Show the results (using screenshots) of executing each SQL statement against the database you created. Do not highlight your SQL statement in MySQL Workbench before taking the screenshot (this makes it difficult to read the output). For the VIEWs create in exercise-3, also show the results of executing a SELECT * … statement against the VIEW. All screenshots and text must be submitted as a single Word document.
Safe Harbor Provisions
Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.
Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).
http://blog.securitymetrics.com/2014/05/hipaa-faq.html
https://www.hitechanswers.net/hipaa-hospitals-five-reasons-medical-data-storage-often-not-compliant/
https://www.careersinfosecurity.com/2-million-hipaa-penalty-after-patient-data-exposed-on-web-a-9465
https://www.medscape.org/viewarticle/810563_2
https://www.bankinfosecurity.com/ocr-considering-hipaa-privacy-rule-enforcement-changes-a-10750
Exploratory Data Analysis
After the data is collected, we perform exploratory data analysis using simple visualization methods to gain a better understanding of the data that we will be working with during the analytical process.
In this critical thinking assignment, you will use the results from the preliminary data analysis that you completed in the previous week and use R and Tableau to investigate the variables of interest to the research questions.
R can be downloaded free from the closest mirror servers in Turkey: either https://cran.pau.edu.tr/ or https://cran.ncc.metu.edu.tr/.
Here is the list of all mirrors: https://cran.r-project.org/mirrors.html
Tableau for Students can be downloaded free here: https://www.tableau.com/academic/students.
Students will need to apply for a student license (and extend when it expires): https://www.tableau.com/academic/students#form
Scenario:
Continuing with the scenario you selected for your assignment last week—Titanic or Telecom Customer Churn—complete the following requirements. You will be utilizing some of your previous work in this assignment.
Requirements:
Part I: Contextualization
In the Introductory section of your report, provide a contextualization of the dataset by doing the following:
- Specify the selected dataset.
- Summarize the three research questions you have constructed.
- Summarize the findings from the preliminary data analysis.
- For each research question, identify the target (dependent) and predictor (independent) variables.
Part II: Statistical Description
- Write an R script that uses the summary() method to generate the statistical descriptions of the variables in the data subset. Capture the outcome from the R code.
Part III: Univariate Analysis
- Write an R script to count the different values of each relevant variable (column) in the dataset(s).
- Use the counts calculated for task prompt E to generate a histogram for each variable in Tableau.
- Summarize the findings from the inspection of the histograms that support the univariate distribution analyses.
Part IV: Bivariate Analysis
- Select appropriate visualization formats to depict the relationship between the target and the predictor variables.
- Summarize the observations from the visual inspections of the visualizations completed in task (a).
Part V: Outliers
- Describe the outliers in the dataset(s). Provide the calculations used to identify them using any tool and method of choice.
Part VI: Reporting
- Write a detailed APA-formatted report that summarizes the findings from the Exploratory Data Analysis for an audience of data analyst peers. Include details on the methodology and tools and support the findings with appropriate visualizations and screenshots of outputs from the use of the software tools.
Please respond to each of the task prompts organized by the Parts of the assignment. Your work for parts I-V should be total of 3-4 pages (approximately 1 page per part).
The report required for task prompt VI is a stand-alone document that will organize some of the elements of the responses to the other task prompts in a professional report that summarizes your actions, code, and findings and should not exceed 3 pages.
You will upload a zipped file that includes the responses to the task prompts your report, and all supporting files, including the R code and Tableau files.
Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references in support of your work, in addition to your text and assigned readings. Include a title and reference page.
You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.
monitoring
Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?
2. are we working more and earning less?
3. Would you want a telecommuting job? Why or why not?
4. Does the gig economy appeal to you? Why or why not?
5. How is an employee differentiated from a contracter under US law?
6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?
7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs?
8. How much monitoring of employee activities at work is appropriate?
9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time?
10. What is the relationship betwee BYOD (bring your own device) and shadow IT.
11. What is cyberloafing?
Building Secure Web Applications
1)
Learning About OWASP
Visit the OWASP website.
Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP.
See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.
Safe Assign is software that verifies the originality of your work against on-line sources and other students.
2)
Do a bit of research on CWE, Common Weakness Enumeration.
Write a brief overview of their scoring system.
Pick one of common weaknesses identified on their site and describe it.
Your assignment should be 200-300 of your own words wth references and citations
ITISP W 2 A
Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
5s week 5 assignment PL
Research Databases available from the Danforth Library: https://libguides.nec.edu/az.php
Discuss in 500 words your opinion whether Fair Use of copyrighted material should be expanded, contracted, or left alone. Justify your choice.
Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Include references.
2 Essays (Paper) – Cloud Computing – One to be done in 3hrs and one to be done in 15hrs
I have attached the assignment details. The subject name is Cloud Computing
Assignment 1 – Reflective Paper (500 words) – Due in 3 hours
Assignment 2 – Practical connection Paper (500 words) – Due in 15 hours
Please let me know if anyone can work on both within the deadline
Order # 12529
Title: Network Protocols
Paper type Essay
Paper format APA
Course level Undergraduate
Subject Area Other (Not listed)
# pages 1 ( or 300 words Minimum)
Spacing Double Spacing
# sources 4
Paper Details
For this assessment, create and describe the information flow of an OSI model.
To begin, select a generic work environment, such as any office that would use a phone system, to use as an example to describe how this is done.
Also, complete the practice labs provided in the Virtual Resource Portal activity for this assessment. Use these labs and the Internet to gather the information necessary to create your own analogy essay of the flow of information through the OSI model. Your analogy will include network protocols and compare these against the OSI model.
Then, complete the following:
1.Create an OSI model for a generic work environment. You can use Microsoft Word to do this.
2.Write a report that addresses the following, based on the OSI model you created. ◦Provide an explanation of at least three different network protocols used in the OSI model.
◦Explain the purpose and role of at least three of the network protocols you identify.
◦Describe the importance of the work performed by the network protocols you identify. This may include how well they do with network security. Examples include TCP/IP traffic and port security.
◦Apply the concepts from the practice lab activities for this assessment.
Additional Requirements
•Written communication: Written communication is free of errors that detract from the overall message.
•APA formatting: If you use sources, ensure that resources and citations are formatted according to APA (6th edition) style and formatting.
•Font and font size: Times New Roman, 12 point.
Essay and Assignment
Essay:
Please choose any two topics from the list below and create a minimum 2-page essay answering the 2 questions (out of 4). Note: Avoid DIRECT wording from any source, rather rephrase the author’s work and use in-text citations where necessary.
ANSWER ANY 2:
1. Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models? Add a few Examples.
2. List and briefly describe the nine-step process in conducting a neural network project.
3. What is the main difference between classification and clustering? Explain using concrete examples. Add a few Examples.
4. What are the privacy issues with data mining? Do you think they are substantiated? Add a few Examples.
** Please note Do NOT write an introduction, rather just answer any 2 questions from above.
Refer to Chapter 1 to 7 in the attached textbook:
Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6.
Requirement:
Minimum 2-page essay. Do not need a cover sheet, abstract, graphs.
Add references separately for each question. Include in-text citations.
Strictly follow APA 7th Edition Format
No plagiarized content please! Attach a plagiarized report.
Check for spelling and grammar mistakes!
$10 max. Please bid if you agree.
****Separate document for each assignment****
Assignment:
What are the common challenges with which sentiment analysis deals? What are the most popular application areas for sentiment analysis? Why?
Refer to Chapter 7 in the attached textbook:
Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6.
Requirement:
Minimum 300-350 words. The cover sheet, abstract, graphs, and references do not count.
Add references separately for each assignment question.
Strictly follow APA 7th Edition Format
No plagiarized content please! Attach a plagiarized report.
Check for spelling and grammar mistakes!
$5 max. Please bid if you agree.
Assignment 3:
Find an example of a code of ethics or acceptable use policy related to information technology and discuss three points that you think are important.
Requirement:
****Separate document for each assignment****
Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.
Add reference separately for each assignment question.
Double Spaced and APA 7th Edition Format
No plagiarized content please! Attach a plagiarized report.
Check for spelling and grammar mistakes!
$5 max. Please bid if you agree.