Discussion post

 

Primary Task Response: Within the Discussion Board area, write 500–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

The Scholar–Practitioner and Planning for Dissertation Research

In the Research Prospectus Template, there are several references to “practice” and “professional practice.” The document indicates that you must complete a dissertation study with a study problem that is “both practice-based and scholarship-supported.” You have undoubtedly heard yourself referred to as a “scholar practitioner.” These statements all point to the uniqueness of the “practitioner doctorate” as distinct from a “research doctorate.” For this assignment, reflect upon the following questions in your primary post:

  • In your degree field and concentration area, what are some examples of “practice” or “professional practice” that will be addressed through your research study?
  • What do you understand to be some of the unique characteristics of your practitioner doctorate?
  • How would you describe someone who embodies the characteristics of the scholarpractitioner?
  • What thoughts do you have at this time about your journey from doctoral learner to scholarpractitioner? How will you need to be successful for your future dissertation research?

Visual Studio Project

 

In this module, you learned about multiple forms in C#. You will be completing one program for this module.

Create an application named as M11 Assignment_YourLastname which has multiple form order program for customers of Fresh Produce Store.

You pick the controls that would work best and what your forms look like, but your program should meet the following objectives:

NOTE: All controls and variables should be correctly named using the naming standards indicated in the text.

  • Have a graphic that you think represents Frech Produce Store.
  • Allow customers the option of choosing tomatoes ($1.91 per pound), peppers ($2.32 per pound), onions ($1.05per pound) and potatoes($1.50 per pound). 
  • The customer enters a weight for each one selected in pounds in a box. Use either a numeric Up-down or Textbox. If using a Textbox, you will need to validate the value entered to make sure its numeric.
  • Exit Button – On main Form 
  • Order Now Button – On main form
  • Close Button – On second form
  • After the customer clicks an Order Now button, display the price of the order on the second form.

Virtual Machines

 

This week, you should start working on Project 2, your individual CTF Solution Presentation.

If you haven’t already done so last week:

Your PowerPoint should contain 10-15 slides. You can use Microsoft Teams to record the audio narration of your PowerPoint presentation (preferred). You can then share the Microsoft Teams recording link with your teammates, instructor, and the entire class in the week 8 discussion. You could also add this Microsoft Teams recording link to your resume as a portfolio item.Please cover the following topics in this presentation:

  • The CTF category
  • Problem solved
  • Steps used to solve
  • The solution
  • Strategies, pitfalls, lessons learned
  • Workplace relevance

Write the following two functions

Write the following two functions in C++1. void generate(int arr[], int size)to generate a random permutation of the numbers 1 to 10.To generate a random permutation, the function needs to fill a permutation array with the numbers 1 to 10 so that NO two elements in the permutation array have the same contents. To achieve that, your function should do the following:• Create a second array (name this array source) and fill it with numbers from 1 to 10.

• Randomly select an element from the array source

• Remove the selected element from source and append it to the permutation array.2. void print_array(int arr[], int size)to print out the elements in the permutation array separated by a white space.Write a C++ code that calls the generate and print_arrays functions repeatedly (5 times) to generate five random permutations of the numbers 1 to 10 and display the outcome at the console.

SECURE CLOUD ARCHITECTURE

Business case:  White & Bule Sky Airport Miami FL.

As an IT Manager, you were tasked to improve the performance of the local White & Bule Sky Airport Passenger Processing system.  This is to make the airport more efficient and more secure. 

There are three databases in the Airport Passenger Processing IT system:

1-Passenger database will record and authenticate each passenger in the airport

2-Employee database will record and authenticate each employee in the airport

3-Flight database will record each flight in the airport

Answer the airport owners’ questions about this IT system:

QUESTION 1. At the airport, there is a risk of data storage disk failure (fire, smoke, or flood) which will also damage the disk backup in the Airport IT system data center. What can you do to reduce data storage disk failure?

QUESTION 2 It was decided to move Passenger Database to the cloud.  How can you provide Security for the Passenger Database? Here you should address the questions

  1. a) Security Devices that access the Passenger Database
  2. b) Security of Passenger Data -at-rest
  3. c) End user security. Where the user would be accessing the Passenger Database from the airport  

QUESTION 3 Assume that Passenger Database is already moved on the cloud side. And the airport has fast and reliable network connections.  If the cloud service provider devices fail to operate, then the Passenger Database would be not reachable (Loss of Control).  That will have a huge impact on Airport operations.  

What would you do to Minimize Loss of Control, so the impact would be less?

Access control q3

Discussion: Security Breach Evaluationh.

Assignment Requirements

Read the text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.

equifax hack

 200 words due 09/26 11:59 pm est

Beginning on  May 13, 2017 hackers successfully breached Equifax’s customer dispute portal. The hackers used an Apache Struts vulnerability, a months-old issue that Equifax knew about but failed to patch, and gained access to login credentials for three servers.  Those login credentials in turn allowed the hackers to access another 48 servers containing personal information. The hackers spent 76 days within the Equifax network before they were detected. Equifax didn’t discover the attack until July 29, and cut off the hackers’ access on July 30. The breach exposed the personally identifiable information of over 147 million Americans.  This information included social security  numbers, names, addresses,  birthdates, credit card numbers and driver’s license numbers. Personally identifiable information of British and Canadian citizens was also compromised.In your initial post, please answer both of the following questions:

  1. Choose a federal law (Equifax is a credit reporting agency and subject to special laws) or a  US state data breach law or the EU GDPR (check our reading materials and PowerPoint slides, the links below, and ncsl.org for descriptions of applicable law) and explain how it applies or has already been applied to Equifax for its data security breach.  You use the FTC settlement page as a source for your discussion or include a discussion of any private litigation. Alternatively, since 4 members of the Chinese People’s Liberation Army have recently been indicted, you may choose to discuss whether this indictment represents an example of state-sponsored cyber warfare. Remember to distinguish in your own mind the difference between Equifax’s liability for the security/data breach and the hackers’ liability for carrying out the breach.
  2. Using your best judgment, what would you recommend to create and maintain an infrastructure for Equifax that would most robustly and effectively protect against future breaches and the liabilities resulting from those breaches?  Include any specifics you may be familiar with such as hardware and software recommendations, compliance with specific US and  international laws, industry best practices, and any appropriate third-party vendor solutions.

Information and communication technology

 

Purpose of the assignment: evaluate 2 professional and/or consumer health websites.

According to recent studies, due to its accessibility and “easiness” patients are using the Internet as the second source of health information after physicians, (HON, 2014).  In light of this, it is important that nurses are able to identify reliable, accurate online sources for health teaching their clients or when referring clients to resources for further information.

The Health on the Net (HON) Foundation has developed a code of conduct to standardize the reliability of health information. The HON code defines a set of eight (8) principles to maintain basic ethical standards. These include: Authorative, Complementarity, Privacy, Attribution, Justifiability, Transparency, Financial Disclosure and Advertising Policy. The definitions of these terms can be found at Health on the Net Guidelines

You may need to right click the link and click “open in new tab”.

Students are required to choose a specific health related topic and then research it using two (2) websites of their choice.

Choose one topic that interests you from the following; Post Partum Depression, Thyroid Cancer, Meningitis, Depression, Congestive Heart Failure, Asthma, Diabetes

  • Use the template provided, as instructed. The form will expand to contain as much information as you wish to put in your information
  • Research each of the websites chosen to identify the eight HON principles.
  • A title page and reference page is required with this assignment and is included with the template.
  • Answer the questions in the table as instructed on the form.
  • The answer to Question #3 must include a proper APA citation of the textbook in Texidium and identification of your websites you used to compare the website information. There are resources on eConestoga to assist you with properly formatting the APA citation.
  • The last question is NOT about the topic that you selected, it is about using the internet to locate valid websites and applying it with evidence to nursing practice. Take this into consideration when constructing your answer to the final question.
  • When complete, submit your work in the assignment box on eConestoga.
  • At 11:59 PM on the DUE date.
  • Only certain files are acceptable to assignment drop box. Acceptable for this assignment is MS Word,. If you are using Mac (Apple) software it is your responsibility to convert your assignment to an acceptable format.

This assignment is worth 20% of the final course grade. Please review the rubric prior to beginning this assignment, as it will be graded according to this rubric.

Learning Outcomes: After completing this assignment the student will be able to:

  1. Information Literacy
    • Examines and compares information from various sources in order to evaluate reliability, validity, accuracy, authority, timeliness, and point of view or bias.
    • Evaluate the validity and reliability of websites providing health information.
    • Explain how knowledge of web validity can enhance patient health and health literacy.

References

Health on the Net Foundation. (2019). The HON code of conduct for medical and health web sites (HON code).  https://www.hon.ch/HONcode/Pro/Conduct.html

Ofcom. (2015). Children and parents: Media use and attitudes report 2015. http://stakeholders.ofcom.org.uk/market-data-research/other/research-publications/childrens/children-parents-nov-15/

Advance Database ER

1.Construct an E-R diagram for a hospital with a set of patients and a set of patients and a set of medical doctors. Associate with each patient a log of the various tests and examination conducted

Please use a ER diagram tool for this problem such as MySQL workbench design tool, creatly,LucidChart

Discussion

 

  • Discuss the differences between intrusive and nonintrusive tests. Is it possible to provide a secure environment with no intrusive tests?