Describe in detail how to strategically plan a Telehealth as a scope of digital health.

The purpose of this project is to dive into one aspect of digital health known as telehealth. This project will entail the scope, definition, history of telehealth, following the rubrics and the goals and objectives to focus the project on. This paper is 8 – 10 pages long. Please follow direction as stipulated in the assignment below. Attached are some reading materials, and rubrics.

Using what we have covered in class, assume the role of an executive director of a service in our healthcare delivery system (OT, PT, Behavioral Health, Mental Health, and Acute Care Settings are all appropriate starting points).  You are now tasked with creating a strategic vision for a telehealth service (Identification of the target population, review of relevant state and federal policy, and establishment of goals for the program). Your final product should be a narrative piece of original work between 8 and 10 pages.  External citations should be included (6-10 citations).  The narrative may include lists, figures, or diagrams, but the work needs to be clear and concise. The Center for Connected Health Policy (https://www.cchpca.org/ Links to an external site.) is a great resource to find state laws applicable to your geographic area.  You should create a fictional practice with the following goals and objectives to focus your assessment on: 

Alignment and Engagement – Who are the stakeholders, where will funding come from, and what are the goals or overall strategy?

Enabling Technologies – Select a vendor, app, or platform to assist your patient population.  You should identify a minimum of 3 competitive or similar technologies.  

Care Across the Continuum – What are the state and federal policies, how will organizational policy be implemented, and who is the target population. 

Interoperability –   How can information captured be shared with others? Will information take the form of a reporting dashboard, alerts to providers, or structured follow up by other care teams.  How will information be shared with others?

Please make sure this paper is original and no duplicate any where. Take into focus what’s expected in the rubrics as well.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Technical Summary

 

Title – Executive Order (EO) on Improving the Nation’s Cybersecurity MAY 12, 2021  

Link to the document – https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/Links to an external site.

Write a 3 page (Times New Roman, 13pt, Single Spacing) technical summary (2/3 pages) of the changes in cyber operations mandated by this EO. Which mandate do you think is most consequential? Why? (1/3 pages). 

No plagiarism and needs to be done within 24 hours 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

secure the things

write  your opening sentence and your thesis statement here!

Introduction

Conclusion 

powerpoint only 9 slides, not too much writing just important points should be mentioned.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

phython

 Modify the sentence-generator program created in part 1 so that it inputs its vocabulary from a set of text files at startup. The filenames are nouns.txt, verbs.txt, articles.txt, and prepositions.txt. ***
(Hint: Define a single new function, getWords. This function should expect a filename as an argument. The function should open an input file with this name, define a temporary list, read words from the file, and add them to the list. The function should then convert the list to a tuple and return this tuple. Call the function with an actual filename to initialize each of the four variables for the vocabulary.) 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Individual: Risk Assessment Presentation

 

Considering the Week Two Learning Team collaborative discussion, “Data Types and Risks,”(AT THE BOTTOM OF THE INSTRUCTIONS) you had with your team, create a PowerPoint® presentation for Ben. Its a requirement to use information from the attached chapter as one of the references for the PPT 

The 8- to 10-slide media-rich Microsoft® PowerPoint® with speaker notes should include: 

  • The main uses for an IT system in Ben’s business
  • The most common risks associated with this system
  • A prioritized list of the risks identified
  • Mitigations to handle the risks

Justify the prioritizations, including how likely the risk is to happen and the potential for harm from that risk. This media-rich presentation should include multimedia such as graphics, pictures, video clips, or audio.

Note: This assignment contributes to your final project in Week Five, “Security Policy Presentation: Final Project,” in which you will compile your PowerPoint® presentation slides from each week’s individual assignment to create your final presentation. 

SCENARIO: Learning Team Collaboration: Data  Learning Team collaborative discussion, “Data Types and Risks,”  USE THIS SCENARIO TO CREATE THE PPT

  • You have been contacted by Mr. Ben Rutherman. Ben owns a custom graphics shop with customers from the business community, as well as from schools, non-profits, and individuals. His brother recently had information stolen from his business, and Ben is very concerned about the safety and security of his business, including his e-commerce website.
  •  For the next few weeks you will be working on an Information Security Policy for Ben and his graphics shop. This week you need to discuss data types with your team. In Week Three, you will look at Disaster Recovery and Business Continuity. In Week Four, you will look at protecting the data using access controls and authentication. The final security piece will be added in Week Five, managing wireless, cloud, and application security, with the completed project submitted as the Week 5 Individual assignment, “Security Policy Presentation: Final Project.”

Discuss with your team the types of data that are stored, accessed, and transferred to others at Ben’s graphics shop. Assess the risk to this type of data and ways to mitigate the identified risks.

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data Structure and Algorithms

 

Please read the project carefully

this project in 3 parts 

1 – C++ program coding

2- make power point to explain the code method and the algorithms used in the code C++( I will post the files about types of algorithms used)

3- make a report (the details in the file project)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Using the Web or other resources, write a brief paper about RSA, its history, its methodology, and where it is used.

1). Using the Web or other resources, write a brief paper about RSA, its history, its methodology, and where it is used.

2). Send a brief message (ten words minimum) using the Caesar Cypher.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc.

 In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 5 Case Study Assignment 2: WAN for Canyon College

Canyon College began strictly as a liberal arts college, but for the past five years has been developing programs for business and professional students, including outreach programs to new areas within the same region. The college hired the company you work for, Network Design Consultants, to provide help with emerging WAN needs as they are developing these new programs.

Task 1: Providing WAN Services to Remote Cities

Canyon College plans to offer night classes for business school students, paralegal students, and nurses, in five remote cities. Their plan is to have professors offer the classes from the main site, and to use video conferencing and multimedia options at the remote sites. At the main site, they have a TCP/IP Ethernet network. The remote sites, which are not yet set up, will also have TCP/IP Ethernet networks. The Canyon College director of information technology is asking you to recommend two WAN options to connect the remote sites to the main campus, and to provide a rationale for the options you recommend.

  • (1)Prepare a sample network diagram.
     

    • Use Microsoft Visio.
       
  • (2)Indicate your recommended options in a separate Word document
     

Task 2: Teaching Classes from Home

The Canyon College president enjoys participating in several classes once a week as a guest lecturer or tutor, but she wants to do this from home, so she can spend more time with her family instead of driving back to the college, which is about two miles away. One of the requirements is that she needs to be able to use the telephone in her home office at the same time that she is connected to the main college network.

  • (3)Explain how the college president might be connected to the main college network through a particular WAN technology, and why you recommend that technology.
  • Save your explanation in a Word document.

Task 3: Troubleshooting Connectivity

The Canyon College president calls you in a panic to report she cannot access the school’s Web server from her office on campus, but she wants to troubleshoot the problem herself. Is there is a quick way she can test the Web server’s connectivity?

  • (4)What test method do you recommend?
  • Save your explanation in a Word document.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

MasterMind

 

Modify your version of the project to the following specifications.

1)  Randomly generate a code to break in the range of 0000 to 9999.  Use characters not integers.

2)  Include an option which test all possible guesses instead of  playing the game.  A table will be generated which is 10,000 long with a  guess starting at characters 0000 to 9999 incrementing by 1 each time.

     a)  The test will loop and test all possible guesses against your randomly chosen code.

     b)  Print the following headings

              Code   Guess  #right  #right in wrong spot   Sum

Example:   A code was randomly chosen such as 0120

              Code   Guess  #right  #right in wrong spot    Sum

              0120    0000        2                  0                       2

              0120    0001        1                  2                       3

              0120    0002        1                  2                       3

              0120    0003        1                  1                       2

              etc………….

              0120   0012         1                  3                       4

              etc……….

              0120   0120         4                  0                       4

              etc……….

              0120   2100         2                  2                       4

              etc……

              0120   9999         0                  0                       0

This is to make sure you are not double counting.  The max in any  column can be no greater than 4 and the sum can never be greater than  4.  Of course, just because that is true does not mean it is totally  correct.  That is why further checks are required.

Answer the following and check with your modified project.  

3)  How many times should 4 right come up?

4)  How many times should 3 right come up?

5)  How many times should 2 right come up?

6)  How many times should 1 right come up?

7)  How many times should 0 right come up?

8)  Answer the same for number right in the wrong spot like 3) to 7) from above. Answer the same 3) to 7) for the sum.

9)  Does your code verify this?

10)  Include an option where you can put in the code to test instead  of randomly generating the code.  Output the same table as above.  Do  the same comparison.

code

 //System Libraries
#include <iostream> //Input/Output Library
#include <cstdlib>
#include <ctime>
using namespace std;
//User Libraries
//Global Constants, no Global Variables are allowed
//Math/Physics/Conversions/Higher Dimensions – i.e. PI, e, etc…
//Function Prototypes
//Execution begins here
int main(int argc, char** argv) {
//Set the random number seed
srand(time(0)); // using srand to generate different random numbers everytime
int randomint = (rand()%5)+1; // generate a random number between 1 and 5 using rand
//Declare Variables
char colors[4];// the 4 colors of MasterMind
char ex;
//Random for loop
for(int i=0;i<4;i++){
randomint = (rand()%5)+1; // generate random number from 1 to 5 using rand function
switch(randomint){
case 1: // if randomint is 1 assign ‘R’ to colors array
colors[i] = ‘R’;
break;
case 2: // if randomint is 2 assign ‘B’ to colors array
colors[i] = ‘B’;
break;
case 3: // if randomint is 3 assign ‘Y’ to colors array
colors[i] = ‘Y’;
break;
case 4: // if randomint is 4 assign ‘P’ to colors array
colors[i] = ‘P’;
break;
case 5: // if randomint is 5 assign ‘G’ to colors array
colors[i] = ‘G’;
break;
}
}
//Initialize or input i.e. set variable values
char usercolors[4]; // user array for colors input from user
// print to console output
cout <<“The colors of the game is red is R, blue is B, yellow is Y,green is G,purple is P”<<endl;
cout<<“Please use uppercase letters when you play the game”<<endl;
cout<<endl<<endl;
cout<<“Colors R,B,Y,P and G”<<endl;
cout << “Let play the game (:” << endl;
int turncounter = 0; // initialize turncounter to 0
while(turncounter != 12){ // loop 12 times
turncounter++;
cout << “Current try: ” << turncounter << endl;
for(int i=0;i<4;i++){ // Ask user 4 colors
cout << “Color ” << i << “: “;
cin >> usercolors[i];
cout << endl;
}
for(int i=0;i<4;i++){ // compare user entered colors with the random generated colors array
if(usercolors[i] == colors[i]) // if color matches then print right else wrong
cout << “Right” << ” “;
else
cout << “Wrong” << ” “;
}
cout << endl << endl;
// if all four color matches then user win else lost
if(usercolors[0] == colors[0] &&
   usercolors[1] == colors[1] &&
   usercolors[2] == colors[2] &&
   usercolors[3] == colors[3])
{
cout << “You win! Number of tries: ” << turncounter << endl;
return 0;
}else{
cout << “Nope.” << endl << endl;
}
// Ask if user wants to keep trying again or not
cout<<“do you want to exit type Y to exit or N to continue keep trying “<<endl;
cin>>ex;
if(ex==’Y’) // if user types ‘Y’ exit
return 0;
}
if(turncounter == 12){ // if turncounter is 12 user lost
cout << “You lost.):” << endl;
}
return 0;

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now