can you provide a few cloud computing Concepts used in information Technology in 500 words
Safe Harbor Provisions
Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.
Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).
http://blog.securitymetrics.com/2014/05/hipaa-faq.html
https://www.hitechanswers.net/hipaa-hospitals-five-reasons-medical-data-storage-often-not-compliant/
https://www.careersinfosecurity.com/2-million-hipaa-penalty-after-patient-data-exposed-on-web-a-9465
https://www.medscape.org/viewarticle/810563_2
https://www.bankinfosecurity.com/ocr-considering-hipaa-privacy-rule-enforcement-changes-a-10750
Heaps and prority queus In python
You have been provided a Python file, heap.py, which constructs a heap structure with a list. Using that code as a guide:
Develop a heap data structure using a linked structure (Nodes and Pointers)
The heap must support add and remove from the heap
All operations most abide by the rules that govern a heap (see lecture slides for reference)
Once you have your heap structure created, next you must use it as a backing structure to a priority queue.
Develop a priority queue data structure that is backed by a heap (linked structure NOT A LIST)
Implement the normal methods that accompany a priority queue structure
Enqueue, dequeue, and peek by priority not position
Also length and whether or not the structure is empty (is_empty)
Perform the following operations to showcase your working structure
Enqueue the following items: 4, 7, 5, 11, 8, 6, 9
Dequeue 3 items by priority, they should be 4, 5, & 6.
related heap.py file code is below
class Heap:
def __init__(self):
self.heap = [0]
self.size = 0
def float(self, k):
while k // 2 > 0:
if self.heap[k] < self.heap[k//2]:
self.heap[k], self.heap[k//2] = self.heap[k//2], self.heap[k]
k //= 2
def insert(self, item):
self.heap.append(item)
self.size += 1
self.float(self.size)
def sink(self, k):
while k * 2 <= self.size:
mc = self.minchild(k)
if self.heap[k] > self.heap[mc]:
self.heap[k], self.heap[mc] = self.heap[mc], self.heap[k]
k = mc
def minchild(self, k):
if k * 2 + 1 > self.size:
return k * 2
elif self.heap[k*2] < self.heap[k*2+1]:
return k * 2
else:
return k * 2 + 1
def pop(self):
item = self.heap[1]
self.heap[1] = self.heap[self.size]
self.size -= 1
self.heap.pop()
self.sink(1)
return item
h = Heap()
for i in (4, 8, 7, 2, 9, 10, 5, 1, 3, 6):
h.insert(i)
print(h.heap)
for i in range(10):
n = h.pop()
print(n)
print(h.heap)
Application Security
Discuss the following, supplying citations to support any information that you provide. Do not include your opinion, only what you can support with a citation. Address the following topics.
- Describe operating system hardening
- Define it
- Why is it done?
- What steps are usually done in a Windows environment?
- Describe system restoration methods and procedures
- Define it
- Why is it needed?
- What tools and approaches are recommended?
- Describe network security controls
- Define it
- Why is it needed?
- What steps, tools, and policies are used to secure networks?
- Describe incident response teams and the role of evidence
- What are incident response teams and why do they exist?
- How does evidence collection relate to incident response teams?
- Discuss evidence
- Describe why evidence is collected,
- How it should be collected
- What can happen if it is collected or handled in an inappropriate way
For all writing assignments ensure that you do the following:
- Write 1000 to 1500 words in APA format.
- Utilize at least five scholarly references.
- Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources.
- Utilize Google Scholar and/or the university library.
- Do not copy and paste bulleted lists. Instead, read the material and in your words, describe the recommendation citing the source.
- Review the rubric to see how you will be graded.
- Plagiarism will result in a zero for the assignment.
- The second instance of plagiarism will result in your failure of this class.
- If you use a source, cite it. If you do not, it is plagiarism.
Business analytics
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
discussion 6
assignment added the attached picture
Allinone
Check each attachment!!
Risk Assessment
Briefly provide an overview/description of your fictitious company.
Identify and discuss the importance of risk assessment to the organization’s security framework? Discuss the five layers of risk.
Discussion 2
Discussion: This week we focus on the social and organizational issues that exist with better understanding why changes occurs. This week discuss the phases of change noted in the Linear Development in Learning Approaches section in the Information Technology and Organizational Learning text.
Textbook Name — Information Technology and Organizational Learning text.
Note: The first post should be made by Wednesday 11:59 p.m., EST.
Just need my worked checked
I need my SQL assignment looked over. I’m currently using MS management studio
1. List the employee whose employee number is 100.
Select * from Employee where employee_Num=100;
2. List the Employee whose salary is between 50 K to 100k.
Select * from Employee where salary between 50000 and 100000;
Select * from Employee where salary >= 50000 and salary <= 100000;
3. List the Employees whose name starts with ‘Ami’.
Select * from Employees where name like ‘Ami%’;
4. List the Employees whose name starts with A and surname starts with S.
Select * from Employees where name like ‘A%’ and surname like ‘S%’;
5. List the Employees whos surname contains kar word.
Select * from Employees where surname like ‘%kar%’;
6. List the Employees whose name starts with P,B,R characters.
Select * from Employees where name like ‘[PBR]%’;
7. List the Employees whose name not starts with P,B,R characters.
Not Operator Symbol
Select * from Employees where name like ‘[!PBR]%’;
Not Operator
Select * from Employees where name not like ‘[PBR]%’;
8. Write a query to fetch first record from Employee table?
Select * from Employees where rownum=1;
9. Write a query to fetch the last record from Employees table?
Select * from Employees where rowid = select max(rowid) from Employee;
10. Write a query to find the 2nd highest salary of Employees using Self Join
Select * from Employees a where 2 = select count (distinct salary) from Employee where a.salary <= b.salary;
11. Write a query to display odd rows from the Employees table
Select * from(select rownum as rno,E.*from Employees E) where Mod(rno,2)=1;
12. Write a query to display even rows from the Employees table
Select * from(Select rownum as rno,E.* from Employees) where Mod(rno,2)=0;
13. Write a query to show the max salary and min salary together form Employees table
Select max (salary) from Employees
Union
Select min (salary) from Employees;
14. Write a query to fetch all the record from Employee whose joining year is 2018
Select * from Employees where substr(convert(varchar,joining_date, 103),7,4)= ’2018′
15. Write a SQL Query to find maximum salary of each department
Select Dept_id,max(salary) from Employees group by Dept_id;
16. Write a query to find all Employees and their managers (Consider there is manager id also in Employee table).
Select e.employee_name,m.employee name from Employees e,Employees m where e.Employee_id=m.Manager_id;
17. Write a query to display 3 to 7 records from Employee table
Select * from (Select rownum as ‘No_of_Row’,E.* from Employee E)
18. Write a query to fetch common records from two different tables Employees and Employees1 which has not any joining conditions
Select * from Employees
Intersect
Select * from Employees1;
19. Write a query to validate Email of Employee
SELECT
FROM
EMPLOYEE
Where NOT REGEXP_LIKE(Email, ‘[A-Z0-9._%+-]+@[A-Z0-9.-]+.[A-Z]{2,4}’, ‘i’);
20. Write a query to remove duplicate rows from Employees table
Select Employee_No FROM Employees WHERE ROWID < >
(Select max (rowid) form Employees b where Employee_No =b.Employee_No);
