2 page Casestudy on Mobility XE success stories, HIPPA requirements and VLANs before August 6th.

1. Visit the NetMotion Web site (www.netmotionwireless.com) and access and read other Mobility XE success stories. Discuss the patterns that can be observed in the benefits that Mobility XE users have realized via its deployment and use. 

2. Do some Internet research on the security implications of HIPPA requirements for hospital networks. Discuss the major types of security mechanisms that must be in place to ensure hospital compliance with HIPPA requirements. 

3. Do some Internet research on the use of VLANs in hospitals. Summarize the benefits of using VLANs in hospitals and identify examples of how St. Luke’s could further enhance its wireless network by implementing VLANs. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Basic Data Analysis in RStudio

 

Background: This course is all about data visualization. However, we must first have some understand about the dataset that we are using to create the visualizations.

Assignment:

  • Use RStudio to generate a word document with basic data analysis of the following dataset: dataset_price_personal_computers.csv 
  • Use the following video to learn the simple commands to conduct basic data analysis with RStudio: Basic Data Analysis in RStudio.mp4

Questions/Requests:

  • Create a summary of stats for the dataset. (provide a screen shot)
  • Create a correlation of stats for the dataset. (provide a screen shot) (Hint: Transform may be needed)
  • What is the Min, Max, Median, and Mean of the Price? (provide a screen shot)
  • What is the correlation values between Price, Ram, and Ads? (provide a screen shot)
  • Create a subset of the dataset with only Price, CD, and Premium. (provide a screen shot)
  • Create a subset of the dataset with only Price, HD, and Ram where Price is greater than or equal to $1750. (provide a screen shot)
  • What percentage of Premium computers were sold? (provide a screen shot)(Hint: Categorical analysis)
  • How many Premium computers with CDs were sold? (provide a screen shot)(Hint: Contingency table analysis)
  • How many Premium computers with CDs priced over $2000 were sold? (provide a screen shot)(Hint: Conditional table analysis)

Your document should be an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

Submit your assignment on or before the due date.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Describe an example of a very poorly implemented database that you’ve encountered (or read about) that illustrates the potential for really messing things up.

 We all had the unfortunate experience of seeing how computers can, at times, make life’s journey abit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly implemented database that you’ve encountered (or read about) that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the literature.

The primary goal for the discussion forum assignment is to simulate the free sharing of ideas among peers that is typically experienced in graduate courses delivered in the more traditional, face-to-face environment. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment Instructions

 

Assignment Instructions

The scenario:

Johnston Smith, Associate Director of Sales as Pasedena HVAC Manufacturer, has asked you to calculate the cost of running HVAC units in summer and provide a report.

For this assignment, you will need the following files:

    New blank Access database

 HVAC_Cooling

You will save your files as:

    Lastname_Firstname_HVAC_Cooling

    Lastname_Firstname_Cooling_Costs

  1. Open the HVAC_Cooling Excel file, and save the file as Lastname_Firstname_HVAC_Cooling.
  2. Insert the your name in the footer.
  3. In the worksheet, insert an Excel table with a header row.
  4. Add a calculated column that calculates the cost of cooling using $0.00124 per Cooling BTU formatted with the Accounting Number Format.
  5. Filter the data to display only one Heating BTU number of your choice.
  6. Apply Best Fit to all columns.
  7. Center the worksheet horizontally on a landscape page.
  8. In Access, create a new database and save it as Lastname_Firstname_Cooling_Costs
  9. Import your Lastname_Firstname_HVAC_Cooling Excel file.
  10. In the table, filter the data to show only data for the Cooling BTU greater than 60,000 and the Power unit of your choice.
  11. Create a report based on your results.
  12. Delete the four measurement fields following the Heating BTU field,  and be sure the title fits on one line.
  • Special Instructions: Use the Supporting Materials below to complete the project.
  • Grading: Please review the rubrics for particulars.Grading RubricsPerformance LevelExemplaryAccomplishedDevelopingBeginningPointsPerformance ElementYou consistently applied the relevant skills.You mostly applied the relevant skills.You sometimes, but not always, applied the relevant skills.You rarely or never applied the relevant skills.
    10/10Modify the 4E HVAC Cooling worksheet: insert a table, add a calculated column, and filter dataWorksheet table is crated, calculated column is added, and data is filtered accuratelyWorksheet table is crated, calculated column is added, and data is filtered, but there are two or fewer errorsWorksheet table is crated, calculated column is added, and data is filtered, but there are more than two errorsOne or more item was not completeExemplary 10
    Accomplished 7-9
    Developing 4-6
    Beginning 0-3

    Points:Import the 4E HVAC Cooling worksheet to Access table, and filter tableTable is imported accurately, and filtering is applied accuratelyTable is imported accurately, and filtering is applied, but there are two or fewer errorsTable is imported accurately, and filtering is applied, but there are more than two errorsTable is not imported and/or filtering is not appliedExemplary 10
    Accomplished 7-9
    Developing 4-6
    Beginning 0-3

    Points:Create a report based on the 4E HVAC Cooling tableReport is created accuratelyReport is created with two or fewer errorsReport is created with more than two errorsReport is not createdExemplary 10
    Accomplished 7-9
    Developing 4-6
    Beginning 0-3

    Points:

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

problems on scientific computing

 

 Complete the following problems from the textbook. Show all your work. include screenshots of your code and test runs that you perform. Send code and screenshots • 

5.15 – pretend this experiment is set up on the moon (where g = 1.625m/s2 ) instead of Earth •(page-142) 

6.19 – write a computer program and use the Newton-Raphson method to answer this question •(page-174)

 7.6 • (page-202)

7.8 • (page-202)

8.1 – use chlorine (a = 6.579, b = 0.5622) at 1atm and 291.5K • page-215

9.20 • page-277

10.19 • page-298

11.24 • page 318

11.25 • page- 318

11.26 • page- 318

12.20 . page-335

All the work should be of your own and plagiarism free

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion Question – Need 3 answers for 1 question

Discussion and homework

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

question 1

 

Welcome to Week # 1. This week’s assignment will help you to fulfill the requirements for the first-course objective (CO-1).

For this week’s assignment instructions, please see below:

Assignment Instructions:
You are tasked as the Cyber Security Analyst at your new organization to prepare a briefing for executive management (comprised of people with anywhere from a basic understanding of Information Technology [IT] to a Chief Information Officer with a vast knowledge of IT). The purpose of the briefing is to make recommendations on a course of action they should take to deal with a myriad of threats due to a recent compromise of critical IT Infrastructure by an unknown intruder or insider.

For the purpose of this assignment, you are to select one of the topics below and create an in-depth and thoroughly analyzed report that first researches the subject matter, provides a well-thought-out background based on current trends, and then makes rationalizations for the subsequent recommendations.

TOPICS (you may use more than one topic in your report if you like):

  1. Attack Methodology plus Tools and Techniques used
  2. Attackers – Types of Threats
  3. How Most Organizations Defend Today (Lessons Learned)
  4. Targeted Capabilities – What We Should Be Defending

REQUIREMENTS:

  • 4 – 6 Pages in length in APA format (not including a cover page and reference section)
  • Cover Page
  • Background Section
  • Analysis of current research on the subject matter
  • Recommendations
  • Reference Section

MISCELLANEOUS:

  1. Use current and real-world data to make your points, not just the textbook
  2. Your report may focus only on the topic of your choosing – imagine yourself working on one aspect of the report while team members complete the other areas following the same structure.
  3. Your assignment is due by Sunday, not later than 11:59 p.m. Eastern time.

CATEGORY

4

3

2

1

Multiplier

Total

Introduction

The introduction clearly states the main topic and previews the structure of the paper.

The introduction clearly states the main topic but only partially previews the structure of the paper.

The introduction states the main topic but does not preview the structure of the paper.

There is no clear introduction to the main topic or structure of the paper.

X 2.5

Paragraph Construction

All paragraphs include the introductory sentence, explanations or details, and a concluding sentence.

Most paragraphs include introductory sentences, explanations or details, and concluding sentences.

Paragraphs included related information but were typically not constructed well.

The paragraphing structure was not clear, and sentences were not typically related within the paragraphs.

X 2.5

Sequencing

Details are placed in a logical order and correspond to the structure presented in the introduction.

Details are sometimes logically placed but do not correspond to the structure presented in the introduction.

Some details are not in a logical or expected order, and this distracts the reader.

Many details are not in a logical or expected order. There is little sense that the writing is organized.

X 2.5

Transitions

A variety of thoughtful transitions are used. They clearly show how ideas are connected.

Transitions clearly show how ideas are connected, but there is little variety.

Some transitions work well, but connections between other ideas are fuzzy.

The transitions between ideas are unclear or nonexistent.

X 2.5

Supportive Research

Supporting research studies and/or reports are research-based and accurately reported.

Supporting research studies and/or reports are not accurately reported.

Research studies and/or reports do not support the discussion.

Research studies and/or reports are limited and/or inaccurately reported.

X 2.5

Quality of Information

Information clearly relates to the main topic. It includes several supporting details and/or examples. The paper is in APA format, and the body of the paper is between 8 and 10 pages.

Information clearly relates to the main topic. It provides 1-2 supporting details and/or examples. The paper is not completely in APA format, and the body of the paper is between 8 and 10 pages.

Information clearly relates to the main topic. No details and/or examples are given. The paper is not completely in APA format, and the body of the paper is between 8 and 10 pages.

Information has little or nothing to do with the main topic. The paper is completely in APA format, and the body of the paper is between 8 and 10 pages.

X 2.5

Conclusion/

Recommendations

The conclusion effectively summarizes the discussion and provides at least two recommendations for further research.

The conclusion summarizes the paper but provides only one recommendation for further research.

The conclusion partially summarizes the discussion but provides no recommendations.

The conclusion is poorly constructed.

X 2.5

Sources

Citations

References

All sources (information and graphics) are accurately documented in APA. If you had a citation in the body of your work, you must have the appropriate reference in the reference section. (Provided at least 10 references)

Two sources are not documented in APA format. If you had a citation in the body of your work, you must have the appropriate reference in the reference section. (Provided at least 10 references)

Several sources are not documented in APA format. Not all citations match the reference in the reference section. (Provided less than 10 references)

Several sources are not documented in APA format. Not all citations match the reference in the reference section. Provided less than 5 references)

X 2.5

Mechanics

No grammatical, spelling, or punctuation errors.

One grammatical, spelling, or punctuation error.

Two grammatical, spelling, or punctuation errors.

More than two grammatical, spelling, or punctuation errors.

X 2.5

Timeliness

All late submissions have a 10 point (10%) deduction.

10

Total:

100

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science ISSC499 week 5 assignment

 

Welcome to Week # 5. This week’s assignment will help you to fulfill the requirements for the fifth course objective (CO-5: Develop strategies and plans for security architecture consisting of tools, techniques, and technologies to detect and prevent network penetration, and to design effective cybersecurity countermeasures). For this week’s assignment instructions, please see below:

Assignment Instructions:
You are tasked as the Cybersecurity Director to develop an Organizational Strategic Security Plan to defend against Cyber Attacks. This plan includes strategies and plans for security architecture consisting of tools, techniques, and technologies to detect and prevent network penetration, and to design effective Cybersecurity countermeasures.

For the purpose of this assignment, your plan is only required but not limited to have the areas outlined under the requirements listed below:

REQUIREMENTS:

  1. 4 – 6 Pages in length in APA format (not including a cover page and reference section)
  2. Cover Page
  3. Introduction (your fictitious organization [use one developed in previous assignments] background and IT architecture)
  4. Develop an Organizational Strategic Security Plan that does the following:
    • Establishes a Security Awareness & Training Program
    • Defines Policy and Compliance for your organization
    • Addresses Intrusion Detection and Prevention Tools and Techniques
    • Defines Vulnerability Assessment and Penetration Testing Procedures
    • Establishes a Disaster Recovery Program
    • Defines Defense in Depth principles
  5. Reference Section

MISCELLANEOUS:

  1. Your references should not be more than 5 years old
  2. Your assignment is due by Sunday not later than 11:59 p.m. Eastern time.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science ISSC480 week 5 assignment

 

Instructions

Security Frameworks

This week’s assignment we are going to look at the various security frameworks in use today in cybersecurity. You will need to look at your organization’s security framework policies from ISSC479 Week 3 assignment and compare it to a security framework policies for a general computer company. 

Assignment Guidelines

Step 1: Obviously our first step is to locate a security framework policy that is publicly available?

Step 2: Once you have completed your research and found a policy to match-up you will begin the process of comparing and contrasting the two security framework policies.

Step 3: Once you have gathered up all the information from your comparing and contrasting, you will want to put together a list of the differences and describe why these differences exist. Finally, you will also want to do an additional 1-2 pages of discussion on whether you think that the security framework and the policies derived from it in ICS and SCADA are truly secure or does the industry need to do more to increase security?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Making a company

Please use the attached template to fill in.

 

For this activity, you will establish the fictional company, executives, and team members that you will refer to.

Respond to each of the following:

  1. What is the name of this e-commerce company? (Do not choose a real company.) What is the fictional name of the CEO, and what is the fictional name of the CIO? (You can use a friend or family member if you want, or some celebrity or fictional character.)
  2. In 1-2 paragraphs, describe what kind of business your fictional company is in. Do they sell a product? A service? A new government (non-political, please) agency? A nonprofit or charity, perhaps? The one stipulation is that they must conduct business online, and they must be growing.
  3. Finally, choose one of the following roles on the team (cybersecurity).

  1. Now that you have identified your area of expertise based on the concentration you have studied, you will need to identify the members of your team. You will take the place of one of the members, so put your name (John Smith) where it belongs; the other roles can have fictional names assigned to them.
    • Cybersecurity Specialist:
    • Networking Specialist:
    • Data Management Specialist:
    • IT Project Manager (Assistant to the Project Manager):
    • Software Development Team Lead:

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now