Database homework

1Draw the corresponding ERD for the following Employee Database

2Normalize the following Schema with the given functional dependencies into BCNF
3Explain in your own words why the Student-Dept relation is not in 4NF. Then, convert the Student-Dept relation in 4NF. Also, provide the justification for each step you perform during normalization (4NF). Note: The SportActivity here means any sport a student is participating in. For example, a student with ID = 123 can participate in soccer and badminton
4In your own word, explain why do designers use Denormalization? What is the limitation of using Denormalization? Name and explain a better alternative approach than Denormalization.

new tech bus leaders

The Business Issue Facing

Company name: U of A XYZ hospital

An Evolving Business Landscape 

Health Care Consumers are becoming more aware that:

Medical Information belongs to them

Greater desire to access the information NOW

Information must be accessible to other providers within/outside of Network SECURELY

Geography should not be a barrier to access

Consumer Desire and Business Issue appear to be inter-related 

Using existing Hospital IT Systems to address Business Issue not enough

Must realize that hospitals are now either merging or consolidating for financial survival 

We are now forced into  a “Coopetition Model” to stay relatively independent

Blockchain can serve as a solution via “Honest Broker” Mechanism for Data Exchange

Yet, still allows U of A xyz Hospital to continue to use it’s internal EMR system w/o substantial institutional change

Requirement:

Need to prepare 7 slides on Associated Costs and Shared Risks

6 slides of information and 1 side is reference.

Research article:

Hasselgren, Kralevska. “Blockchain in Healthcare and Health sciences—A Scoping Review.” International journal of medical informatics (Shannon, Ireland) 134 (2020)

  Zhuang, Sheets. “A Patient-Centric Health Information Exchange Framework Using Blockchain Technology.” IEEE journal of biomedical and health informatics 24.8 (2020): 2169–2176

Portfolio project

  • The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  
    The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.
    Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  
    There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.
    Conclude your paper with a detailed conclusion section which discusses both limitations and emerging concepts. 
    The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
    Your paper should meet the following requirements:

    • Be approximately seven to ten pages in length, not including the required cover page and reference page.
    • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

discussion

Annotation is a crucial component of a good dataviz. It can turn a boring graphic into an interesting and insightful way to convey information. Dataviz is often separated in two main types: exploratory and explanatory analysis. Annotation is used for the second type.

Our current attention span for looking at things online is, on average, less than five seconds. So if you can’t grab someone’s attention within five seconds, you’ve likely lost your viewer. Adding accurate annotation can greatly help to grab audience attention. Use keywords, shapes, colors and other visuals to help them go straight to the point.

Annotation is a general concept, and hundreds of different ways to annotate a chart exist, depending on the context.

What are effective ways to leverage annotation in data visualizations? Provide 3 examples of how you would effectively use annotation in a data visualization. Describe how you would use them to keep viewers’ attention.

Discussion Length (word count): At least 250 words

References: At least three peer-reviewed, scholarly journal references.

Wk 4 – Comparing a Security Strategic Plan to a Security Policy and Aligning to Security Controls

2 Part Assignment 

Assignment Content

  1. The information security strategic plan and security policies are strongly interrelated within an organization’s information security program. The security plan and security policies will drive the foundation and selection of security controls to be implemented within the organization.

    Part 1
    Write a 1- to 2-page summary of the comparison chart of strategic plans and security policies you completed in this week’s Learning Team assignment.

    Part 2
    Review the control families described in this week’s reading, NIST SP 800-53a Revision 4, Assessing Security and Privacy Controls for Federal Information Systems and Organizations.

    Review the controls from this week’s reading, CIS Controls V7.1.

    Develop a 2- to 3-page matrix using Aligning Security Controls to NIST Security Controls Matrix Template that accurately maps CIS controls to NIST security control families. Note that some CIS controls may map to multiple NIST control families.

    Cite all sources using APA guidelines.

    Submit your assignment.

Assignment

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Minimum of 400 words

What does a peer review process look like? When does an assessment require peer review? Who should perform the peer review?

federated architecture in cloud systems

 

Discuss in 500 words or more federated architecture in cloud systems. Remember that this is a cloud class, not a database class.

Cite your sources. Do not copy. Write in essay format, not in bulleted, numbered, or another list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding the length of your post, and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested.

Issues/breaches the company has gone through

Pick a company to focus on for this assignment.  Based upon the given information you can find on the company and any technology-related issues/breaches the company has gone through no older than 5 years, create Crisis Management Plan

  1. Introduction – brief background of company and any issues the company has had in the past such as data breaches
  2. Strategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company)
  3. Risk Analysis – political analysis, environmental analysis (more or less depending upon company)
  4. Crisis Management Plan:
    1. Purpose
    2. Committee for crisis management planning
    3. Crisis types
    4. Structure of the Crisis Management Team
    5. Responsibility and control
    6. Implementation Plan
    7. Crisis Management Protocols
    8. Crisis Management Plan Priorities
  5. Conclusion
  6. Divide the work on the plan amongst your group members.

References – APA format

Page Count Range should be 10 pages not including:

Title page, Table of Contents and References page