main discussion

 

Discuss the differences as well as the advantages and disadvantages of IaaS, SaaS, and PaaS. Otherwise, you may include an implementation of each such as Salesforce or AWS with details on their services. 
You must post at least twice during the week on at least  two different days to get full credit. Your posts should add to the conversation with relevant information. Just agreeing with you classmates or similar responses will not receive any credit. 
I am not looking for long posts. Eight or so sentences for each post of  ORIGNAL writing will suffice. I do not want see paragraph after paragraph of copied material. Your post will be checked by SafAssign for similarity. 
If you use references they  MUST include in text citations where the information is used. If the information is a direct quote from a source it  MUST be in parentheses. Otherwise you are at risk of plagiarism. However, you do not have to use the APA Edition 6 format (template with fonts, heading, etc.) in the discussions.
Ignorance of APA Edition 6 citing and referencing is not acceptable in graduate level work. If you do not use it you may be accused of plagiarism. If you have not done so please familiarize yourself with it now. There are numerous sources under the “Start Here” tab.
Please DO NOT submit your posts as attachments in the discussion area. All writing need to be in the discussion area.

Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger print?

 

Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger print?

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.  Make your initial post by Thursday 11:59 pm EST. Respond to two of your classmates by Sunday 11:59 pm EST.  

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.

Computer science

1.Enlist some commands of DDL, DML, and DCL.
2.Define DML Compiler.
3.What is DDL interpreter?
4.Enlist the advantages of SQL
5.Explain the terms ‘Record’, ‘Field’ and ‘Table’ in terms of database.

Cloud services

In 80 words or more answer the following questions. What if your organization has a lot of its IT presence in the cloud? How would your organization conduct audits on the cloud provider? 

Ladder of Abstraction

  1. Read pp. 82-95 from Language in Thought and Action by S. I. Hayakawa and Alan R. Hayakawa. (OCLS)
  2. Create a ladder of abstraction for your operating paradigm as described by Hawakaya and Hayakawa. 
  3. Post your ladder for class review and comment.

Read from this link: https://medium.com/@tombarrett/up-and-down-the-ladder-of-abstraction-cb73533be751

450 words with in-text and 3 main references

discussion 2 21

  1. This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 
    Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.
    Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.
    The paper should meet the following requirements:

    • 3 pages in length (not including title page or references)
    • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
    • A minimum of five peer-reviewed journal articles.
    • The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Intro to Data Mining

Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised and unsupervised cases.

All discussions should contain at least one reference (and matching in-text citation in APA format).

Malicious Activities 3.0

The three major types of malicious activities that organizations’ information systems face include:

  1. Hostile or malicious insider activity.
  2. Theft of private, proprietary, or sensitive data, by insiders or external attackers.
  3. Large scale DoS (denial-of-service) attacks.
    Based on your research:
  • Describe a present-day example of your selected type of malicious activity and its impact on the organization.
  • Specify the countermeasures the organization took to address the malicious activity.
  • Recommend at least one additional preventative countermeasure and at least one countermeasure organizations could take to address this type of activity once it has occurred.

Tasks

 There are TWO tasks that you would need to do( they are separate): 

Task 1 (Minimum 300 words): 

 Your company is experiencing a decline in business because of competition. 

Your manager thinks they may be able to turn the company around if they can get help from an IT professional on E-Commerce and Mobile Technologies. 

Assume your company is a traditional retail entity similar to Sears, Macy’s or K-Mart, suggest ways your company can use E-Commerce and Mobile Technologies to increase its visibility and sales. 

In your discussion, explain what is E-Commerce and Mobile Technology..

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index.