Discussion

Discuss the differences in policy requirements of the government and health care sectors. Additionally perform a quick search on the following agencies to determine similarities and differences:

  • National Institute of Standards and Technology (NIST) and National Security Agency (NSA) Web sites for information on policy requirements for the government sector
  • The Health Insurance Portability and Accountability Act (HIPAA) and any other laws that regulate the health care sector

Please can you generate a topic on this within 24 hours because it needs to be approved by the lecturer

 In this assignment you are going to simulate data from an area chosen by yourself. It can be cyber related, healthcare, industrial, financial/credit card fraud, commerce – anything. However, run your ideas past me first before diving in. If you recall from the dplyr tutorials we were able to simulate small amounts of data based on several dataframes. We then linked the data we required using join() commands, etc. We then obtained summaries of the data and could use ggplot2 to highlight trends, etc.  
Carefully, choose your domain. Give a rationale for simulating it.
Define your data frames, generate them using sample_n and/or other commands. There is a package called charlatan you may find useful for generating personal names and other values. About 4-5 dataframes will suffice.
Think about seeding trends and patterns in your simulated data that you can “detect” later.
Use dplyr to extract the columns you need from the dataframes.
Use some sort of analysis such as summaries to get statistics on your data. Break it down by a category variable such as e.g. time, gender, fraudulent V normal, etc.
In the write-up, I will expect to see an introduction section, methods, and then sections for Simulation of data and transforming data, Analysis of data; marks for plots should of course be in the Analysis section.
 Part 1: Analysis of the Data (70 marks)
You will need to develop R code to support your analysis, use dplyr where possible to get the numeric answers. Regarding ggplot2, be careful as to what type of plot you use and how you use them as you have many records and want the charts to be readable. You should place the R code in an appendix at back of the report (it will not add to word count).  Section each piece of code with # comments and screenshots of outputs.
Simulation of data (20 marks)
Transforming data (10 marks)
Analysis of data and plots (20 marks)
Write-up of the data analysis (similar format of my R tutorials) (20 marks)
Part 2: Scale-up Report (30 marks)
The second part will involve writing a report. Now assuming your Part 1 was an initial study for your organisation, what are the issues when you scale it up and start using it in practice?
Discussion of Cyber security, big data issues, and GDPR issues (20 marks)
Structure of report, neatness, references. Applies to both Part 1 and Part 2 (10 marks)
Penalties: Do not go over word limit of 3,000 (other than ±10%) as loss of marks will occur according to the university guidance on penalties.

Database system

  

What is the importance of the master system database? Discuss the pros and cons of full database backup. Discuss all components of the database engine in relation to data availability, and their benefits and disadvantages in relation to server redundancy, database redundancy, and file redundancy. Provide examples to justify your ideas. (50-70 words with reference)

Entities within databases take on many forms. Provide three examples of entities you may encounter and summarize the attributes of each. Explain why entities are important and provide examples to illustrate your ideas. (50-70 words with reference)

Plagiarism report for document prepared

Requested help for my final project paper. But document prepared by writer was fully copied by another source. I was totally disappointed and it reflects on my grades. I reworked again to complete my project.

I lost my trust. Waste of time and money to deal

Implement a ramdisk as a kernel module.

 In this final project, you will implement a simple ramdisk module that you can format with “mkfs.ext2” and mount and unmount with “mount” and “umount”. The ram disk should be of a fixed size stored entirely in memory. It should appear as a block device in the system. This project is an example of a block device driver, which handles data a block at a time. Your project should satisfy the following requirements. 

– Implement a ramdisk as a kernel module. 

– Allow an ext2 filesystem to be installed onto the ramdisk. 

– Allow the filesystem to be mounted and unmounted with “mount” and “unmount” 

  

While submitting your project, please make sure you include the following:

  1. your source code,
  2. a makefile,
  3. a short report describing your work.

DATA science

 

Based on what you have learned so far over the weeks, what is the important component of text analysis? What is text mining? What are some of the benefits of text mining? Explain and provide examples.

Your initial post should be at least 100 words. Once you have submitted your post, you should also respond to at least 2 other student’s post.

week 2 assignment digital forensics

Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the case and the how digital forensics were used  in the investigation. 

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Data analysis paper

 Exploration of the bitcoin cryptocurrency market 

This paper need some technical knowledge on computer science and mathematical. Needed within 5-6 hours. Please don’t bid if you can handle this. Exploration of the bitcoin cryptocurrency market 

explain the concept of globalization and the role information technology has in the global market.

Discussion: we focus on globalization concepts.  Please explain the concept of globalization and the role information technology has in the global market.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

COSO framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

• Follow APA6 guidelines. Should include an introduction, a body with fully developed content, and a conclusion.