Write an essay for 500 words for the give description?

Investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation.

assignment-7

 why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc. 

  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  

Decision Support and Expert Systems

Overview:

In a meeting with your executives, your CIO expressed interest in exploring Decision

Support Systems and Expert Systems. To address this need, your IT director asked you

to write a 2-3-page white paper that he will review and submit to the executive team.

Instructions:

In this paper, you will need to develop the following points:

• List and explain the phases in decision making, and how a decision support

the system will add a competitive advantage to your hospital.

• Describe the typical software components that decision support systems

comprise and their fields of application in your hospital.

• Describe the adoption of a medical expert system, and if it could be beneficial to

the doctors at your Hospital.

Requirements:

• This assignment is a paper consisting of 2-3 pages, using APA formatting and

citations.

• Include two references.

IA FP

In 750 words.

Describe two cryptographic applications and how they are used in Information System Security.

Should include
1. summary- one page
2. 3 References 

Assembly Language

 Write an assembly language program that reads move review information from a text file and reports the overall scores for each movie as well as identifying the movie with the highest total score. There are four movie reviewers numbered from 1 to 4. They are submitting reviews for five movies, identified by the letters from “A” through “E”. Reviews are reported by using the letter identifying the movie, the review rating, which is a number from 0 to 100, and the reviewer’s identifying number. For example, to report that movie B was rated a score of 87 by reviewer 3, there will be a line in the text file that looks like this:

B,87,3

The fields within each record are separated from each other by a comma.

Your program must store the movie review scores in a two-dimensional array (4 rows by 5 columns). Each row represents a reviewer. Each column represents a movie. Initialize the array to zeroes and read the movie review information from a file. After reading and processing the whole file, display a report that shows the total score for each movie and the movie that had the highest total score.

Section 9.4 of our textbook discusses two-dimensional arrays. Section 9.4.2 discusses Base-Index Operands and even contains an example of how to calculate a row sum for a two-dimensional array.

Chapter 11 contains an example program named ReadFile.asm that will show you how to prompt the user for a file name, open a file, read its contents, and close the file when you are done. Look in section 11.1.8, Testing the File I/O Procedures.

Each record in a text file is terminated by the two characters, Carriage Return (0Dh) and Line Feed (0Ah).

Assume that you wish to process a text file named “reviews.txt” that is stored on the “C:” drive in the “Data” folder. If you are using a Windows computer, you have two ways to identify the path to the file’s location:

C:/Data/reviews.txt        OR C:\Data\reviews.txt

Double backslash characters () are needed because a single backslash is defined as being the first part of an escape sequence such as newline (n).

This code can be used to load a reviewer’s score into the array of movie reviews:

; Insert score at reviews[rowIndex][colIndex]

mov      edx,rowSize           ; row size in bytes

    mov      eax,rowIndex         ; row index

    mul      edx                   ; row index * row size

    mov      index,eax             ; save row index * row size

    mov      eax,colIndex         ; load col index

    shl      eax,2                 ; eax = colIndex * 4

    add      eax,index             ; eax contains offset

    mov      edx,score             ; edx = reviewer’s score

    mov      ebx,OFFSET reviews   ; array of review scores

    mov      [ebx + eax],edx       ; Store score for movie

Sample Data for Review.txt

D,84,2
A,90,3
A,87,4
B,35,4
B,100,1
C,75,1
D,84,1
B,87,2
A,0,2
C,25,2
D,45,3
E,35,3
A,90,1
B,100,3
C,75,3
E,35,1
C,78,4
E,35,2
D,100,4
E,0,4

security architecture 15 .2

 

Read the attached paper carefully and write a research summary ,in two sections

1- Overall summary

2- What you would like to add or change to the conclusion section 

This assignment should be in APA format, plagiarism free and have to include at least two references other than the paper. 1000 words minimum

Physical Security

 

Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA.

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and submit to the appropriate assignment folder. 

Dissertation on IoT

 Develop the introduction to Effective Strategies on the IoT Cybersecurity where you discuss the problem gap identified and how it supported by the literature. 

Information systems infrastructure Research Paper

 Summary:

Select a topic from the following list on which you would like to conduct an in-depth investigation:

  • Information systems infrastructure: evolution and trends 
  • Strategic importance of cloud computing in business organizations 
  • Big data and its business impacts 
  • Managerial issues of a networked organization 
  • Emerging enterprise network applications 
  • Mobile computing and its business implications 

Note: The above topics are also the basis of the discussion questions. You may use up to three resources found by yourself or your peers as peers as resources for the paper. 

Research paper basics: 

  • 8-10 pages in length 
  • APA formatted 
  • Minimum six (6) sources – at least two (2) from peer reviewed journals 
  • Include an abstract, introduction, and conclusion 
  • See rubric for more detailed grading criteria 

Some good questions to ask yourself before turning in your research paper: 

  • Is the paper of optimal length? 
  • Is the paper well organized? 
  • Is the paper clear and concise? 
  • Is the title appropriate? 
  • Does the abstract summarize well? 
  • Are individual ideas assimilated well? 
  • Are wording, punctuation, etc. correct? 
  • Is the paper well motivated? 
  • Is interesting problem/issue addressed? 
  • Is knowledge of the area demonstrated? 
  • Have all key reference been cited? 
  • Are conclusions valid and appropriate?