QUESTION: How would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI?
One post with 250 words and response with 125 words.
QUESTION: How would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI?
One post with 250 words and response with 125 words.
Assigned Readings:
Chapter. 9 Reducing Project Duration
Chapter. 10 Being an Effective Project Manager
Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.
Also, provide a graduate-level response to each of the following questions:
Text
Title: Project Management: The Managerial Process
ISBN: 9781260238860
Authors: Clifford F. Gray, Erik W. Larson
Publisher: McGraw-Hill Education
Publication Date: 2020-01-09
Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.
Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.
Please do not submit attachments unless requested.
Explain your thoughts on the future of IoT and the security implications. Why do you believe it is important to secure these devices as they become more common in our lives and our businesses?
Your post should be at least 30 words.
What are some of the industry standard certifications that exists. Which ones are the most sought after in the IT security field and why? What are the requirements for the certifications, test, number of questions, duration, domain, years of experience required?
Your post should be at least 350 words.
Several data files are also present: Patients.txt, Diagnoses.txt, Labs.txt, and Admissions.txt.
Please note that each data file has a columns descriptor line as the first line of the file. When processing, we must IGNORE that line as it is obviously not valid data. The following code preceding the actual loop that reads the file does just that. Each time you read a file containing that header line you must include this code.
fhand = open('Diagnoses.txt') # open the file, establish the file handle
fhand.readline() # read the first line and ignore it
# declare and set any initialization variables here, such as counters, lists, dictionaries
for line in fhand: # loop through the file line by line
What patient (by ID) has the most admissions?
1. Open Hwk12a_STARTER.py, rename it, and run it. It should display the ID field from all the lines in the file Admissions.txt. Comments included therein guide your code development.
2. Run and study the code in Ch 9 code sample 13. It provides most of what you need for this task. (PLEASE ATTACHED FILE PART A.JPG FOR CODE SAMPLE)
What are the 10 patients (by ID) having the most labs?
1. To tackle this task, repeat the code you wrote in 12a to create a dictionary containing IDs and the count of those IDs, this time on the Labs.txt file.
2. Then employ the strategies used in Ch 10 code sample 10 (ten most common words) to create a list of tuples, sort the list, and then print the first ten.
Of the top 10 patients with the most labs, how many are male? Print their IDs and print the number of males in the top 10.
1. Repeat the code you wrote in 12b to create a dictionary containing IDs and the count of those IDs, create the list, and sort the list in reverse.
2. Now you have to find out which of the top 10 in the list of most Labs are male. To do that, you have to loop through the Patients.txt file, checking to see if the ID is present in the same line as the word ‘Male’.
3. Follow the comments in the code to add the statements necessary to achieve the tasks. Don’t be afraid to add print statements to help you write the code; remove them when you’re finished. The output is shown below.
PROJECT TITLE
Business Continuity Plan for Financial Institutions
ABSTRACT
Due to increase in customers’ demand, competition, 24hrs continuous service, frequent changes in regulatory policy requirements and changes in various threats landscape have put some pressures on financial institution to bring up a robust and comprehensive contingency plans that assured the continuity of their services.
This paper outlines the relevance of business continuity plan to financial institutions. This project will highlight the stakeholder’s involvement in the development of the plan, the understanding of the plan and how often the plan will be tested.
INTRODUCTION
Financial organizations could confront the disruption of major services due to attacks such as natural disasters like floods, earthquake, or fire. Disruption of services could come because of hacktivist attacks, servers, and networks problems. Because all these reasons, financial institutions need to develop a comprehensive business continuity plans that guarantees quick recovery of business after a disaster.
A single occurrence of a disaster can results in greater financial losses, erode investors and customers confidence and damaging of corporate image. Such an act can also lead to serious legal issues and litigations.
A well designed, implemented and tested contingency plan is the best assurance to protect against financial losses to any organization (Moore, 1995). There is a need for financial organizations to have an effective Business Continuity Plan (BCP) that ensure quick business resumption and limit losses in the event of services disruptions.
STATEMENT OF THE PROBLEMS
Financial institutions are susceptible to different types of services disruptions stated in the introduction above, which could adversely impact the organization. In today’s world, Business Continuity Management (BCM) is becoming increasingly important. This research work will highlight the relevance of Business Continuity Planning to financial institutions and analyses the disaster preparedness of financial institutions to major disasters and disruptions by examining the Business Continuity Management policies, standards, and practices. It will go further to test the awareness and readiness of the stakeholders.
Objective of the study
This research work will highlight the importance of Business Continuity Planning to Financial Institutions.
Scope of the study
This study will be limited to BCP development for financial institutions only. It will cover the following key areas
· Business Continuity Plan Process
o Identification of key business areas.
o Identification of critical functions.
o Identify dependencies between various business areas and functions.
o Determine acceptable downtime for each critical function.
o Create a plan to maintain operations.
· Components of Business Continuity Plan:
o Business Impact Analysis
o Disaster Recovery Plan
o Disaster Recovery Plan and Tabletop test.
· Challenges with implementing Business Continuity Plan
· Summary
C program. NOT C++
specialcountmulthreads.c is not completed. Need some modification
31 text files named input_00.txt to input_30.txt.
Requirements:
Multiple threads are expected to run in parallel to share the workload, i.e. suppose 3 threads to process 30 files totally, then each thread should process 10 files;
When a thread is created, a message should be print out showing which files this thread will process, for example:
Thread id = 274237184 starts processing files with index from 0 to 10!
When a file is being processed, a message should be print out showing which thread (thread_id = xxx) is processing this file, for example:
Thread id = 265844480 is processing file input_11.txt
When a thread is done with its workload, a message should be print out showing which files this thread has done with work, for example:
Thread id = 274237184 is done !
The array long specialfreq[ ] should always be up-to-date, i.e. it always has the result of all the threads counted so far. [You may need to use mutexes to protect this critical region.]
======specialcountmulthreads.c=====================
#include
#include
#include
#include
#include
#include
#define MAX_FILES 30
#define MAX_LEN 1000
int num_threads;
char *filename[MAX_FILES];
int num_files;
long specialfreq[MAX_FILES];
int *index_array[MAX_FILES];
void *thread_function(void *arg) {
int *index = (int *) arg;
int i;
int my_index = *index;
int starting_index = my_index * (num_files / num_threads);
int ending_index = starting_index + (num_files / num_threads);
FILE *fp;
char ch;
int count = 0;
char line[MAX_LEN];
printf(“Thread ID: %lu starts working on files %d to %d.n”, pthread_self(), starting_index, ending_index);
for (i = starting_index; i < ending_index; i++) {
fp = fopen(filename[i], “r”);
if (fp == NULL) {
perror(“Error opening file”);
} else {
printf(“Thread ID: %lu is working on file %sn”, pthread_self(), filename[i]);
while (fgets(line, sizeof (line), fp) != NULL) {
ch = fgetc(fp);
if (ch == ‘!’) {
count++;
}
}
specialfreq[i] = count;
fclose(fp);
}
}
printf(“Thread ID: %lu is done!n”, pthread_self());
pthread_exit(NULL);
}
void specialcountmulthreads(char *path, char *filetowrite, long specialfreq[], int num_threads) {
pthread_t tid;
int i;
int err;
int total_count = 0;
if (argc < 3) {
printf(“Usage: ./a.out num_threads input_file1 input_file2 … input_file30”);
exit(0);
}
num_threads = atoi(argv[1]);
num_files = argc – 2;
//printf(“Num thread: %dn”, num_threads);
//printf(“Num files: %dn”, num_files);
for (i = 2; i < argc; i++) {
filename[i – 2] = argv[i];
//printf(“Argv: %sn”, argv[i]);
//printf(“Filename: %sn”, filename[i – 2]);
}
for (i = 0; i < num_files; i++) {
index_array[i] = malloc(sizeof (int));
*index_array[i] = i;
//printf(“Index array: %dn”, *index_array[i]);
//printf(“Index array: %dn”, index_array[i]);
}
for (i = 0; i < num_threads; i++) {
err = pthread_create(&tid, NULL, thread_function, index_array[i]);
if (err != 0) {
printf(“ncan’t create thread :[%s]”, strerror(err));
}
}
for (i = 0; i < num_files; i++) {
total_count += specialfreq[i];
}
printf(“Total count: %dn”, total_count);
return 0;
}
======================testmulthreads.c=====================================================
#include
#include
#include
#include
#include
#include
#include
#include “count.h”
/*
* Print the frequencies of special words stored in array: specialfreq[] to output screen in the format as:
* letter -> frequency (one letter a line)
* Input: specialfreq – array having the frequency of each special word
size – the total number of special words
* example:
* he -> 250932
* she -> 181764
*/
void displayalphabetfreq(long specialfreq[], int size)
{
for(int i = 0; i < size; i++)
{
switch (i)
{
case 0:
printf(“%s -> %dn”, “he”, specialfreq[i]);
break;
case 1:
printf(“%s -> %dn”, “she”, specialfreq[i]);
break;
case 2:
printf(“%s -> %dn”, “they”, specialfreq[i]);
break;
case 3:
printf(“%s -> %dn”, “him”, specialfreq[i]);
break;
case 4:
printf(“%s -> %dn”, “me”, specialfreq[i]);
break;
defalut:
printf(“%s”, “Wrong number of special words … “);
}
}
}
int main(int argc, char *argv[])
{
printf(“Please enter 2 arguments only eg.”./testmulthreads #_of__threads!!””n””);
This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:
Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.Submit your midterm research paper as a single document. Your paper should meet the following requirements:
In this week, we will again use our virtual machine. This time, we will be creating two users and granting selected permissions from one user to the other.
First, create a new user with “useradd -m
Next, we will create a group for our users with “groupadd
Test out logging in as your first user with the command “su –
You can validate the contents of file1 with “cat file1”. Let’s validate the file permissions of our files with “ls -l”. Take a screenshot of the output. Every file has nine permissions, ignoring the first one. The first three are for the user, the next three are for the group, and the final three are for others.
Next, we are going to adjust permissions so that:
To make these changes, you’ll use the “chmod” command to adjust permissions, and you’ll need to add file2 to the group our users are in using “chown :
The format is going to be “chmod
Then, switch to the second user account and verify the permissions using the following commands.
Take a screenshot of the results of these commands. If the results don’t match expectations, you can switch back to your user1 and adjust permissions again to get it right.
In your submission, include:
International Foodies is an importer of exotic foods from all over the world. You landed a summer internship with the company and discovered that their product lists and the suppliers they buy from are stored in Excel workbooks. You offer to help by using your newly gained knowledge of Access to create a relational database for them. You will begin by importing the workbooks from Excel into a new Access database. Your manager mentions that she would also like a table that specifies food categories so that you can relate the products you sell to specific categories in the database. You will create a table from scratch to track categories, create relationships between the tables, and create some baseline queries.
Start Access. Open the downloaded Access file named Exp19_Access_Ch2_Cap_Foodies. Grader has automatically added your last name to the beginning of the filename. Save the file to the location where you are storing your files.
You will examine the data in the downloaded Excel worksheets to determine which fields will become the primary keys in each table and which fields will become the foreign keys so that you can join them in the database.
Open the Suppliers.xlsx Excel workbook, examine the data, and close the workbook. Open the Products.xlsx Excel workbook, examine the data, and close the workbook.
You will import two Excel workbooks that contain supplier and product information into the database.
Click the External Data tab, click New Data Source, point to From File in the Import & Link group, and then select Excel. Navigate to and select the Suppliers.xlsx workbook to be imported as a new table in the current database. Select First Row Contains Column Headings. Set the SupplierID field Indexed option to Yes (No Duplicates). Select SupplierID as the primary key when prompted and accept the table name Suppliers. Do not save the import steps.
Import the Products.xlsx workbook, set the ProductID Indexed option to Yes (No Duplicates), and select ProductID as the primary key. Accept the table name Products.
Change the Field Size of the QuantityPerUnit field to 25 in Design view of the Products table. Set the Field Size of ProductID and CategoryID to Long Integer. Save the changes and open the table in Datasheet view. Open the Suppliers table in Datasheet view to examine the data. Close the tables.
You will create a new table that will enable International Foodies to associate each product with a food category in the database.
Create a new table in Design view. Add the following fields in Design view and set the properties as specified:
Add the primary key field as CategoryID with the Number Data Type and Number assigned to a new category. (type the period) as the Description. Set the Caption property to Category ID.
Save the table as Categories.
Add CategoryName with the Short Text Data Type and Name of food category. (type the period) as the Description. Change the field size to 15. Set the Caption property to Category Name and the Required property to Yes.
Add CategoryDescription with the Long Text Data Type. Set the Caption property to Category Description. Switch to Datasheet view and save the table when prompted. You will enter Category data into the table in the next step.
You will add 8 records to the Categories table so that you have some sample data to test in the database.
Add the following records to the Categories table:
Category ID Category Name Category Description
1 BEVERAGES SOFT DRINKS, COFFEES, TEAS
2 CONDIMENTS SAUCES, RELISHES, SEASONINGS
3 CONFECTIONS DESSERTS, CANDIES, SWEET BREADS
4 DAIRY PRODUCTS CHEESES
5 GRAINS/CEREALS BREADS, PASTA, CEREAL
6 MEAT/POULTRY PREPARED MEATS
7 PRODUCE DRIED FRUIT, BEAN CURD
8 SEAFOOD SEAWEED AND FISH
Close the table.
You will create the relationships between the tables using the Relationships window.
Add all three tables to the Relationships window. Identify the primary key fields in the Categories table and the Suppliers table and join them with their foreign key counterparts in the related Products table. Select the Enforce Referential Integrity and Cascade Update Related Fields check boxes. Save and close the Relationships window.
You will use the Simple Query Wizard to create a query of all products that you import in the seafood category.
Add the ProductName, SupplierID, and CategoryID fields from Products (in that order). Save the query as Seafood Products.
Add a criterion in Design view, to include only products with 8 as the CategoryID.
Sort the query results in ascending order by ProductName. Run, save, and close the query.
You want to create a query that displays actual category names rather than the CategoryIDs. You are interested to know which meat and poultry products are imported. You will copy the Seafood Products query and modify it to delete a field, then add an additional table and field.
Copy the Seafood Products query and paste it using Seafood Or Meat/Poultry as the query name.
Open the Seafood Or Meat/Poultry query in Design view and delete the CategoryID column.
Add the Categories table to the top pane of the query design window. Add the CategoryName field to the last column of the design grid and set the criterion as “Seafood” Or “Meat/Poultry”. Run, save, and close the query.
You will create a query that identifies suppliers and their associated products. Because there is a relationship between the two tables, you can now pull data from each of them together as usable information.
Create a query in Design view that includes the Suppliers and Products tables. The query should list the company name, contact name, phone (in that order), then the product name and the product cost (in that order).
Sort the query by company name in ascending order, then by product cost in descending order. Run, close, and save the query as Company by Product List.
You determine that the data in the Company by Product List query could be summarized with a Total row. You will group the records by company name, and then count the number of products you buy from each of them.
Copy the Company by Product List query and paste it using Summary of Company by Product as the query name.
Open the Summary of Company by Product query in Design view and delete the ContactName, Phone, and ProductCost columns.
Click Totals in the Show/Hide group on the Query Tools Design tab. Click in the Total row of the ProductName field, click the arrow, and then select Count. The records will be grouped by the company’s name and the products for each company will be summarized.
Modify the field name of the ProductName column as Product Count: ProductName to make the field name more identifiable. Click Run in the Results group (20 records display in the Datasheet). The results display the product count for each company that supplies your organization. Save and close the query.