computer science

 explain the following

1. Build confidence with mock technical interview preparation and whiteboard challenges, get connected with top employers, and navigate your job search from end-to-end with a dedicated career coach. 

 2. Showcase your coding and collaboration skills to potential employers, creating full-stack web applications that leverage modern programming languages, frameworks, and tools. 

Contracting & Service Level Agreements

 

Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

Data incident

Pick a data incident in the news; it can be one of the well-known or smaller incidents(Zoom would be great).   Create a plan to show how you would respond and describe some risk-mitigating items that if they were in place may have stopped this incident. (3-4 pages)

Safe Harbor Provisions

Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.  

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.   Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

http://blog.securitymetrics.com/2014/05/hipaa-faq.html

https://www.hitechanswers.net/hipaa-hospitals-five-reasons-medical-data-storage-often-not-compliant/

https://www.careersinfosecurity.com/2-million-hipaa-penalty-after-patient-data-exposed-on-web-a-9465

https://www.medscape.org/viewarticle/810563_2

https://www.bankinfosecurity.com/ocr-considering-hipaa-privacy-rule-enforcement-changes-a-10750

200-250 words

 Kirk (2016) tells us that data adjustments affects what data is displayed and presentation adjustments affects how the data is displayed. Each of the adjustments involve specific features. Data adjustments include: Framing, Navigating, Animating, Sequencing, and Contributing. Presentation adjustments include: Focusing, Annotating, and Orientating. Select one feature and expand on it. 

Spr1.3

Assignment 1

Kirk (2016) tells us that all requirements and restrictions of a project must be identified. Select 1 key factor below and discuss why Kirk (2016) states it will impact your critical thinking and shape your ambitions:

· People: stakeholders, audience.

· Constraints: pressures, rules.

· Consumption: frequency, setting.

· Deliverables: quantity, format.

· Resources: skills, technology

Textbook is attached, “Andy Kirk – Data Visualisation_ A Handbook For Data Driven Design-Sage Publications (2019)”.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Include at least two citations (APA) from academic resources

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

  

Assignment 2

Project Part 3.

Refer to the “Project Part 3-Malware Protection Procedure Guide” word document for tasks and instructions. 

Requirement: 

· ****Separate word document for each assignment****

· Minimum 3 pages. Cover sheet, abstract, graphs, and references do not count.

· Strictly follow APA style.

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $10 max. Please bid if you agree.