Assignment 1

How does epidemiology helps in researching and addressing population health challenges? Provide a specific contemporary example.Give 2 references & 2 response.

Wk#4 Research paper

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3 pages (800 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

4s week 1 assignment EH

Required Readings 

The Benefits of Learning Ethical Hacking (Posted in Penetration Testing on August 29, 2018) 

https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/ 

When Ethical Hacking Can’t Compete https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/

Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 350 words, and using your own words, explain why ethical hacking is necessary in today’s complex business environment.

No copy paste strictly and please include references.

Milestone 1

 In the second milestone writing assignment, you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.  

Noneffective Communication

Watch the video “Noneffective Communication” and identify errors in communication that led to the unlikely outcome of the interaction. What was it about the combination of the verbal message and the nonverbal message that created misunderstandings between the individuals involved? Look at the environment (context) of the interaction. How might the environment play a role in the miscommunication?
In MS Word write at least 300 words to answer these questions.
 

GoLang

 

  1. Use Docker Go SDK to implement basic docker run command dkr with a timeout option to force kill long running container. Images should be pulled if not available locally. For e.g.

    1) dkr run -k 5 alpine:latest sleep 10 # should start container and kill after 5 sec
    2) dkr run alpine:latest sleep 10 # should execute for 10 sec

  2. Implement a task scheduler, which given a list of tasks executes both serially and concurrently. For example:
  3. 1. Execute task t1, t2, t3, t4 concurrent 
    2. wait for them to complete 
    3. Then execute t5,t6,t7 concurrent
    4. wait for them to complete 
    5. Then execute t8,
    6. wait for them to complete 
    7. Then execute t9

    1. Define the tasks structure that can be used as an input.
    2. After executing all tasks, print the list of task IDs and their start/return times.
    3. Task structure would be something like 
    4. type Task struct {
      ID string
      }

      // Run prints the Task ID, sleeps for few random milliseconds 
      // and returns the completion time
      func (t * Task) Run() time.Time

  4. Implement an HTTP service which accepts incoming requests and assigns the request to 1 of 3 buckets (A, B or C) based on the given distribution. Write a unit test to verify your solution.

    E.g. If the server is configured with a distribution of 10%, 20%, and 70%, then out of 1000 incoming requests, responses should be A (100 times), B (200 times) and C (700 times). Approximation is acceptable.

Nurse Burnout During a Pandemic

  

Describe a Significant Clinical Issue. Please review a current literature and provide an article that relates to the topic. In this thread, please discuss how this article will be beneficial to your assigned topic.