Assignment

 

Describe in 500 words the shared security responsibility model that a dba must be aware of  when moving to the cloud.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

2 Discussions and 1 case study

Discussion 3.1

What is Python?  What are some of the attributes of Python?  Why is Python preferred over some other languages? 

Discussion 3.2 

You can use python for many reasons, what are some of the uses of Python outside of academia?  

Discussion 3.3

What did you learn during this week in regards to Python?  

Case Study 3.1

Using google scholar to find an article about Python3 and tell the class about what the article says, giving your personal views on the article and what it has to say about Python3. Remember to deploy your personal views into the case study not just what the article has to say. Remember, the below instructions about peer-reviewed material.Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least 2-3 peer-reviewed sources that are properly cited
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Dynamic Array of Strings

 Dynamic Array of Strings  
One problem with dynamic arrays is that once the array is created using the new operator the size cannot be changed. For example, you might want to add or delete entries from the array similar to the behavior of a vector. This project asks you to create a class called DynamicStringArray that includes member functions that allow it to emulate the behavior of a vector of strings.
The class should have:
A private member variable called dynamicArray that references a dynamic array of type string.
A private member variable called size that holds the number of entries in the array.
A default constructor that sets the dynamic array to NULL and sets size to 0.
A function that returns size.
A function named addEntry that takes a string as input. The function should create a new dynamic array one element larger than dynamicArray, copy all elements from dynamicArray into the new array, add the new string onto the end of the new array, increment size, delete the old dynamicArray, and then set dynamicArray to the new array.
A function named deleteEntry that takes a string as input. The function should search dynamicArray for the string. If not found, return false. If found, create a new dynamic array one element smaller than dynamicArray. Copy all elements except the input string into the new array, delete dynamicArray, decrement size, and return true.
A function named getEntry that takes an integer as input and returns the string at that index in dynamicArray. Return “” string if the index is out of dynamicArray’s bounds.
Overload the operator[] so that you can get and change an element by an index integer. If the index is out-of-bounds, return a “” string.
A copy constructor that makes a copy of the input object’s dynamic array.
Overload the assignment operator so that the dynamic array is properly copied to the target object.
A destructor that frees up the memory allocated to the dynamic array.
Create a suitable test program to test your class.
You should name the project ASG10. When you zip up the project folder, ASG10, include all the files (.sln, .cpp, etc) and subdirectories (Debug, etc.).
 

Project Description: Let me know for reasonable price Your friend Kimo is a server at a restaurant. He downloaded data for his customers’ food and beverage purchases for the week. You will complete the workbook by applying consistent formatting across the

 

Exp19_Excel_Ch09_CapAssessment_Tips

 

Project Description:

Let me know for reasonable price

Your friend Kimo is a server at a restaurant. He downloaded data for his customers’ food and beverage purchases for the week. You will complete the workbook by applying consistent formatting across the worksheets and finalizing the weekly summary. The restaurant requires tip sharing, so you will calculate how much he will share with the beverage worker and the assistant.     

Start   Excel. Download and open the file named Exp19_Excel_Ch09_Cap_Assessment_Tips.xlsx.   Grader has automatically added your last name to the beginning of the   filename.
 

  The Excel workbook contains circular references. When you open the file, an   error message displays. This error will be resolved as part of the project

The   Tip Left column in the Friday worksheet contains a fill color and number   formatting. You want to fill these formats to the other daily worksheets.
 

  Group the Friday through Monday worksheets, staring with the Friday   worksheet. Fill the format only for the range E5:E24.

Now   you want to insert column totals for the five worksheets simultaneously.
 

  With the worksheets still grouped, insert SUM functions in the range B25:E25   and apply the Totals cell style. Ungroup the worksheets.

The   Week worksheet is designed to be a summary sheet. You want to insert a   hyperlink to the Total heading in the Monday worksheet.
 

  On the Week worksheet, in cell A5, insert a hyperlink to cell A25 in the   Monday worksheet with the ScreenTip text Monday’s Totals. Test the hyperlink to   ensure it works correctly.

In   cell A6 on the Week worksheet, insert a hyperlink to cell A25 in the Tuesday   worksheet with the ScreenTip text Tuesday’s Totals. Test the hyperlink to   ensure it works correctly.

In   cell A7, insert a hyperlink to cell A25 in the Wednesday worksheet with the   ScreenTip text Wednesday’s Totals. Test the hyperlink to ensure it works   correctly.

In   cell A8, insert a hyperlink to cell A25 in the Thursday worksheet with the   ScreenTip text Thursday’s Totals. Test the hyperlink to ensure it works   correctly.

In   cell A9, insert a hyperlink to cell A25 in the Friday worksheet with the   ScreenTip text Friday’s Totals. Test the hyperlink to ensure it works   correctly.

Now,   you are ready to insert references to cells in the individual worksheets.   First, you will insert a reference to Monday’s Food Total.
 

  In cell B5 on the Week worksheet, insert a formula with a 3-D reference to   cell B25 in the Monday worksheet. Copy the formula to the range C5:E5.

The   next formula will display the totals for Tuesday.
 

  In cell B6, insert a formula with a 3-D reference to cell B25 in the Tuesday   worksheet. Copy the formula to the range C6:E6.

In   cell B7, insert a formula with a 3-D reference to cell B25 in the Wednesday   worksheet. Copy the formula to the range C7:E7.

In   cell B8, insert a formula with a 3-D reference to cell B25 in the Thursday   worksheet. Copy the formula to the range C8:E8.

In   cell B9, insert a formula with a 3-D reference to cell B25 in the Friday   worksheet. Copy the formula to the range C9:E9.

Now   you want to use a function with a 3-D reference to calculate the totals.
 

  In cell B10 on the Week worksheet, insert the SUM function with a 3-D   reference to calculate the total Food purchases (cell B25) for the five days.   Copy the function to the range C10:E10.

The   servers are required to share a portion of their tips with the Beverage   Worker and Assistants. The rates are stored in another file.
 

  Open the Exp_Excel_Ch09_Cap_Assessment_Rates.xlsx   workbook. Go back to the Exp_Excel_Ch09_Cap_Assessment_Tips.xlsx   workbook. In cell F5 of the Week worksheet, insert a link to the Beverage   Worker Tip Rate (cell C4 in the Rates workbook) and multiply the rate by the   Monday Drinks (cell C5). Copy the formula to the range F6:F9.

Next,   you will calculate the tips for the assistant.
 

  In cell G5 in the Tips workbook, insert a link to the Assistant Tip Rate   (cell C5 in the Rates workbook) and multiply the rate by the Monday Subtotal   (cell D5). Copy the formula to the range G6:G9. Close the Rates workbook.
 

  Note: The tip is a monetary value in the Week worksheet. It should be   formatted for Accounting Number Format.

You   noticed a circular error when you first opened the Tips workbook. Now you   will find and correct it.
 

  On the Week worksheet, check for errors and correct the formula with the   circular reference. 

You   want to create a validation rule to prevent the user from accidentally   entering a negative value. For now, you will create a validation in the   Friday worksheet.
 

  Select the range E5:E24 in the Friday worksheet, create a validation rule to   allow a decimal value greater than or equal to zero. Enter the input message   title Tip and   the input message Enter the amount of tip. (including the   period). Use the Stop alert with the error alert title Invalid Number and the error   alert message   The tip must be zero or more. (including the period). Test the   data validation by attempting to enter -20 in cell E5 and then cancel the change.

Now   you will copy the validation settings to the other daily worksheets.
 

  Copy the range E5:E24 in the Friday worksheet. Group the Monday through   Thursday worksheets, select the range E5:E24, and use Paste Special   Validation to copy the validation settings.

You   want to unlock data-entry cells so that the user can change the tips in the   daily worksheets.
 

  Group the Monday through Friday worksheets. Select the ranges E5:E24 and   unlock these cells.

Create   footer with your name on the left side, the sheet name code in the center,   and the file name code on the right side of all worksheets.

Now   that you unlocked data-entry cells, you are ready to protect the worksheets   to prevent users from changing data in other cells. Individually, protect   each sheet using the default allowances without a password.

Mark   the workbook as final.
 

  Note: Mark as Final is not available in Excel for Mac. Instead, use Always   Open Read-Only on the Review tab.

Save   and close Exp19_Excel_Ch09_Cap_Assessment_Tips.xlsx.   Exit Excel. Submit the file as directed.

Discussion Response 300 words and 1 references.

Please review the below post and provide a response of 300 words.

Protection of Patient Data:

Healthcare data securities are much important component of laws with accountability and also portable with insurances. The organizations of healthcare can digitalize the exchange of data and also services will be provided through enhancements, the data mostly remains threatened by such speed or efficiency. Security breaches might harm the individuals in millions (DeLaHaye, 2015).

As per cyber attack frequencies, it’s grown at earlier times, the needs of secured sensitivity data healthcare from attacks of cyber. The policies have communicated through healthcare through others can be neither used nor safe. Members of the organizations in HIPAA can be data liable to patients. They guarantee the information with patients can use to such reasons that followed individuals in order to authorize the patient’s information. The health of patients will be abused damaging the company connections and efficiency in between patients as well as others. This will lead to many instances and effects emotionally the people to depend on situations of their health. So, decreasing the patient data by management institute other records in both clinical or non-clinical records (DeLaHaye, 2015).

Many of us are aware of the act that is famous in the year 1996 of healthcare industries which is portable one called as an act of HIPAA. The data of health is much accountable and also can transfer the data classified which handles the manner in a secured way that avoids such data to misuse. With a surge over healthcare using concerns in past a year back a hit by the pandemic, the hospitals availability, as well as treatment, is been focused on regulations of HIPAA and bit rules have overlooked the security especially sockets/transport layers which is been outdated (Totic, 2019).

The effective way to protect the patients is from hacking which implements the secured concept for accessing patients’ data health. The access that restricted the persons not authorized cannot guarantee the compliance of HIPAA and also likelihood reduces the proceedings over the patient data breaches. Implementing the responses over crisis can measure by organizations will help the information that theft. Maintaining the breaches to prepare over the planned responses and instructs regularly staff by procedure and their strategies. Making the information to store in policies over data protection and cannot contain personal or technical data (Totic, 2019).

Technologies can rapidly advance the strengthen healthcare and confuse often. With technologies of the advent of healthcare, each individual can computerize. Cyber attackers will be completed as per data manipulation contains in their databases. For example, in comprehensive services medical there are many medical centers from various regions. In order to prevent such attacks, educating about the importance of healthcare professionals can be used appropriately in procedures and practices over cyber security needs the part of HIPAA regulations (Totic, 2019).

Case Study and Lab work

Case Study 6.1

Write a 2 to 3 page paper picking a particular area to monitor and come up with a way you can use the Raspberry Pi to monitor the area. Provide some creative ways you would use the Raspberry Pi . In addition How would you use the Raspberry Pi in Spear Fishing?  Make sure you adhere to the grading rubric and write the report in APA format.  

Writing Requirements

  • 2-3 pages in length  (excluding cover page, abstract, and reference list)

Lab #6 Using the Raspberry Pi and Linux

Due: Sunday, End of Module by 11:55 p.m. EST

Using Google, find an article on the Internet and read about the Raspberry Pi the log into your environment and write me a script that does the following, asks for you first name and last name, performs a ping six times using ping, then performs one ping using fping just to say a system is alive, then I want the program to indicate Hello The system is alive (or) not alive, and the URL of the Raspberry Pi article .   

Writing Requirements

  • 2-3 pages in length  (excluding cover page, abstract, and reference list)