Write an essay for 500 words on topic placed below ?

Investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation.

Assignment

DEVELOPING INTIMACY WITH YOUR DATA

This exercise involves you working with a dataset of your choosing. Visit the Kaggle website, browse through the options and find a dataset of interest, then follow the simple instructions to download it. With acquisition completed, work through the remaining key steps of examining, transforming and exploring your data to develop a robust familiarisation with its potential offering:

Examination: Thoroughly examine the physical properties (type, size, condition) of your dataset, noting down useful observations or descriptions where relevant.

Transformation: What could you do/would you need to do to clean or modify the existing data to create new values to work with? What other data could you imagine would be valuable to consolidate the existing data?

Exploration: Using a tool of your choice (such as Excel, Tableau, R) to visually explore the dataset in order to deepen your appreciation of the physical properties and their discoverable qualities (insights) to help you cement your understanding of their respective value. If you don’t have scope or time to use a tool, use your imagination to consider what angles of analysis you might explore if you had the opportunity? What piques your interest about this subject?

(You can, of course, repeat this exercise on any subject and any dataset of your choice, not just those on Kaggle.)

Assignment Link: http://book.visualisingdata.com/chapter/chapter-4

Assignment Length (word count): At least 500 words (not including direct quotes).

References: At least two peer-reviewed, scholarly journal references.

Practical connection assignment

 

Subject : Business Intelligence

 Job : Software Developer (java)

it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:
Provide a 500 word (or 2 pages double spaced) minimum reflection.
If supporting evidence from outside resources is used, they must be properly referenced and cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

EH week15 DB2

 

Hello,

i need this paper by 01/06 afternoon.

Strictly No plagiarism please use your own words.

Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access. 

The strategy around Zero Trust means that you should not trust anyone. This means cutting off all access until the network knows who you are. Don’t allow access to IP addresses, machines, etc. until you know who that user is and whether they’re authorized. 

Discussion/Research Questions (300 words)

  1. Briefly explain your views on what the zero trust architecture is attempting to solve? 
  2. How do you build a Zero Trust Architecture?

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Consider a set of 5 tasks with the following characteristics Period Task number Worst-case execution time 1 30 2 10 3 20 4 80

CPU Utilization,Overloads

 

  1. Transient Overloads: One drawback of RM algorithm is that task priorities are defined by their periods. Sometimes, we must change the task priorities to ensure that all critical tasks get completed. With average execution times, all the critical and non-critical tasks may be RM-schedulable. But, if we consider worst-case execution time we wish to schedule so that all critical tasks meet the deadline and the non-critical task may miss the dead line. The solution is to boost the priority of some critical tasks higher than the non-critical tasks. This is done by altering the “Period” of some critical tasks so that their priorities increase. For example: If we reduce the period of a task by k and have k number of tasks each small sub task will have period divided by K, and execution time divided by k. When the period is smaller, the tasks automatically get higher priority. We can also lengthen the period of non-critical tasks and make it larger than the largest critical task and increase the non-critical task’s execution time also.Carry out a period transformation for this task set to ensure that all the critical tasks will meet the dead line even with worst case execution timing.
    Draw for your modified table of tasks, timing diagram to show schedulability for average execution time and another diagram to show for worst-case execution time. Identify if any tasks miss the dead line.
  2. Give explanation of your period transformations and solution.
  3. What is CPU Utilization for average and worst-case execution times.
  4. Considering Context switch time to be 1 ms, redraw the execution time line for this system for both average and worst case timing.
  5. What is the system time-loading (CPU utilization) factor with the context switching included?Consider a set of 5 tasks with the following characteristics Period Task number Worst-case execution time 1 30 2 10 3 20 4 80

200-250 words

 As you all read, according to Kirk (2016), most of your time will be spent working with your data.  The four following group actions were mentioned by Kirk (2016):

  • Data acquisition: Gathering the raw material
  • Data examination: Identifying physical properties and meaning
  • Data transformation: Enhancing your data through modification and consolidation
  • Data exploration: Using exploratory analysis and research techniques to learn

Select 1 data action and elaborate on the actions preformed in that action group.Please make sure you have an initial post (about 200 words) and a comment/post to one of your friends’ posts. 

QUANTITATIVE Journal Article Review

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References  QUANTITATIVE Journal Article Review – SUBMIT HERE

​Timeline Assignment

 Timeline AssignmentInstructions

  1. Do you have the two Dr. Evil E01 images downloaded to your computer? If not, please do this.
  2. Did you already download and install Autopsy on your workstation? If not, please do this. Also, don’t forget to watch the video on using Autopsy if you are not familiar with it. Note – the tool is very intuitive so you should not have problems with it.
  3. Ingest (load) the two E01 images into Autopsy by selecting File à Add Data Source. If you are not sure what is the data source– then select the Disk Image data source and you can browse to the E01 images. 
  4. Autopsy will then process the images. This should take about 10-20 minutes.

  1. Now click on the Timeline button on top of the Autopsy GUI and then familiarize yourself with the environment before answering these questions for total of 50 points. This timeline functionality is extremely powerful so click everywhere. Check out the different options. Right click a file and see what options are existing. I think you will be able to immediately grasp the possibilities of how you can pivot to a very specific MINUTE. See sample screenshot.

Questions (100 points)

  1. What website was searched on 8-25-2004?
  2. What was search query used on that website on 8-25-2004. Please provide screenshots.
  3. What websites were visited on 8-27-2004?. Please provide screenshots.
  4.  There was email activity on 07-27-1992. What was that email activity? Please provide screenshots.
  5. You want proof that Dr. Evil used Ghostware and you think it was done in August 2004. When exactly was this? Please provide screenshots.
  6. What software / driver is keys.text associated with? Please provide screenshots.
  7. Please send me a snapshot report.