computer crimes

 

Every September 19, the entire international community is invited to Talk Like a Pirate. Here, you may indulge in that linguistic celebration, but that’s not the focus of your mission.

For this week’s Discussion, you must utilize your legal case research skills and find a case that dealt with intellectual property theft online. Your treasure map might have you begin at UC’s library, where Nexis-Uni may be effective.

This is not an exercise in finding an article or opinion piece. Your source material must be a legal dispute. In order to avoid the risk of discussing only a handful of cases amongst the hundreds or more that have gone to court and are available, do not discuss a case that another student has already initiated; review the Discussion II.b. Forum before you post your Initial Post to avoid that fate.

At a minimum, you must:

  1. Cite the legal case pursuant to APA citation guidelines for court decisions and cases (Purdue’s OWL has direction), and make sure to submit it to Discussion II.b.;
  2. What was the principle issue in the legal dispute? This should surround the legal issue at the heart of the lawsuit, and may include the essential facts of the matter;
  3. What was the rule or set of rules that the court analyzed to frame the legal dispute? Maybe they are federal laws or regulations, or it could be at the state level, or a combination;
  4. How did the court apply the rules to the set of facts posed by each side? Here, we want your summary of the logic, the critical thinking, and the rationale that the court built its conclusion upon; AND
  5. What did the court conclude? Who won, who lost, what’s left unanswered for the next phase of litigation if there is one to follow?

**Remember** Every Discussion in MSDF 633 fits into the same pattern:

  • Review the Discussion prompt, which you are reading right now, and understand it and study any additional materials implicated within it;
  • Submit an Initial Post no later than the end of Wednesday during the week the Discussion occurs;
  • Submit at least one or two Responsive Posts, more are always welcomed, to your classmates’ Initial Posts no later than the end of Sunday during the week.

Savvy? So I thought.

Contruction – 7

 

Read chapter 8 and review chapter 4 for the assignment.

1. Using Visual Logic, print 5 columns of 5 stars by outputting only one star in your output command and using while nested loops to print the rest. When using print in your output command, only one star should be output at one time. In other words to print 5 stars next to each other for example, you need a loop that repeats itself 5 times.

Emerging Hospital at Home Case Study

This is an assignment I am working on to delve into how hospital care is changing through transitioning into the home setting to provide equity care to chronically-ill patients determined eligible for acute home care. I would like to seek second opinion to compare my paper to what other experts in the field will have done different.

This paper will focus of hospital at home by Reviewing the following report by McKinsey –  https://www.mckinsey.com/industries/healthcare-systems-and-services/our-insights/from-facility-to-home-how-healthcare-could-shift-by-2025Links to an external site.

The Hospital at Home movement is drastically reshaping healthcare, lowering the walls of the hospital and placing patients at home with significant monitoring in place virtually.  In 4-6 pages typed and double spaced (using 3-5 additional citations APA format outside of the McKinsey report) Write good historical background of emerging hospital at home, Abstract, Introduction, body and a conclusion. You must address the following questions:

1. What are the advantages of the Hospital at Home movement? (see exhibit 2 and expand)

2. What are the challenges presented by the Hospital at Home approach? (see exhibit 2 and expand)

3.  How does the Hospital at Home movement fit within accountable and value based care concepts? 

4.  What concerns do you have around shifting several of the services outlined in Exhibit 4 into the home setting? 

Note: You can include exhibit of the images as well.

Below are other additional sources that can be used to supplement Mckinsey report:

  

The hospital is dead, long live the hospital!

https://www.mckinsey.com/industries/healthcare-systems-and-services/our-insights/the-hospital-is-dead-long-live-the-hospital

5 Obstacles to Home-Based Health Care, and How to Overcome Them

https://hbr.org/2019/10/5-obstacles-to-home-based-health-care-and-how-to-overcome-them

Home health care is evolving from convenience to a crucial edge for the future of medicine.

https://www.pennmedicine.org/news/publications-and-special-projects/penn-medicine-magazine/fall-winter-2022/no-place-like-home

The Hospital at Home Model: Bringing Hospital-Level Care to the Patient

https://www.commonwealthfund.org/sites/default/files/2018-09/1895_Klein_hospital_at_home_case_study_v2b.pdf

ATTN:

Rubrics that must be followed to complete the case study correctly:

Rubrics must be followed accordingly:

  1. Students will identify the      theories, models, and tools from social, business, human factors,      behavioral, and information sciences and technologies for designing,      implementing, and evaluating health informatics solutions. (SLO 2)
  2. Students will identify the      theories, models, and tools from social, business, human factors,      behavioral, and information sciences and technologies for designing,      implementing, and evaluating health informatics solutions. (SLO 2)
  3. Students will identify the      theories, models, and tools from social, business, human factors,      behavioral, and information sciences and technologies for designing,      implementing, and evaluating health informatics solutions. (SLO 2)
  4. Students will identify the      theories, models, and tools from social, business, human factors,      behavioral, and information sciences and technologies for designing,      implementing, and evaluating health informatics solutions. (SLO 2)

Thank you .

Process Mapping the Protection of Intellectual Property

 

Research a product or service relevant to your chosen field of study (Information and Technology). You will be creating a hierarchical process map, consisting of three levels, that could be provided to a development team to follow to ensure that the intellectual property is protected. The process map will be focused on opportunities for intellectual property (IP) protection within the context of the creation of a new product or service relevant to your field of study. Proper protection for products/services often requires multiple forms of protection. Map out the process of appropriate protection of intellectual property, making sure to consider the legal processes involved. It is important to select the correct tool for the creation of a quality process map and the corresponding presentation. 

-Create a process map to describe intellectual property protection within the context of the creation a new product or service relevant to your field of study (Information and Technology). Your map should include a minimum of 10 process steps.

-Describe the intellectual property protection mechanism required to protect your product.

-How is this intellectual property captured, registered, and/or protected?

-Clear inputs/outputs.

-Clear scope definition.     

-Incorporate at least one subprocess.

-In addition, in a minimum of 200 words, articulate and demonstrate how teamwork is integrated into, and supports, an organization.

Python For loop

I need a python program which can read first 5 values from the file in a loop, end the loop and pick next 5 values from the file until the end of the file.

Software Engineering and Data Analytics

 

Assignment Content

  1. About
    This assignment must be completed in a group of minimum 3 students and maximum 4 students.

    This assignment is a prelude to the third assignment. It aims at providing you with an authentic experience in carrying a simple data science project that covers all essential stages in a data science lifecycle. Since most professional science projects are performed by teams, you are therefore required to complete this assignment in a team.

  2. Tasks
    In short, you are required to complete the following tasks:

    1. Pitch a public, open dataset of your choice.
    2. Pitch 3 or 4 initial hypotheses to be pursued later in Assignment 3.
    3. Profile the data using descriptive and/or inferential statistics techniques (which also requires that you demonstrate proficient data wrangling skills).
    4. Present items 1, 2, and 3 above via a recorded presentation.
    5. Your tasks are open-ended tasks, similar to most real data science projects. This means no two teams are likely to go to the same direction and produce similar results. You will find that your group will become experts in interpreting your own data and answering your own problems. Comparing performance across teams may not be meaningful and your team will be assessed solely against the rubric.

      Your Python code base must be available on your Github repo. The extent of the group’s collaboration and individual contribution will be evaluated solely based on Github.

      General advice:

    • Select an open (publicly available) data – data that can be freely downloaded, preferably with an open license, allowing you to share the data freely. Choosing non-public data is not advisable as your instructor may be restricted from accessing the data.
    • Choose data in the domain for which team member(s) has some background.
    • Formulate open-ended hypotheses.
    • Carry out fresh data and/or analysis.
    • Where possible, choose a dataset and formulate problems pertaining to practical Australian contexts.
  3. Data
    Choose only 1 dataset.

    It is fine to choose a dataset that has been analysed by others outside of the university. This is the natural consequence of selecting open data. However, you should either show that the analysis and exploration you plan has not been done before, or show that there is no code already available to do the analysis you intend. Your instructor is likely to view highly any original investigation.

    Sources of open datasets include but are not limited to:

  4. Github Classroom

    Group work activities must be visible on Github Classroom.

    The instructor will send an invitation to all students to join Github Classroom after all groups are formed. To accept this invitation, every student must have a free Github account. If you do not already have it, please sign up. This is compulsory.

  5. Marking

    You should refer to the detailed marking rubric that appears on the side panel of this window.

  6. Submission item
    Please submit the following via Learnline by latest 11.59pm on the due date:

    • 1 URL to a recorded presentation per team published privately on YouTube. Do not submit multiple recordings and do not submit recording file unless requested specifically.
    • (optional) supplementary information, where applicable.
    • Latest Python code base on GitHub repo must be accessible to your instructor. Snapshot of the repo will be taken at the time of submission.

      The duration of the presentation is commensurate with the team size. Inline with the Unit Information, 2 to 3 minutes of presentation per team member is required. Not complying with this requirement may attract a mark penalty.

      Example:

    • For a team of 3: the minimum duration is 6 minutes (2 minutes x 3 members) and the maximum duration is 9 minutes (3 minutes x 3 members).
    • For a team of 4: the minimum duration is 8 minutes (2 minutes x 4 members) and the maximum duration is 12 minutes (3 minutes x 4 members).
  7. Academic integrity and assessment irregularities
    Academic integrity is a core value at CDU and must be upheld at all times when completing this assignment. You must not plagirise the work of others. Please be referred to the Students – Breach of Academic Integrity Procedures.

    Other assessment irregularities are governed by CDU’s Higher Education Assessment Procedures.

  8. Tips and example
    Broadly speaking, your instructor is looking for evidence of your demonstrative competency in the following key data science skills implemented in Python: (1) hypothesis formulation, (2) exploratory data analytics, (3) data wrangling skills, and (4) data visualisations.

    When pitching your dataset, consider addressing the following concerns:

    • source of data
    • accesssibility of data
    • validity of data
    • why the dataset matters (in practical or academic terms)
    • domain knowledge
    • relevance to you
    • etc.
    • In profiling the data, consider addressing the following concerns:
    • dimensionality
    • data types
    • centrality
    • spread
    • shape of data
    • distributions
    • etc.
    • The last task is to pitch 3 to 4 initial hypotheses. Consider addressing the following concerns:
    • what might the data tells us
    • what would you like to explore first based on your initial data profiling
    • what would you like to predict
    • what existing assumption you want to test previous finding
    • what new idea you want to test
    • etc.

Object oriented design

Please write clearly. Ambiguity will be penalized. Use EXTRA pages if necessary. Good Luck!

1. Plot a Package Diagram for the Online Student Registration System. Use the Package Diagram class-based syntax.

2. What factors should be considered in selecting a design strategy?

3. Name different computing Client-Server architectures and give examples of the architectures.

4. What are the main principles for User Interface Design? Describe any one of the principles in detail.

5. Name five steps in the user interface design process.

6. Describe types of navigation control in the user interface.

7. Name basic principles of output design.

Download the files Emp.h

1) Download the files Emp.h , Emp.cpp, and EmployeeTestApp from “Class Content -> Week-02

2) Create a new Project with Visual Studio 2010 named Employees

3) Add the three files to the new Project

4) Add an Attribute (variable) to Emp.h

a. Add the setter Interface for that attribute

b. Add the getter Interface for that attribute

5) Add the same attribute to the Emp.cpp

a. Add the setter Implementation for that attribute

b. Add the getter Implementation for that attribute

c. Add the attribute to the displayAttributes() method’s Implementation

6) Add the Prompt and Input of the new Attribute to the main() program

7) Show the results of the new output – containing the display of the new Attribute

8) Place all Edited code in one Notepad file and Submit it 

FireFold – Orion Power System

 FireFold is a one-stop-shop for Orion Power Systems and all kinds of genuine networking accessories such as sleek socket ultra-thin electrical outlet cover, ethernet cables, Chargers, IOT Installations, and much more. Shop now! 

Capstone project

   After World experienced unprecedent pandemic, everyone needed to adapt to circumstances. For companies the best way to adapt was working remotely. In order to do that they needed to have open channels for communication. Opening channels was easy. The problem was to provide secure channels. As cyber security student my proposal will be focus on protecting the data while opening channels for remote workers.