing and hard drives that were sold without data cleansing after the computers that were originally used in were upgraded.

3 page APA compliant paper on artificial intelligence (AI) with NO PLAGIARISM

3 page APA compliant paper with NO PLAGIARISM with a minimum of five peer-reviewed journal articles.

Answer the following questions:

1. Introduction to artificial intelligence

2. What is your definition of AI?  Please explain.

3. What is your opinion of AI, is the technology currently available? Why or why not?

4. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.

5. How is AI perceived as different in various industries and locations? Please explain.

6. conclusion

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

Data management paper

This needed within 8 hours. It a computer assignment with lots of queries and tables. Only experienced writer needed to do this within 7 hours.

Convert the following C++ program into an x86 assembly language program. Make sure to use your “Chapter 8” understanding of advanced functions, parameter passing, and local variables. Post ONLY your ASM file here to Blackboard when complete

 #include

using namespace std;

int IsSemifauxtrifactored(int value)
{
    // Return 1 if a number’s factors/divisors from (value – 1) to 1 sum up to a quarter of the number value
    // Return 0 otherwise

    // A number is called “semifauxtrifactored” if its summed factors/divisors equal a quarter of the number itself
    // Integer division is used, so remainders on the halving can be lost
    // That’s why…

    // 7 is a semifauxtrifactored number
    // 7 divided by 4 with integer division is (7 / 4) = 1
    // 7 % 6 -> 1
    // 7 % 5 -> 2
    // 7 % 4 -> 3
    // 7 % 3 -> 1  
    // 7 % 2 -> 1  
    // 7 % 1 -> 0   FACTOR!
    // 7 is a semifauxtrifactored number since its factors (1) equal a quarter of the number (1)

    // 6 is a normal number
    // 6 divided by 4 with integer division is (6 / 4) = 1
    // 6 % 5 -> 1
    // 6 % 4 -> 2
    // 6 % 3 -> 0   FACTOR!
    // 6 % 2 -> 0   FACTOR!  
    // 6 % 1 -> 0   FACTOR!
    // 6 is a normal number since its factors (1 + 2 + 3) do not equal a quarter of the number (1)
}

int main()
{
    cout << "Enter a value: ";
    int value;
    cin >> value;
    value = IsSemifauxtrifactored(value);
    if (value == 1)
    {
 cout << "The number is semifauxtrifactored!";
    }
    else
    {
 cout << "The number is normal";
    }

    cout << endl;
    system(“PAUSE”);
}