Research Paper Big Data Discussion

Research Paper Big Data Discussion
While this weeks topic highlighted the uncertainty of Big Data, the author identified the following as areas for future research.  Pick one of the following for your Research paper: Research Paper Big Data Discussion

  • Additional study must be performed on the interactions between each big data characteristic, as they do not exist separately but naturally interact in the real world.
  • The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
  • New techniques and algorithms must be developed in ML and NLP to handle the real-time needs for decisions made based on enormous amounts of data. Research Paper Big Data Discussion

    ORDER A PLAGIARISM-FREE PAPER HERE

  • More work is necessary on how to efficiently model uncertainty in ML and NLP, as well as how to represent uncertainty resulting from big data analytics.
  • Since the CI algorithms are able to find an approximate solution within a reasonable time, they have been used to tackle ML problems and uncertainty challenges in data analytics and process in recent years.

Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Research Paper Big Data Discussion
 

Python Programming Assignment Paper

Python Programming Assignment Paper
a) Describe the necessary user input to your program using the following table format. Choose the appropriate data type to store each user input. Explain your choices.
Provide the screenshot of your Python code ONLY for prompting and storing user inputs. Python Programming Assignment Paper
(15 marks)
(b) Draw a flowchart to show the steps and briefly describe the logical program flow for calculating the interest earned from the input information. (15 marks)
(c) Apply your Python programming skills to write a program named “tma.py”. Ensure that you do not change this program file name. Your program shall calculate the total interest earned per month.
The program should have sufficient comments, which should include your name and PI number at the beginning of the source codes, as well as explanations of the corresponding execution steps and analysis of program logic and flow you described in (b).
Submit your program “tma.py” through Canvas separately from the written report. (55 marks)
(d) Develop three (3) test cases to test the conditional constructs in Question (b). For each test case, describe the inputs, expected output and the screenshots of executing your program “tma.py” with EACH given set of inputs. (15 marks) Python Programming Assignment Paper

ORDER A PLAGIARISM-FREE PAPER HERE

a) Describe the necessary user input to your program using the following table format. Choose the appropriate data type to store each user input. Explain your choices.
Provide the screenshot of your Python code ONLY for prompting and storing user inputs.
(15 marks)
(b) Draw a flowchart to show the steps and briefly describe the logical program flow for calculating the interest earned from the input information. (15 marks)
(c) Apply your Python programming skills to write a program named “tma.py”. Ensure that you do not change this program file name. Your program shall calculate the total interest earned per month.
The program should have sufficient comments, which should include your name and PI number at the beginning of the source codes, as well as explanations of the corresponding execution steps and analysis of program logic and flow you described in (b).
Submit your program “tma.py” through Canvas separately from the written report. (55 marks)
(d) Develop three (3) test cases to test the conditional constructs in Question (b). For each test case, describe the inputs, expected output and the screenshots of executing your program “tma.py” with EACH given set of inputs. (15 marks) Python Programming Assignment Paper
 

Managing Security for Sunrise Bank Paper

Managing Security for Sunrise Bank Paper
Scenario I
“Sunrise Bank”, established in 2002, is a leading commercial bank in Nepal founded by reputed entrepreneurs understanding the needs of a growing economy and is managed by a team of professionals and experienced bankers. The main mission of the bank is to be leading Nepali bank, delivering world class service through the blending of state of the art technology and visionary management in partnership with competent and committed staff, to achieve a sound financial strength with sustainable value addition to all the stakeholders. The bank is committed to do this mission while ensuring the highest levels of ethical standards, professional integrity, corporate governance and regulatory compliance. Managing Security for Sunrise Bank Paper
The bank is committed in providing quality service and planning to utilize all the technological facilities that enhance quality service with high degree of compliance and risk management. The bank has an IT department which is responsible to manage and implement all required IT infrastructure. IT department has defined a policy that all of the branch office must connect to head office through secure VPN. All other clients must be member of the centralized domain. User access of the system has been managed via proper access control mechanism and the access control list, and the service access has been managed via ports and services.

ORDER A PLAGIARISM-FREE PAPER HERE

The bank has security policies for managing the security of all its assets, functions and the services. VPN access has been managed for limited person of all branch office employees and IT administration team of head office. Defense in depth approach is to be implemented in order to confirm the IT security at various level of network infrastructure. IT infrastructure security design including address translation, DMZ, VPN, firewall, antivirus and intrusion detection system are to be implemented for internal and external security policy.
You have been working as an IT Officer for the bank. Your key role will be to manage, support and implement a secure network infrastructure for banks LAN/WAN environment. In order to assess the possibility, you have been assigned the following in which you have to demonstrate that you are able to assess risks to IT security, describe different possible IT solutions, review mechanism to control organizational IT Security and manage organizational security. Managing Security for Sunrise Bank Paper
Part: 1
Before you start the implementation of the IT security measure for the organization, you need to assess the IT security risks in the organization. You need to consider various aspects of risks such as unauthorized access of the system and data, naturally occurring risks, host, application and network risks etc. You are required to consider organizational security procedure such as business continuance, backup/restoration, audits etc. and then produce a report for the CEO of Sunrise Bank containing:
1. Identified security risk types to the organization along with description of organizational security procedure.
2. Develop a proposal of a method to assess and treat IT security risks.
You would prefer to produce a more detailed document, so you will produce a comprehensive report for fully functional secure system which will include identified risks and method to mitigate those risks. Your manager would like a separate report on your assessment of the effectiveness of the design in relation to user and system requirements.
Part: 2
Once the assessment of the risks and proposal for its remedy has been made you need to describe IT security solution for the organization such as VPNs, firewall, DMZ with a suitable implementation example. You need to:
1. Identify the potential impact to IT security using firewall and VPNs and make aware of the repercussion of incorrect configuration of firewall policies and third party VPNs.
2. Show through an example in simulated environment, how implementing a DMZ, Static IP ad NAT in a network can improve Network Security.
3. Discuss how network monitoring systems can benefit the security of IT of the organization. You need present at least three advantages.
4. Finally investigate how a ‘trusted network’ may be the part of an IT security solution.
Part: 3
Once you have identified IT risks and viable security solutions, you need to review the mechanisms to control organizational security. Consider various aspects of network change management, audit controls, disaster recovery plans, Data Protection Acts, Computer Misuse Act, ISO 3001 standards, etc. You need to: Managing Security for Sunrise Bank Paper
1. Discuss risk assessment procedures and explain data protection processes and regulations as applicable to the organization.
2. Summarize the ISO 31000 risk management methodology and its application in IT security and then discuss possible impacts to organizational security resulting from an IT security audit.
3. Explain considering how IT security can be aligned with organizational policy, detailing the security impact of any misalignment.
Part: 4
Lastly you will produce technical and user documentation which will be given to the company for the management of organizational security. You have to design and implement a security policy for the bank which will
1. List out the main components of an organizational disaster recovery plan, justifying the reasons for inclusion.
2. Discuss the roles of stakeholders in the organization to implement security audit recommendations.
3. And an evaluation of the suitability of the tools used in an organizational policy. Managing Security for Sunrise Bank Paper

Data Analytics and Visualization Assignment

Data Analytics and Visualization Assignment

  • Scenario
    A business scenario will be given whereby you are to investigate various data sources. The data could exist in various forms from CSV to actual data with a particular database. You will be expected to identify at least one suitable data source which would lead to one or more data products and
    visualizations. This needs to be a result of identifying a business reporting gap or need so you will need to make sure there is a reason for the choices made. Data Analytics and Visualization Assignment
  • Analysis
    The select data source is to be analyzed for its properties in regards to Variety, Volume, Velocity, and Validity. You will are to determine the statistical significance of the chosen data source by using one or more statistical significance testing instruments such as p-values. You will be expected to rationalize and justify the use of the instrument as well as comment on it.

    ORDER A PLAGIARISM-FREE PAPER HERE

    https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5665734/

  • Reporting
    Write a report based on information drawn from the Scenario and Analysis along with relevant high-quality research and industry literature covering an in-depth discussion on how the data can lead to a Data product.
  • Scenario
    A business scenario will be given whereby you are to investigate various data sources. The data could exist in various forms from CSV to actual data with a particular database. You will be expected to identify at least one suitable data source which would lead to one or more data products and Data Analytics and Visualization Assignment
    visualizations. This needs to be a result of identifying a business reporting gap or need so you will need to make sure there is a reason for the choices made.
  • Analysis
    The select data source is to be analyzed for its properties in regards to Variety, Volume, Velocity, and Validity. You will are to determine the statistical significance of the chosen data source by using one or more statistical significance testing instruments such as p-values. You will be expected to rationalize and justify the use of the instrument as well as comment on it.
    https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5665734/
  • Reporting
    Write a report based on information drawn from the Scenario and Analysis along with relevant high-quality research and industry literature covering an in-depth discussion on how the data can lead to a Data product.

Data Analytics and Visualization Assignment
 

Cloud Computing Risk Securities Essay

Cloud Computing Risk Securities Essay
Enhance my paper from 22 pages to 45 pages in total
1. Introduction currently 8 pages, enhance it to 14 pages
2. Literature review currently 14 pages, enhance it to 31 pages
3. Currently 38 references, enhance it to 70 references in total
Topic: “The effects of Cloud Computing Risk, on the security and future directions on Data Migration to deliver a service over a network.”
Chapter 1 – Outline
Chapter 2 – Literature Review. Cloud Computing Risk Securities Essay
Chapter 1 – Outline
Abstract
Cloud computing is simply an on-demand service that makes it possible for users and enterprises to access computer system resources more so data storage and computing capabilities without the direct active administration by the users or institutions. Cloud computing has been identified to offer several benefits. Some of the benefits are helping organizations and users cut on their costs, acceleration innovation through data and information sharing, improving marketing speeds, and increasing operation capabilities by scaling applications that are on demand. As much as cloud computing has numerous benefits to users, its structure and mode of operation have been found to place data and networks at risk and in general expose organizations to numerous security risks.
To understand the risks associated with cloud computing it is advisable to study the features of cloud computing, the benefits of cloud computing as well as the migration process. By conducting such a study, security experts can formulate the best way to implement a cloud solution without compromising their data and operations. There are six main security risks associated with cloud computing.
Data migration is an essential component of cloud computing. The effectiveness of cloud computing is highly dependent on data migration and system integrations. Organizations that safely migrate their data to cloud platforms are better placed to leverage the benefits of cloud computing in comparison to those that do not safely migrate their data. For organizations to ensure that they leverage the benefits of cloud computing they must deal with the security issues associated with cloud computing more so the migration challenges. organizations or users must have in place measures to prevent or counter shadow IT and insider dealings. Also, organizations and users must also have in place measures to ensure that security when using cloud services is guaranteed. Cloud Computing Risk Securities Essay
Introduction
Cloud computing is simply an on-demand service that makes it possible for users and enterprises to access computer system resources more so data storage and computing capabilities without the direct active administration by the users or institutions. Cloud computing is only possible through internet connections. Due to the nature of cloud computing, the technology has been found to place data and networks at risk. To understand the risks associated with cloud computing it is advisable to study the features of cloud computing, the benefits of cloud computing as well as the migration process. By conducting such a study, security experts can formulate the best way to implement a cloud solution without compromising their data and operations.
Cloud computing is considered to transform how information technology tends to be managed as well as consumed. Cloud computing has been identified to offer several benefits. Some of the benefits are helping organizations and users cut on their costs, acceleration innovation through data and information sharing, improving marketing speeds, and increasing operation capabilities by scaling applications that are on-demand (Tchernykh et al., 2019). Nevertheless, as cloud computing shape is emerging as a reliable technology as well as developing drastically both within reality as well as conceptually, privacy in addition to security matters still poses challenges that are considered to be significant. Cloud Computing Risk Securities Essay
The security risks in cloud computing
For organizations and users to access cloud computing services, they employ the services of cloud service providers. There are several cloud service providers such as Amazon and Microsoft. For one to effectively use the services offered through cloud computing, they must reveal their data and even trade secrets to the service providers (De Carvalho et al., 2017). The providers then integrate the data provided and the systems provided to their cloud infrastructure. Through the integration, users can effectively carry out their functions and transactions online regardless of the location there are in. All that is needed is a secure and reliable internet connection. Majority of the security risks associated with cloud computing stem from the fact that users have to share their data with cloud service providers to access cloud computing capabilities (Rashid &Chaturvedi, 2019).

  1. Reduced visibility and control of data and other assets

There are six main security risks associated with cloud computing. The first risk is that users have reduced visibility and control of their data and specific assets. When institutions and users opt to employ the services of external cloud services, the responsibility for some infrastructure and policies inevitably move to the cloud service provider. Consequentially, there is a paradigm shift as regards security logging and monitoring.Cloud Computing Risk Securities Essay
The majority of the time, organizations adopt cloud computing they have to perform the monitoring as well as the analysis of information about data, services, applications, and users without the use of network-based monitoring which can only be done on on-premise IT resources. In most cases, organizations have to be content that their cloud service providers will implement security measures that will secure their data as well as other assets. In some cases, cloud service providers do not offer security that effectively secures the assets of their clients.

  1. The use of on-demand self-services supports shadow IT

Cloud service providers normally make it easy for personnel of an organization to provision new services without IT consent. Consequentially, software that is supported by an organization’s IT department is introduced to an organization’s operations leading to shadow IT. Shadow IT is known to expose organizations to many unwelcomed risks. According to Chaudhry (2017), shadow IT leads to the easy introduction of malware into an organization’s network. Malware can compromise operations through ransomware, Trojans, and related viruses. Also, the use of shadow IT is known to decrease an organization’s control of its data and network.

  1. There is a possibility of a compromise of internet-accessible management application programming interfaces (API)

Due to the excessive reliance on the internet in cloud computing, cloud service providers can expose application programming interfaces that organizations use to interact with cloud services. Organizations use application programming interfaces to manage and monitor their assets and users. Unlike application programming interface management in on-premise computing, cloud service providers application programming interfaces are accessible via the internet and for that reason are exposed to potential exploitation. The interfaces can be turned into successful attacks that can compromise an organization’s assets and operations.

  1. Data deletion is never guaranteed

Organizations share their data with their cloud service providers to support operations via cloud services. Once organizations and users terminate their contracts with cloud service providers regardless of the reasons they can never be sure that their cloud service providers do not abuse their data. Organizations might dictate cloud service providers to delete data concerning the organizations but malicious cloud service providers might not fully comply. The lack of full compliance has the potential to lead to the leaking of trade secrets. Also, the undeleted data can be used for ransom purposes as well as compromise the operations of organizations.Cloud Computing Risk Securities Essay

  1. Leaking or loss of credentials

In the majority of cases, cloud service providers offer their services to several clients and in some cases, the clients can be competitors. Due to access to many customers’ data, cloud service providers are highly targeted by cybercriminals (Alex & Kishore, 2017). Cybercriminals are aware that if they compromise the administrative function of a cloud service provider they will be better placed to access the data of the cloud service providers’ customers. By accessing, the administrative functions of cloud service providers, cybercriminals have access to also the provider’s network, data, systems, and applications. Consequentially, cybercriminals can hack cloud service providers to compromise the data and credentials of clients.

  1. High likelihood of insiders abusing authorized access

Insiders such as administrators and staff for both cloud service providers and organizations contracting cloud services who abuse their access to the networks, systems, and data are uniquely positioned to cause harm or exfiltration information. Due to there being many stakeholders, the probability of identifying insider culprits is difficult yet the damage caused by insiders can be too much. Insiders can use their authorized access to access and leak trade secrets as well as create backdoors for cybercriminals to access the networks in use. Through the backdoors created by insiders, cybercriminals can cause severe damages to the cloud service provides or to the organizations that have contracted cloud service providers. Cybercriminals can introduce ransomware as well as steal valuable data.
Data migration for cloud computing
There are several security risks involved in data migration for cloud computing. Top on the list is that a user might not be in a position to fully control their given data as well as control the performance of their applications once they are migrated to a cloud service provider for integration. Also, users may not have the capability of auditing or changing their data policies as well as the processes under which they are supposed to work. Furthermore, during migration, some segments of an application might be misarranged and this has the potential to harm a specific application’s performance (Patrignani, et.al, 2016).Cloud Computing Risk Securities Essay
The other main issue as regards security risks during data migration is meeting all data regulations. Trying to comply with regulations at times might be complicated more so if it concerns issues on cross-border. Organizations must consider all possible regulation restraints that may affect their data migration. For example, some countries do not support cloud computing as they consider cloud computing to be highly vulnerable. In such countries, data migration is prohibited. Some countries prohibit the migration or transfer of customers’ data without the consent of customers. Countries like the United States have many rules that cover the distribution of data as well as the transfer and share of personal data.

ORDER A PLAGIARISM- FREE PAPER NOW

            The other main risk is the possibility of cloud consumers losing their general data by having the data locked into proprietary formats. Consequentially, organizations can lose control over their given data. The main reason for this is because the monitoring tools on the one using the data or who can view the data tend not to be offered to the consumers of cloud computing. As a result, the loss of data is considered to be a possible risk after data has been migrated (Sharma, et.al, 2017).
The fourth risk is that it might not be easy to have service level agreements that are tailor-made concerning the particular necessities of an enterprise. The compensation provided because of downtime might be inadequate. Also, the service level agreements have high probabilities of not covering the concomitant damages.  It is considered to be making sense in balancing the expense of guaranteeing uptime which is internal against the benefits of choosing the cloud. There is also the risk of malware infections – this is mainly because of data that is in massive volumes being stored on the cloud. It also needs an internet connection in storing the data therefore anyone who is utilizing cloud services is at risk of encountering cyber-attacks (Tchernykh, et.al, 2019).Cloud Computing Risk Securities Essay
There is also the security issue of making sure that there is the availability of data integrity which involves its storage, transfer as well as retrieval which indicates that it gets to change only when responding to transactions that are authorized. The challenge is that there is no standard in place to ensure the integrity of data during migration. Cloud migration is considered to be among the top issues discussed when cloud managers are discussing the adoption of cloud computing services (Elzamly, et.al, 2019).
Cloud tends to behave the same as an interface via which companies are capable of accessing data within a virtual environment. Therefore, the smooth functioning of the cloud relies on how appropriately groomed as well as knowledgeable the providers of the cloud are within this region. Additionally, if migration of data is not carried out systematically as well as appropriately, it is capable of causing problems concerning data as well as cloud security of the assets of an organization. Bearing the above in mind, it is necessary to hire cloud providers who have experience which is sound concerning the field so that cloud service management can be done efficiently as well as effectively (Zelenkov, 2016).Cloud Computing Risk Securities Essay
 
Conclusion
Data migration is an essential component of cloud computing. The effectiveness of cloud computing is highly dependent on data migration and system integrations. Organizations that safely migrate their data to cloud platforms are better placed to leverage the benefits of cloud computing in comparison to those that do not safely migrate their data. In the migration process, two main things must be considered. The first thing is the type of data being migrated. Trade secret and proprietary data ought to be migrated in phases to ensure that it is not compromised or that it is not altered during migration. Secondly, customers or organizations must consider the volume of data being moved in the migration process. Large data volumes must be moved in blocks or phases to ensure that all data is moved in the migration process. The failure to segment large data volumes has the potential to lead to data loss in the migration process.
As much as migration is the center of focus during cloud computing, organizations and users must consider the security risks associated with cloud computing before adopting the technology. Cloud computing offers numerous benefits to users such as easy access to data and systems from any location of the world given that there is internet access. Due to the easy access, organizations and users can streamline operations. For organizations to ensure that they leverage the benefits of cloud computing they must deal with the security issues associated with cloud computing. For example, organizations or users must have in place measures to prevent or counter shadow IT and insider dealings. Also, organizations and users must have in place measures to ensure that security when using cloud services is guaranteed.Cloud Computing Risk Securities Essay
 
 
Chapter 2 – Literature Review
Abstract
Cloud computing is a novel paradigm capable of combining multiple computing technologies and concepts of the internet to come up with an agile and cost-effective business platform and information technology infrastructure. Adoption of cloud computing in various industries has been on the rise in the recent past. This has enticed organization yearning to go digital get interested with the technology. Adoption of cloud computing requires migration of data and information from the existing servers to cloud servers, a process known as data migration. The purpose of the process is making information available for use over the network. Data migration is vulnerable to several cloud computing risks, as revealed in this paper.
Keywords- Security; Cloud Computing; Data Migration
 
 
Introduction
Cloud computing is a novel paradigm capable of combining multiple computing technologies and concepts of the internet to come up with an agile and cost-effective business platform and information technology infrastructure. In the recent past, the adoption of cloud computing in various industries has been on the rise. This has positively impacted the maturity of the markets associated (Hammami et al., 2017). Despite the increasing popularity of cloud computing services like Amazon EC2, a good number of people are still unclear on the path to take because of the associated security issues. Some people lack a solid understanding of what cloud computing is. Cloud Computing Risk Securities Essay

Intermediate Web Programming Assignment

Intermediate Web Programming Assignment
By putting together the previous labs and adding some database features, we want to build an online website consisting of several pages as follows:
1) A front-page that contains some ads and intro about your business (refer to some online shops to get inspired)
2) A catalog/browse page: displaying all of your products in a typical online store format (like amazon)
3) An “add product” page, consisting of a form that the user can add information about a product to be added. The product info is the same as the previous labs, but for the sake of the database, you need to include an id for the product as well. As for the picture, the user has to enter the URL of the image to be displayed for this product. You can upload a bunch of pictures in a folder on your website and use their URLs for your products. The page should show an error if the insertion is unsuccessful (like when the product id already exists) Intermediate Web Programming Assignment
4) An “update product” page, consisting of a form that the user can update information for an existing product. You have to use the SQL command “UPDATE” for this purpose (refer to w3 for tutorial). The page should show an error if the update is unsuccessful (like when the product id does not exist)

ORDER A PLAGIARISM-FREE PAPER HERE

Use either your own personal database (named dbxxx, where xxx is your student number) or use the dbtest database. If you use dbtest then call your table product_xxx where xxx is your student id to avoid conflict with other students tables.
Use bootstrap for your page and form layouts, but in addition to that make your own styles to make the page look nice. You can imitate some existing online shops of your choice. Intermediate Web Programming Assignment
 

Network Design Assignment

Network Design Assignment
To assess your ability to: assess and recommend criteria for a network as defined in the case. You will need to implement portions that were needed to allow you to identify performance and configuration parameters. Network Design Assignment

2. ASSIGNMENT TASKS

NZ Triathlon Enterprises has contracted you to design the network infrastructure for a series of portable buildings that will be used for race management throughout the country. The buildings will be built in 20-foot shipping containers to make them easy to transport.
NZ Triathlon Enterprises have organized for design testing to be completed in an open paddock located at the GPS coordinates: -41.3114,174.6852, your designs must be suitable for testing at this location.

ORDER A PLAGIARISM-FREE PAPER HERE

They have requested that you provide designs that meet the following specs:

  • The portable network will ultimately be used in rural and urban areas so must be designed to operate successfully within both types of environments
  • The following buildings need to be designed:
    1. Two medic/first aid buildings
    2. A race control office (will contain approx. 5 staff with 20 concurrent live 1080p IP CCTV feeds)
    3. A registration/reception building
    4. A finish building

You need to provide the following within your design and documentation:

  • Evidence and discussion of physical testing that details the minimum network characteristics that provide that allow the following data types to be delivered through an Ethernet network with users not experiencing degraded performance:
  1. VoIP telephone calls
  2. 1080p video streams
  3. SMTP/IMAP email with two 1.5MB jpg images attached
  4. SMB file transfer Network Design Assignment
  • Discussion of the user’s computer and network infrastructure requirements in each building and how your design meets their needs
  • Discussion of how the network equipment will be configured, e.g.:
    1. Logical and physical designs
    2. Cable selections
    3. Frequency selection
    4. Protocol and codec’s selected and justification of selection criteria
  • Make and model of equipment selected
  • A sketch and detailed description of how the equipment will be installed within or on the portable building
  • A sketch and discussion of how the building should be arranged on a race site (the start will have a medic and registration building; the finish will have a medic, race control and finish line building) and any network connectivity between the buildings at the start and finish
  • Ensure you plan for an Ethernet Internet uplink (details to be provided later)
LEARNING OUTCOMES
  1. Assess and recommend appropriate network hardware and configuration/s for given scenario/s
  2. Implement network/virtualization/cloud/containerized infrastructure for given scenario/s

Network Design Assignment

E-mail and Private Messages Assignment

E-mail and Private Messages Assignment
Assignment 1: Simulated Activity 1: E-mail and Private MessagesAssignment 1: Simulated Activity 1: E-mail and Private Messages As an online instructor, you correspond frequently with students via e-mail and/or private messages. This is where you can have a major impact, positive or negative, on your students. In this activity, you experience three multimedia simulations in which you must decide how best to respond. E-mail and Private Messages Assignment

ORDER A PLAGIARISM-FREE PAPER HERE

To Prepare: Review “Principles of Effective Online Teaching: #6 Think Before You Write” (Ragan, n.d.) from the Learning Resources. Consider your sphere of influence in the online classroom, specifically via e-mail and private messages with students. Go to the Online Teaching Simulation. Click on Module 3 and go to “E-mail and Private Messages” to engage in three scenarios: “Lucy’s Lack of Participation,” “Oliver’s Technical Difficulties,” and “Is Charlie Cheating?” You will consider the scenarios and follow various decision paths to see the potential results. By Day 3 of Week 5 For each scenario, assess the situation and choose a decision path to see the potential outcome. Go back to the beginning of each scenario and follow different paths to see how alternate responses might influence the results. By Day 7 of Week 5 Submit a 500-word analysis of the interactions you had with simulated students in this activity. Address the following questions in your analysis: Which choices led to better outcomes for each student? Explain why. Which choices led to worse outcomes for each student? Explain why. What insights did you gain from this activity?   E-mail and Private Messages Assignment

Principles of Computed Tomography

Principles of Computed Tomography
The aim of the module is to allow learners working with CT to gain the knowledge and skills to develop a more in depth understanding of the theoretical applications of CT in order to enhance practice and service provision.
The Learning Outcomes:
On successful completion of the module you will be able to:
L1 demonstrate a critical understanding of the theoretical principles of image production, optimisation and manipulation including the role of image quality in patient diagnosis;Principles of Computed Tomography
L2 demonstrate a critical awareness of the principles, function and necessity of hardware and software options;
L3 critically analyse and evaluate the safety considerations and mechanisms of quality assurance;
L4 critically evaluate the role of the radiographer within the scanning facility;
L5 demonstrate a critical knowledge and understanding of the importance of operating within the limits of one’s own knowledge in and appreciate the important implications of this for clinical practice.

ORDER A PLAGIARISM-FREE PAPER HERE

To obtain a Pass you must gain a minimum of 50% for the written assignment The DPPR PG rubric will be used to provide feedback on the academic achievement of the assignment, the marking criteria directly links with the assignment guidelines. Please note: the rubric criteria are not equally weighted but provide an indication of the level of achievement for each criterion. The assessment guidelines will refer to the rubric criteria which can also be found at the end of this document.
Data Protection

  • You must not include any identifiable information in the reflective accounts or essay including staff or patient’s names, specific dates, hospital names, dates of  birth.
  • Inclusion of any identifiable data will result in a ‘Fail’ and possibly instigate disciplinary proceedings.

Assignment Title
Critically evaluate the role of computed tomography in the diagnosis and management of a chosen pathology. Include the following in your writing:

  • a clear introduction and conclusion;
  • a critical understanding of the principles involved in CT image acquisition;
  • a critical understanding of associated hardware and software;
  • a critical evaluation of the patient journey and associated service provision;
  • an evaluation of appropriate guidelines;
  • sensitivity and specificity of CT in the diagnosis of your chosen pathology.

Additional considerations:

  • a narrow focus should be identified to assure adequate depth of discussion;
  • extensive and balanced literature sources should be included to inform the discussion;
  • anonymised images can be included in the body of the text or as appendices.Principles of Computed Tomography

The essay should be fully referenced as per QMU guidelines with a word limit of 3000 +/- 10%.
If you are outside of this word limit then your mark will be capped at 50%.

  • Appendices not included in the word count
  • Referencing in text included in the word count
  • Reference list not included in the word count

All modular learning outcomes are relevant to the written assignment.
The main focus of the essay:
Criterion 1 demonstrate an understanding of CT practice and the patient pathway associated with the chosen pathology;
Criterion 2 demonstrate a critical understanding of theories and concepts central to CT practice;
Criterion 3 include high quality sources and comprehension of the literature as well as demonstrating the awareness of the strength and limitations of the selectedevidence whilst linking theory to practice;
Criterion 4 demonstrate an ability to sythesise ideas and concepts central to professional practice in CT and the patient pathway in relation to the chosen medical condition;
Criterion 5 demonstrate ability to challenge current CT imaging techniques in relation to the chosen medical condition;
Criterion 6 correct use of grammar, punctuation and spelling as well as accurate terminology and image labelling;
Criterion 7 include accurate referencing in the text and reference list in line with ‘QMU Write and Cite’;
Criterion 8 critically review, consolidate and extend knowledge and thinking with respect to current CT practice.Principles of Computed Tomography
Guidelines for the Presentation

  • Presented on single sides of A4 paper
  • Font style Arial, font size 11
  • Double spaced except for the Abstract, References and Appendices which should be single spaced
  • All text left aligned (non-justified)
  • Margins: left 4 cm; right 2.5 cm; top and bottom 2.5 cm each
  • Quotations of three lines or more to be indented and single spaced
  • Harvard referenced according to the current QMU Write and Cite guidelines
  • Titles to be positioned below figures and above tables
  • Numbers below 10 to be written in full unless followed by measurement units
  • Page numbers in the footer, centered and sequential
  • Bold or underlined headings and sub-headings may be used at your own discretion
  • QMU matriculation number only in the header

Submission Instructions
Submission to the reassessment dropbox: by 12:00pm 27th July 2020
Prior to submitting any assessment to the Hub for marking you should complete the table below and copy it to the front page of your assessment.
Matriculation Number
Module Code
Module Title
Assessment title if applicable (e.g. if you have been given a choice of topics state the topic you have chosen) Word Count
Do you have an agreed extended submission date for this assessment e.g.  agreed individual learning plan or agreed extenuating circumstances?
Submission to an incorrect dropbox will result in the assessment not being marked and a mark of ‘Non-submission’ awarded. Please retain confirmation of submission, in case this evidence is required.

  • Assignment feedback will be released through the Student Portal, you will receive an email when the marks and feedback have been released.
  • Feedback will be released in 15 working days, post submission date, in line with QMU policy.
  • If the feedback is delayed an announcement will be posted on the Hub.
  • If you have an extension to the original submission date, feedback will be released 15 working days from the date of submission.

    ORDER A PLAGIARISM-FREE PAPER HERE

Turnitin Submission Guidelines
Assessment Regulations & Guidance on Making a Submission By submitting your assessments you have agreed that you have read and understood the Queen Margaret University assessment regulations.
Assessment Regulations

  • In line with QMU Assessment Regulations, students are reminded that it is their responsibility to submit all work for assessments in accordance with the requirements of

the course; you will not receive any communication should you fail to submit your assessments.Principles of Computed Tomography

  • Any student who submits work to be assessed after the assessment submission date and time, without the prior agreement of the Programme Leader, or without good or agreed cause, will have marks deducted according to the following criteria:
  • If submitted as a first diet after the deadline but up to and including 6 days after the deadline a maximum mark of 50% for postgraduate programmes.
  • After the above time a mark of 0% will be awarded
  • By submitting your assignment you are confirming that you understand the Queen Margaret University Assessment Regulations and that all marks and feedback released are provisional until confirmed by the Board of Examiners.

Guidance on Making a Submission

To submit your final work for marking you must submit it in the Assessment Dropbox. Submitting your work in the Similarity Checker Tool does not count as a submission.
Once you have submitted in the Assessment Dropbox you will be sent an email receipt to your QMU email address confirming you have successfully submitted, please retain this for  future reference. You will not receive an originality report upon submission. To receive an originality report prior to submission, process your work through the Similarity Checker Tool.Principles of Computed Tomography