Python project

 

Select a database or data set to write a report on.

Report the data set you have chosen for your final project. Give a preliminary report (a sentence or two) about why you chose it and what you expect to be able to show. Remember that you need to be able to make plots with the data, so you should have some idea of what it is you want to show in plots to help with visualization. 

Write a jupyter notebook document that explains what the data is and why it’s important. It should include code for downloading or otherwise accessing the data. It should save a relevant portion of the data in a file that is in the same folder as the notebook. It is preferred that the data file be online and that the code accesses it to perform the data manipulation and visualization work, and that the saved data file not be required to be passed with the notebook.

It should have several plots showing interesting data relationships. This can reference your reasons why the data is interesting, or it can be about some conclusions or correlations you notice.

Assignment

 After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.). 

Mobile Security

  

Assignment Content

  1.     Mobile devices are always in the workplace and being used for both personal and company business. You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile devices and safety precautions. This poster will be seen by the entire company in hopes of empowering employees to protect themselves and the company from mobile breaches. 

    Create a visual poster or infographic to display in the company’s break room.  

    Include the following information: 

    • At least 2 mobile device threats 
    • List of ideal mobile security settings to defend against threats 
    • Brief instructions for setting up at least 2 security settings 
    • An explanation on what happens when mobile devices are not secured from these threats 
    • Appropriate images and graphics 
    • 2 resources for more information on mobile security with appropriate citations 
    • Format your assignment according to APA guidelines.

dis–>>350 words

 Protection of patient data has become a critical part of the scope of practice of all healthcare professionals. Routine data breaches underscore the importance of training clinical employees in protecting these data. However, beyond exposure to HIPAA regulations, little is done to educate the healthcare student about the risks and vulnerabilities of the online environment as it pertains to health data” (Swede, Scovetta, & Eugene-Colin, 2018). 

Mkt 455

 Read the following brief article on the 7R’s of Relationship Marketing:

https://smallbusiness.chron.com/seven-rs-marketing-mix-64543.html

Please answer the following questions:

  1. Briefly define each of the 7 R’s using any Internet references of your choosing;
  2. In your opinion, and supported by 1-2 Internet references, should marketers use the 4P’s of marketing in selling a product, the 7R’s of Relationship Marketing or both of them together (4P’s and 7R’s)?

Assignment

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500-word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used it must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

course — Physical Security

This course examines risks, threats, and countermeasures to secure data, personnel, and hardware. This involves facility creation and selection concerns, facility access control methods, and safety issues.

Ideas and Business System Types

1. Write a research paper of four pages, not including the title and reference pages. Follow APA 7 Guidelines for in-text citations and references. A minimum of two scholarly journal articles are required.

Textbook Reference: Cloud Computing by Dr. Kris Jamsa 

ISBN: 9781284248203 

Publisher: Jones & Bartlett Learning, 2nd Edition 

  • What is identification as a service (IDaaS)? 
  • What are some of the challenges related to identity management? 
  • What are some of the IDaaS solutions offered by various companies? 

2. Write a paper about the below topic in 250-300 words. Provide at least two APA references for your resource and corresponding in-text citations. 

Textbook Reference: Systems Analysis and Design by Kenneth E. Kendall and Julie E Kendall, 10th Ed.

ISBN: 13: 978-0-13-478555-4 

“System Types”: Describe the type of systems that exists in a Business.

Electronic Records management in various Areas

Check newspapers, Web sites, trade journals, and other sources of news or recent information for one or more topical mentions of electronic document management or record management in relation to one of, but not limited to, the following areas (This is not an exhaustive list.)

  • Personal electronic medical records
  • Records of national historical purpose such as email records from the White house
  • Company email records used in a lawsuit
  • Switching to medical records at hospitals
  • How the government (Medicare, Medicaid) uses electronic medical records
  • How pharmaceutical companies use electronic records
  • Electronic filing of tax returns at the IRS
  • Use of electronic signatures in real estate transactions
  • Electronic distribution of school transcripts
  • Electronic records management in doctors’ offices
  • Electronic document management systems in the court system
  • When and how health care providers will have to inform patients of a security breach
  • Electronic record management in the financial industry

Select one issue (or challenge) of electronic records management that has been covered in class in relation to the area you are interested in and write a 300-500 words response  that summarizes your findings (in your own words) and present your own position on the issue. Please locate and cite at least five sources to build your own position on the issue. The issues could be one of different functional components of a EDRMS, including retention, version control and management, check-in and check-out, classification, search and retrieval, security, privacy, and more.