Assuring data quality is a critical element in managing data. You are responsible for assuring that newly cleaned data for Vila Health remains accurate and consistent. The organization uses several tools to support the collection of quality data. One is the pick list, which helps reduce errors by limiting user choices to appropriate data elements.
Write a post in which you discuss the procedures and application controls you can implement to ensure high-quality data for Vila Health. Also, discuss the role that health data standards play in maintaining data quality.
In: Computer Science
In the python code below, describe the scope of the variables x, y, z and u.
def my_func(x):
y = x - 2
return y
z = 6
if z > 4:
u =
my_func(6)
print(u)
In: Computer Science
Data Mining Application
You attended a meeting with the Vila Health executive staff. During the meeting, the Human Resource Director presented a proposal to purchase and implement a sophisticated data-mining application to identify employees with high-level technical skills.
Write a post in which you discuss the pros and cons of using this type of tool. How could it be applied to the use of clinical data?
In: Computer Science
In: Computer Science
What is the difference between the TCP/IP model and the OSI model?
In: Computer Science
Database Design
A database is an electronic filing system: a collection of data organized for use and retrieval. Database design is the process of creating a model of the database. The model can include several attributes and entities, such as users, logic, physical storage locations, relationships, and other parameters.
Write a post in which you explain at least three ways that database design and data architecture can work together to improve patient satisfaction, lower care costs, or improve patient outcomes. Then identify at least two areas of uncertainty or unanswered questions that you have about database design and data architecture.
In: Computer Science
Complexity of Integration
Data integration appears simple in theory but in fact it can be a very complex process, particularly in organizations where sensitive or personal information is used, such as health care. Based on this information, why is data integration important in a data management process? How critical is it to have a comprehensive integration plan, particularly in today’s world of health care? Provide examples to support your thoughts.
In: Computer Science
Big Data
Front-end processes refer to patient registration and data collection procedures that take place at the beginning of a patient care visit, generating master patient data. Correcting identity errors later in the data collection process has high technology, labor, and financial costs. What front-end policies should an organization implement to ensure the accuracy of master patient data? How should it implement and monitor the policies? What role should data governance play in front-end processes?
In: Computer Science
(A) Discuss why in any tree we have |V|=|E|+1? (B) Provide a definition for complete binary trees. (C) What is the maximum number of vertices in depth d a complete ternary tree? Explain your response (Hint 1: a ternary tree is a tree in which each node can have at most 3 children. Hint 2: Depth of a tree starts from 0. That means root is in depth 0).
In: Computer Science
In: Computer Science
Building a console application in C++ and add features for specific types of accounts that exist in a real Bank. Savings accounts, for instance, earn interest on the money they hold. Checking accounts, on the other hand, charge a fee per transaction (i.e., credit or debit).
a. Create an Inheritance hierarchy using base class Account and derived classes Savings-Account and CheckingAccount.
b. Derived class SavingsAccount should inherit the functionality of an Account, but also include a data member indicating the interest rate (percentage) assigned to the Account. SavingsAccount’s constructor should receive the initial balance, as well as an initial value for the SavingsAccount’s interest rate. SavingsAccount should provide a public member function CalculateInterest that returns a double indicating the amount of interest earned by an account. Member function CalculateInterest should determine this amount by multiplying the interest rate by the account balance. [Note: SavingsAccount should inherit member functions credit and debit as is without redefining them.]
c. Derived class Checking Account should inherit from base class Account and include an additional data member that represents the fee charged per transaction. Checking Account’s constructor should receive the initial balance, as well as a parameter indicating a fee amount. Class Checking Account should redefine member function debit so that it will subtract the fee from the account balance whenever the transaction is performed successfully. Checking Account’s debit and check balance functions should invoke the base-class Account version to perform the updates to an account balance. Checking Account’s debit function should charge a fee only if money is actually withdrawn (i.e., the debit amount does not exceed the account balance).
[Hint: Define Account’s debit function so that it returns a bool indicating whether money was withdrawn. Then use the return value to determine whether a fee should be charged.]
d. After defining the classes in this hierarchy, write a program that creates objects of each class and tests their member functions. Add interest to the Savings Account object by first invoking its calculate Interest function, then passing the returned interest amount to the object’s credit function.
Can someone help with this please? Include comments lines
In: Computer Science
earning Objectives and Outcomes
Assignment Requirements
You are an experienced digital forensics specialist for DigiFirm Investigation Company. The local police are investigating a man who they suspect is distributing child pornography. They have seized his laptop computer, which runs the Windows 10 operating system. The police are shorthanded and have contracted with DigiFirm to assist with the forensic investigation of the laptop. Chris, your team leader, has asked you to assist with the case.
There are several examinations you can complete on a computer running Windows 10. Before beginning any digital forensics investigation, it’s a good idea to plan your approach.
For this assignment:
Write a report that outlines the steps to be performed in examining the laptop for evidence of the crime, in order of importance. Be sure to explain why certain steps must be performed before others.
Required Resources
Submission Requirements
Self-Assessment Checklist
In: Computer Science
Data Mapping
Conduct an Internet search to identify two automated data mapping tools. List the functionalities and benefits of these tools, comparing the functionalities and benefits to the spreadsheet method for data map documentation. Refer to Clinical Data Mapping Process, linked in Resources.
Do you believe Vila Health would benefit from purchasing an automated tool? Provide a rationale and discuss the potential problems a tool can resolve. Also, speculate about the future of data mapping in health care.
In: Computer Science
Implement a generic utility to summarize a table of data. In particular, for specified columns, find the minimum, average, and maximum value for each of those columns and print out a nicely-formatted report. Hint: You might want to process one line at a time maintaining, in a dictionary, the running stats for each column.
For example: stats = '{'test1': {'min': 80.5, 'sum':845.0, 'max':100.0}, 'test2': {...}, ...etc.' If you also maintain a row counter, you’ll be able to calculate the averages after you have accumulated statistics on each column.
Post answer in PYTHON script using ATOM or REPL
In: Computer Science
Describe a TM (Turing Machine) which accepts the language L = {w2w | w is a string in {0, 1}* }. Here I mean informally describe how the TM works. You need not give the full program or diagram.
In: Computer Science