5 pages; minimum 5 academic/professional references published in last 5 yrs.
Identify an effective health care organization that utilizes information technology.
Analyze the components and requirements of its information systems technology program. Explain the requirements for health care information technology systems to comply with federal, state, and local laws governing patient information security. Assess the risks and affected stakeholders in the event of a system breach or failure, and recommend approaches that can be used to safeguard confidential information.
For a resource guide on using the online library to search for references, please click here. Please submit your assignment. For assistance with your assignment, please use your text, Web resources, and all course materials. Your assignment will be graded in accordance with the following criteria. Click here to view the grading rubric.
00JohnJohn2019-06-24 10:44:032019-06-24 10:44:06Analyze the components and requirements of its information systems technology program.
What are the main differences between bar charts and networks?
What are the main advantages of networks over bar charts?
Why is it important to know the critical path?
What is the difference between total and free float?
Explain the difference between EST, EFT, LST, and LFT.
Part II (10 points)
Draw the activity-on-node (AON) network diagrams for the following two projects:
Part III (25 Points)
For each of the following predecessor tables:
Draw a corresponding AON network.
Compute EST and EFT for each activity and complete the table.
Compute LST and LFT for each activity and complete the table.
Find and mark the critical path.
Determine the total float and free float and complete the table.
Table A:
Activity
Duration
Preceding Activity
ES
EF
LS
LF
TF
FF
A
2
–
0
2
0
2
0
0
B
4
A
C
6
A
D
9
A
E
5
B
F
7
B, C
G
3
D, E, F
Table B:
Activity
Duration
Preceding Activity
ES
EF
LS
LF
TF
FF
A
6
–
B
2
–
C
8
A
D
5
A, B
E
3
B
F
6
D, E
G
5
C, D
H
2
F, G
Table C:
Activity
Duration
Preceding Activity
ES
EF
LS
LF
TF
FF
A
5
–
B
7
A
C
10
A
D
5
A
E
9
A
F
6
B
G
4
B, C
H
8
B, C, D,
I
2
C, D
J
5
E
K
8
F
L
9
E, G
M
7
F, G, H
N
3
F, G, H, I
O
6
H, I
P
4
M, N, O
Q
3
K, L
R
5
M, N
S
4
J, P
T
6
Q
U
4
Q, R
V
1
T, U, S
PART IV (20 points)
Calculate the expected duration and the variance for each of the paths in the following network and identify the critical and near-critical paths. The optimistic times (a), most likely times (m), and pessimistic times (b) are given for each activity. Then answer the following questions (Show your calculations):
What is the probability that this project can be completed in 32 days?
What is the probability this project can be completed by the 28th day?
For a 99% probability, what is the expected number of days for completion?
For a 1% probability, what is the expected number of days for completion?
PART V (20 points)
What does the term “accelerating” a project mean, and why would a project manager (or a contractor) accelerate a project?
A project manager may shorten the duration of a project in many ways. Mention six of these ways. Discuss each one of them briefly, mentioning its pros and cons.
Calculate the normal, least-cost, and crash duration for the following project (Table V3A). Calculate the cost associated with each duration. Indirect (overhead) costs are $100 per day.
Table V3A:
Activity
Preceding Activity
Duration (days)
Cost $
Normal
Crash
Normal
Crash
A
–
7
5
500
640
B
A
6
5
550
630
C
A
8
5
800
935
D
B
10
7
1200
1440
E
B,C
6
4
600
700
F
C
4
3
500
590
G
D,F
4
2
700
1000
H
E,F
7
4
650
950
I
G,H
2
2
300
300
Project 1 Activity Immediate Predecessor E, F, H, I Project 2 Activity Immediate Predecessor F B F, G, J D. I
00JohnJohn2019-06-24 10:42:082019-06-24 10:42:12What are the main differences between bar charts and networks?
What is a common drawback or weakness of a vulnerability scanner?
A high false-negative error rate
A high false-positive error rate
A low false-negative error rate
A low false-positive error rate
QUESTION 5
What can be used to ensure confidentiality of sensitive data?
Hashing
Digital signature
Non-repudiation
Encryption
QUESTION 6
You have identified the MAO for a system. You now want to specify the time required for a system to be recovered. What is this?
Recovery time objectives
Recovery point objectives
Maximum acceptable outage
BIA time
QUESTION 7
Which element of an incident response plan involves obtaining and preserving evidence?
Preparation
Identification
Containment
Eradication
QUESTION 8
Of the following, what is critical for any DRP?
Budget
Alternate locations
Third-party backup software
Fuel for generators
QUESTION 9
Three common controls used to protect the availability of information are:
Redundancy, backups and access controls.
Encryption, file permissions and access controls.
Access controls, logging and digital signatures.
Hashes, logging and backups.
QUESTION 10
A major disruption has forced you to move operations to an alternate location. The disruption is over and you need to begin normalizing operations. What operations should you move back tothe original location first?
Mission-essential personnel
Most critical business functions
non-mission-essential personnel
Least critical business functions
QUESTION 11
What type of control is an intrusion detection system (IDS)?
Corrective
Detective
Preventative
Recovery
QUESTION 12
Vulnerability management begins with an understanding of cybersecurity assests and their locations, which can be accomplished by:
Vulnerability scanning.
Penetration Testing.
Maintaining an asset inventory.
Using command line tools.
QUESTION 13
Attackers attempt a DoS attack on servers in your organization. The CIRT responds and mitigates the attack. What should be the last step that the CIRT will complete in response to this incident?
Document the Incident.
Contain the threat.
Report the Incident.
Attack the attacker.
QUESTION 14
You are performing a cost-benefit analysis. You want to determine if a countermeasure should be used.
Which of the following formulas should you apply?
Projected benefits – Cost of countermeasure
Loss before countermeasure – Loss after countermeasure
Loss after countermeasure – Loss before countermeasure
Cost of countermeasure – Projected benefits
QUESTION 15
A business impact analysis (BIA) includes a maximum allowable outage (MAO). The MAO is used to determine the amount of time in which a system must be recovered. What term is used in the DRP instead of the MAO?
Recovery action item (RAI)
Recovery time objective (RTO)
Critical business function (CBF)
DRP action item (DRPAI)
QUESTION 16
What determines if an organization is governed by HIPAA?
If employees handle health-related information
If it is a federal agency
If it receives E-Rate funding
It it is registered with the Securities and Exchange commission
QUESTION 17
A major disruption has forced you to move operations to an alternate location. The disruption is over and you need to begin normalizing operations. You have rebuilt several servers at the primary location. What should you do?
Test the servers for three to five days before bringing them online.
Bring the servers online and turn off the alternate location servers.
Run the servers concurrently with the alternate location for three to five days.
Test the servers and then turn off the servers at the alternate location.
QUESTION 18
Mission-critical business functions are considered vital to an organization. What are they derived from?
Executive leadership
Critical success factors
Employees
Critical IT resources
QUESTION 19
Logon identifiers help ensure that users cannot deny taking a specific action such as deleting a file. What is that called?
Non-repudiation
PKI
Encryption
Digital signature
QUESTION 20
What can you use to determine the priority of countermeasures?
Best guess method
Disaster recovery plan
Threat/vulnerability matrix
Cost-benefit analysis
QUESTION 21
Which three elements of the current threat landscapes have provided increased levels of access and connectivity, and therefore increased opportunities for cybercrime?
Text messaging, Bluetooth technology and SIM cards
Web applications, botnets and primary malware
Financial gains, intellectual property and politics
Cloud computing, social media and mobile computing
QUESTION 22
You are considering an alternate location for a DRP You want to use a business location that is already running non-critical business functions as the alternate location. This location has most of the equipment needed. What type of site is this?
Hot site
Warm site
DRP site
Cold site
QUESTION 23
What management program can be implemented to ensure that the configuration of systems is not modified without formal approval?
Change management
Configuration management
Process analysis
GAP analysis
QUESTION 24
After an incident has been verified, you need to ensure that it doesn’t spread to other systems. What is this called?
Containment
Incident response
Spread avoidance
Impact and priority calculation
QUESTION 25
The number and types of layers needed for defense in depth are a function of:
Asset value, criticality, reliability of each control and degree of exposure.
Threat agents, governance, compliance and mobile device policy.
Network configuration, navigation controls, user interface and VPN traffic.
Isolation, segmentation, internal controls and external controls.
QUESTION 26
What can you do to show that the BCP will work as planned?
BCP exercises
BCP testing
BCP training
BCP planning
QUESTION 27
What type of approach does a BIA use?
Best-guess approach
Top-down approach where CBFs are examined first
Middle-tier approach
Bottom-up approach where servers or services are examined first
QUESTION 28
In an attack, the container that delivers the exploit to the target is called what?
Attack vector
Malware
Payload
Rootkit
00JohnJohn2019-06-24 10:41:092019-06-24 10:41:11What is a common drawback or weakness of a vulnerability scanner?
What would be the best description of polymorphism.
A java object that can be attached to or refer to more than one class.
An object that refers to its parent.
An object that refers to itself.
Downcasting.
5 points
QUESTION 3
Java Swing classes allow for text components to be read only via what method?
setReadOnly()
setEditable()
setEditOnly()
setTextReadOnly()
5 points
QUESTION 4
A constructor is a special kind of method within a class having the following features:
1) the name of the method is the same as the class name
2) it does not have any return type not even void
3) like other methods, constructors can also be overloaded
Choose the correct assumption(s) from the listing above.
Only assumption 1 is correct.
Assumptions 1 & 2 are correct
None are correct.
All assumptions are good.
5 points
QUESTION 5
When creating a jar file (for executing a java program for a user) you can only choose one file in your package that has main().
True
False
5 points
QUESTION 6
Which of the following is true about protected access?
Protected members cannot be accessed by methods in any other classes.
Protected members may be accessed by methods in the same package or in a subclass, but only if the subclass is in the same package.
Protected members may be accessed by methods in the same package or in a subclass, even when the subclass is in a different package.
Protected members are actually named constants.
5 points
QUESTION 7
In the following code, System.out.println(num), is an example of ________.
double num = 5.4;
System.out.println(num);
num = 0.0;
A value-returning method
A local variable
A complex method
A void method
5 points
QUESTION 8
A column in one table that references a primary key in another table is known as what?
referential key
secondary key
foreign key
meta data
5 points
QUESTION 9
Which is not a solid example of encapsulation?
A Car class having a has-a relation with class Parts
Taking for granted a wikipedia definition
A washing machine and its use of a power Button
java.util.Hashtable
5 points
QUESTION 10
Given the depiction below, the relation of Song to Artist is one to one.
True
False
5 points
QUESTION 11
To convert the double variable, d = 543.98, to a string, use the following statement.
String str = Double.toString(d);
String str = d.Double.toString(str);
String str = double.toString(d);
String str = double(d);
5 points
QUESTION 12
An abstract class is not instantiated, but serves as a superclass for other classes.
True
False
5 points
QUESTION 13
For an optimal OOD design it is best to have
classes that are tightly coupled with high cohesion
classes that are loosely coupled with low cohesion
classes that are tightly coupled with low cohesion
classes that are loosely coupled with high cohesion
5 points
QUESTION 14
A search algorithm
Arranges elements in ascending order
Arranges elements in descending order
Is a way to locate a specific item in a larger collection of data
Is rarely used with arrays
5 points
QUESTION 15
In an interface all methods have
private access
public access
protected access
packaged access
5 points
QUESTION 16
Given the generic method below, what data types can be passed in?
public static
void displayArray(E[ ] array) {
for (E element : array)
::
}
any data type
any reference type
any data type that is a sub class of Number
any type that a super class of Number
5 points
QUESTION 17
The following statement creates an ArrayList object. What is the purpose of the notation?
ArrayList arr = new ArrayList<>();
It specifies that everything stored in the ArrayList object will be converted to a String
It specifies that only String objects may be stored in the ArrayList object
Nothing as the statement is invalid.
It specifies that the get method will return only String objects
5 points
QUESTION 18
The String[] args parameter in the main method header allows the program to receive arguments from the operating system command-line.
True
False
5 points
QUESTION 19
In a class hierarchy
the more general classes are toward the left of the tree and the more specialized are toward the right
the more general classes are toward the bottom of the tree and the more specialized are toward the top
the more general classes are toward the top of the tree and the more specialized are toward the bottom
the more general classes are toward the right of the tree and the more specialized are toward the left
5 points
QUESTION 20
Which of the following correctly tests the char variable chr to determine whether it is not equal to the character B?
if (chr < ‘B’)
if (chr != “B”)
if (chr != ‘B’)
if (chr > ‘B’)
5 points
QUESTION 21
The three major categories of Java collections are
tree sets, list sets, and hash maps
lists, sets, and maps
hash lists, hash tables, and sets
sets, collections, and maps
5 points
QUESTION 22
Given that String[] str has been initialized, to get a copy of str[0] with all characters converted to upper case, use the following statement
str.uppercase();
str[0].toUpperCase();
str.toUpperCase();
str[0].upperCase();
5 points
QUESTION 23
What would be the results of the following code?
final int SIZE = 25; int[] array1 = new int[SIZE];
… // Code that will put values in array1
int value = 0; for (int a = 0; a <= array1.length; a++) { value += array1[a]; }
value contains the lowest value in array1
value contains the sum of all the values in array1
value contains the highest value in array1
This would cause the program to crash.
5 points
QUESTION 24
What is the value of str after the following code has been executed?
String str; String sourceStr = “Hey diddle, diddle, the cat and the fiddle”; str = sourceStr.substring(12,17);
Iddle
diddl
diddle
, didd
5 points
QUESTION 25
If a subclass constructor does not explicitly call a superclass constructor,
The superclass fields will be set to the default values for their data types
It must include the code necessary to initialize the superclass fields
Java will automatically call the superclass’s default constructor just before the code in the subclass’s constructor executes
Java will automatically call the superclass’s default constructor immediately after the code in the subclass’s constructor executes
5 points
QUESTION 26
What term refers to data that describes other data?
meta data
pseudo-data
micro data
abstract data
5 points
QUESTION 27
If a class contains an abstract method,
The method must be overridden in subclasses
You cannot create an instance of the class
The method will have only a header, but not a body, and end with a semicolon
All of the above
5 points
QUESTION 28
In the following code, System.out.println(num), is an example of ________.
double num = 5.4;
System.out.println(num);
num = 0.0;
A value-returning method
A local variable
A complex method
A void method
5 points
QUESTION 29
In the realm of JDBC use of PreparedStatements help prevent what?
SQL Injection
increased threads
does not prevent anything, just executes insert statements like JDBC statements do
execution of stored procedures
5 points
QUESTION 30
If a subclass constructor does not explicitly call a superclass constructor,
It must include the code necessary to initialize the superclass fields
The superclass fields will be set to the default values for their data types
Java will automatically call the superclass’s default constructor just before the code in the subclass’s constructor executes
Java will automatically call the superclass’s default constructor immediately after the code in the subclass’s constructor executes
5 points
QUESTION 31
Given:
public class MyPancake implements Pancake {
public static void main(String[] args) {
List x = new ArrayList();
x.add(“3”); x.add(“7”); x.add(“5”);
List y = new MyPancake().doStuff(x);
y.add(“1”);
System.out.println(x);
}
List doStuff(List z) {
z.add(“9”);
return z;
}
}
interface Pancake {
List doStuff(List s);
}
What is the most likely result?
An exception is thrown at runtime
Compilation fails
[3, 7, 5, 9, 1]
[3, 7, 5]
[3, 7, 5, 9]
5 points
QUESTION 32
Assume q passed into the function below is: q={10,9,8,7,6,5,4,3,2,1}
What would be the resulting stack (st) at the line below with the comment labeled //1.____
public Queue interChanger(Queue q){ Stack st = new Stack();
int size = q.size()/2; for(int i = 1; i <= size; i++){
st.push(q.remove()); //1. ____________
}
while(!st.isEmpty()){
q.add(st.pop()); //2. ____________
}
for(int i = 1; i <= size; i++){
q.add(q.remove()); //3. ____________
}
for(int i = 1; i <= size; i++){
st.push(q.remove()); //4. ____________
}
while(!st.isEmpty()){
q.add(st.pop());
q.add(q.remove()); //5. ____________
}
return q;
}
12345
54321
678910
109876
5 points
QUESTION 33
A major problem when classes are tightly coupled may be when what occurs?
When functions using local variables change the variables unexpectedly
When global variables that are in use and cause havoc perhaps upon any changes to them
When the constructor of a class no longer can rely on changes to the class variablesupon instantiation being unchanged
Tightly coupled classes are actually very beneficial and recommended to be coded in that fashion.
5 points
QUESTION 34
As a programmer we should try to
balance between tightly and loosely coupled classes.
minimize the use of coupling relations of classes
maximize the use of any coupling relations of classes
only allow tight coupling when changes need to be made to classes for maintenance purposes.
5 points
QUESTION 35
Given the Regex expression:
^[a-z0-9_-]{3,15}
and a string to compare against the expression such as
tom-thumbtomthumb
a match would be
tom
tom-
tom-thumbtomthu
tom-thumbtomthumb
5 points
QUESTION 36
What would be the results of executing the following code?
StringBuilder str = new StringBuilder(12); str.append(“The cow”); str.append(” jumped over the “); str.append(“moon.”);
variable str would equal “The cow jump”
variable str would equal “The cow jumped over the”
variable str would equal “The cow jumped over the moon.”
The program would crash.
5 points
QUESTION 37
Given the ages for object creations for class AgeGroups as 33,22,44,55 respectively, what would the following Comparator declaration return for each age outcome order?
Collections.sort(listDevs, new Comparator() {
@Override
public int compare(AgeGroups o1, AgeGroups o2) {
return -o1.getAge() ;
}
});
33,22,44,55
55,44,22,33
22,33,44,55
order would be random
5 points
QUESTION 38
An abstract class cannot be instantiated primarily because
any of the class attributes cannot be modified
subclasses should only be allowed to implement the desired behaviors associated with the abstract class its inheriting from
methods may choose to be overriding any behaviors that may be declared abstract by the inherited abstract class
too much memory would be allocated for both the super (abstract) class and any of its decendents.
5 points
QUESTION 39
In the following code, assume that inputFile references a Scanner object that has been successfully used to open a file: