Get help from the best in academic writing.

Please ANSWER THE FOLLOWING TWO QUESTIONS, PLEASE remember NOT to copy, IF you can’T WATCH THE WHOLE movie, you

Please ANSWER THE FOLLOWING TWO QUESTIONS, PLEASE remember NOT to copy, IF you can’T WATCH THE WHOLE movie, you can WATCH THE FILM reviews, but you MUST WRITE FROM THE content of the specified MOVIE!! Please complete this article explicitly as required. Two paragraphs each. Please let me know if you have any questions. If time permits, I still suggest you watch these movies

1. The three films we watched in class are about seeing Africa and Africans in a certain way. King Solomon’s Mines (KSM), Out of Africa (OA), and Blood Diamond (BD) provide problematic portrayals of Africa and Africans. What do you think those problems are? Identify and provide a supporting example from each film for three problematic portrayals that are found in all three films. For each film identify a unique problem with its portrayal of Africa or Africans and provide an example to support your argument. (Two paragraphs)

2. “Africa in Cinema” is a course where students learn about Africa through film. KSM is set in the 1870s or 1880s just before the Scramble for Africa when European colonial powers divided up the entire African continent for colonial occupation. OA depicts events in colonial Kenya just before World War I up into the 1930s. BD is set in post-colonial Sierra Leone during its civil war in the 1990s. Which film does the best job of teaching its viewers about the historical epoch in which it is set? Make sure to explain why? Which film does the worst job depicting the historical epoch in which it is set? (Two paragraphs)

Question 1 (5 points) A patient who has hypoglycemia can have common

Question 1 (5 points)

 

A patient who has hypoglycemia can have common symptoms that include

Question 1 options:

a) 

a cough.

b) 

lymphedema.

c) 

dry palms.

d) 

nervousness.

Question 2 (5 points)

 

Oxygen passes through capillary walls and into the interstitial space, where cells absorb

Question 2 options:

a) 

nitrogen.

b) 

metabolic waste.

c) 

carbon dioxide.

d) 

oxygen.

Question 3 (5 points)

 

A patient treated for a severe allergy-associated airway obstruction can use ______ as an emergency drug.

Question 3 options:

a) 

epinephrine

b) 

Cipro

c) 

piperacillin

d) 

Keflex

Question 4 (5 points)

 

The lower respiratory system includes the

Question 4 options:

a) 

larynx.

b) 

pharynx.

c) 

esophagus.

d) 

lungs.

Question 5 (5 points)

 

Luteinizing hormones stimulate the

Question 5 options:

a) 

gonads to develop.

b) 

production of gametes.

c) 

ovaries to secrete estrogen.

d) 

secretion of sex hormones.

Question 6 (5 points)

 

_______ are medications typically used to relieve excessive mucus in nasal pathways.

Question 6 options:

a) 

Radioactive isotopes

b) 

Decongestants

c) 

Expectorants

d) 

Antibiotics and anti-inflammatories

Question 7 (5 points)

 

_______ stimulate(s) milk production after childbirth.

Question 7 options:

a) 

MSH

b) 

Prolactin

c) 

Luteinizing hormones

d) 

Follicle-stimulating hormones

Question 8 (5 points)

 

The respiratory system includes the

Question 8 options:

a) 

intestines.

b) 

liver.

c) 

pharynx.

d) 

pituitary gland.

Question 9 (5 points)

 

_______ is a commonly used oral medication for type 2 diabetes.

Question 9 options:

a) 

Metformin

b) 

Methimazole

c) 

Levothyroxine

d) 

Aspirin

Question 10 (5 points)

 

_______ is used to treat hyperthyroidism.

Question 10 options:

a) 

Metformin

b) 

Glipizide

c) 

Levothyroxine

d) 

Methimazole

Question 11 (5 points)

 

Choose all options that apply.

Which of the following are treatments for symptoms of the common cold?

Question 11 options:

a) 

Zinc

b) 

Vitamin E

c) 

Vitamin C

d) 

Eucalyptus

Question 12 (5 points)

 

Match the generic version of each of the following antibiotics used to treat pneumonia to its correct brand name.

Question 12 options:

1234

Moxifloxacin

1234

Cefdinir

1234

Doxycycline

1234

Vancomycin

1.

Omnicef

2.

Avelox

3.

Minocin

4.

Vancocin

Question 13 (5 points)

 

Match each of the following medications with what it’s typically used for.

Question 13 options:

1234

Pseudoephedrine (Sudafed)

1234

Acetaminophen (Tylenol)

1234

Loratadine (Claritin)

1234

Benzonatate (Tessalon)

1.

Used to dry excessive mucus and open up the nasal passageway

2.

Used to treat symptoms such as runny nose, sneezing, and sore throat

3.

Used to suppress the urge to cough

4.

Used to treat symptoms of body pain, lethargy, and fever

Question 14 (5 points)

 

Choose all options that apply.

Which of the following are commonly used oral medications for treating type 2 diabetes?

Question 14 options:

a) 

Lantus

b) 

Actos

c) 

Starlix

d) 

Prandin

e) 

Novolog

Question 15 (5 points)

 

Choose all options that apply.

Common symptoms of hyperthyroidism include

Question 15 options:

a) 

Palpitations

b) 

Mental and physical sluggishness

c) 

Tremors or shakiness

d) 

Insomnia

e) 

Obesity

Question 16 (5 points)

 

Choose all options that apply.

Which of the following are types of insulin?

Question 16 options:

a) 

Micronase

b) 

Humalog 70/30

c) 

Humulin R

d) 

Novolin N

e) 

Amaryl

Question 17 (5 points)

 

Choose all options that apply.

Which of the following corticosteroids are available in oral/injectable forms?

Question 17 options:

a) 

Mometasone

b) 

Prednisone

c) 

Budesonide

d) 

Dexamethasone

Question 18 (5 points)

 

Match each of the following brand name cough medications with its correct generic name.

Question 18 options:

1234

Delsym

1234

Robitussin

1234

Tessalon

1234

Phenergan

1.

Dextromethorphan

2.

Guaifenesin

3.

Benzonatate

4.

Promethazine

Question 19 (5 points)

 

Choose all options that apply.

The main drugs used to treat bronchoconstriction include

Question 19 options:

a) 

Tiotropium

b) 

Linezolid

c) 

Cholinergic antagonists

d) 

β-agonists

e) 

Inhaled corticosteroids

Question 20 (5 points)

 

Match each of the following generic antihistamines with its correct brand name.

Question 20 options:

1234

Cetirizine

1234

Diphenhydramine

1234

Hydroxyzine

1234

Desloratadine

1.

Vistaril

2.

Benadryl

3.

Clarinex

4.

Zyrtec

1 Dennis The characteristics that make data research analysis in healthcare a

Please ANSWER THE FOLLOWING TWO QUESTIONS, PLEASE remember NOT to copy, IF you can’T WATCH THE WHOLE movie, you Religion and Theology Assignment Help 1

Dennis

The characteristics that make data research analysis in healthcare a separate industry is its involvement of gathering and interpreting data with the objective to improve population health, health services, health policies in government and organizational policies in healthcare institutions. (University of Maryland Global Campus, n.d.). Health service research incorporates scientific investigation that studies various factors that affect local population health, access to healthcare, and cost/quality of healthcare. These factors are local population demographics, financing systems, health technologies and personal behavior. (University of Maryland Global Campus, n.d.).  According to Health Informatics (2021), the use of health data analytics allows for improvements to patient care, preventive measures, faster and more accurate diagnosis.

Through the healthcare data analysis conducted by the health research industry, healthcare researchers can aid policy makers to make informed decisions. For example, policy makers may want to bring a change in a rising issue such as obesity in young adults. Therefore, they may ask health researchers how to reduce the prevalence of obesity? Healthcare researchers can conduct research to examine health data in the population by age groups and identify key trends that affect diet. As a result, policy makers can start, expand, or modify nutritional programs. Another application where healthcare data analysis can be used is in detecting anomalies in scans. According to Cote (2021) in 2018, researchers at the Massachusetts Institute of Technology created an algorithm that detects differences between 3D medical images, such as MRI scans. The algorithm’s ability to learn based on data it’s previously received; it can identify differences in scans more than one thousand times faster than a human doctor. The industry of healthcare data analysis research plays a vital role in improving health programs and support decision-making at both the patient and business level.

References

Cote, C. (2021, February 18). 3 applications of data analytics in Healthcare. Business Insights Blog. Retrieved August 12, 2022, from https://online.hbs.edu/blog/post/data-analytics-in-healthcare

Health Informatics. (2021, January 13). The role of data analytics in Health Care. School of Health and Rehabilitation Sciences Online – University of Pittsburgh. Retrieved August 12, 2022, from https://online.shrs.pitt.edu/blog/data-analytics-in-health-care/

University of Maryland Global Campus. (n.d.). Introduction in HMGT 400 research data analysis. Document posted in UMGC HMGT 400 6380 online classroom, archived at https://learn.umgc.edu

Reply to Thread

Rhonda

Name a few characteristics making data research and analysis in healthcare a separate industry. Think holistically and consider scientific, policy and social impact sides.

 The important characteristics of big data in healthcare research and analysis are: Volume, Value, Variety, Veracity and Velocity.  These characteristics help to separate Healthcare research into its own separate industry.  The following are examples of how these characteristics are used:

Electronic Health Records are examples of how big data is used in Healthcare

Real-time alerts, i.e., test results,

Patient outcomes that can help to show trends to develop better treatment plans, or help to predict at risk patients, quality improvement

Staffing models and operational budgets

Strategic planning

Product development

Fraud and Abuse tracking and trending

Big data is being used today for insight to help with informed decision making about diagnoses and treatment plans, help with preventative care, etc.  This research helps to improve can help improve efficiency of healthcare being provided to the organization’s patients.  This process also helps to build a stronger relationship between the patient and their healthcare providers. (Lenz, 2017)

 2. Explain how processed and analyzed data is used in healthcare.  Offer a minimum of 2 examples where the data analysis supports health service delivery decision making.

 

There are currently many sources being used to gather healthcare data and analytics for the delivery of care to patients.  Some of the ways data analysis helps to support the delivery of care and decision making are as follows:

Patient online portals

Electronic Health Records

Wearable devices, such as heart monitors, etc.

Research studies being offered for different diagnoses and treatment

Data is gathered in many different formats, sizes, etc.  The main point in data being collected and used for improvement is to ensure it is properly managed. With the proper technology, data being extracted can help in quality improvement through the Healthcare industry, which in turn improves the care of the patient.  When providers gather historical data on their patients, this helps them to build a patient profile and helps them to care of the needs of the patient’s.  Pulling data together on certain diagnoses can also help by looking at the data gathered and reviewing for trends in the data for the quality improvement process to work to the fullest extent. (Raghupathi, 2014)

References:

Raghupathi, W., & Raghupathi, V. (2014). Big data analytics in healthcare: promise and potential. Health information science and systems, 2, 3. https://doi.org/10.1186/2047-2501-2-3

Lenz, E. R. (2017). Introdiction to Measurement. In E. R. Lenz, Measurement in Nursing and Health Research (pp. 3-32). Springer Publishing Company.

3 REVIEW AND REVISION OF THE RISK ANALYSIS 1 Table of Contents

3

REVIEW AND REVISION OF THE RISK ANALYSIS 1

Table of Contents

Executive Summary 4

Proposed Solutions 5

Encryption and data backups 5

Employee education 6

System audits 6

Limiting admin rights 6

Restricting the amount of information accessed by employees 7

Advanced technology 7

Goals 7

Action steps 7

Protocols 8

Resources 8

References 9

Executive Summary

Technology advancements have brought about enormous benefits to organizations. However, technological developments have also brought about some challenges to organizations. Cyber-attacks are a severe concern to organizations as they expose the network systems to attacks that can harm the organization’s data and reputation and lead to financial losses. An organization is exposed to various cyber-attacks, including phishing, malware attacks, the man in middle attacks, denial of service attacks, and SQL injections.

The risk analysis and management plan recommended by the team offered good strategies that could help guard the organization’s network systems against cyber-attacks and unauthorized access. However, with the advancements in technology, the proposed measures could, with time, be exposed to the risk, allowing the cyber attackers to bypass the security measures proposed by the team and access the organization’s network systems. Therefore, it is for this reason that a company must keep its security measures updated and occasionally reviewed to check for any security gaps in the network system that may require filling. The proposed risk management plan had various weaknesses that could expose the organization’s network systems to cyber-attacks. However, these weaknesses can be mitigated, thus leading to the effectiveness of the proposed measures.

For instance, to ensure that encryption is effective in guarding the organization’s computer software, the organization would have to encrypt in layers, exercise proper encryption, secure encryption keys and use new encryption ciphers. Moreover, data backup can be enhanced by using different backup locations, limiting access to backup data, and protecting backup media devices. In addition, educating the employees on cyber-attacks regularly will help keep them up to date with the latest measures and techniques that cyber attackers may try to use in conducting cyber-attacks. This will help the organization to guard itself against the risk of unauthorized access.

Also, regular system audits will help to deter cyber attackers. To enhance the effectiveness of regular system audits, experienced personnel should be tasked with system audits to help discover emerging security gaps in the system and recommend their filling to the organization’s management so as not to expose the organization’s systems to cyber-attacks. Restricting the rights of the admin will also be beneficial in reducing the risks of cyber-attacks. This can be done by ensuring a default setting in the organization’s systems that automatically removes the admin rights. Another important measure that will ensure the security of the organization’s systems is limiting the access rights of the staff to ensure that employees only access the necessary information. Finally, acquiring advanced technology will promote the security of the organization’s computer systems. Keeping the organization’s technology updated reduces the security gaps in the organization’s systems, thus ensuring the security of the organization’s systems is adequate.

Proposed Solutions 

           Several solutions can be implemented to overcome the weaknesses highlighted in the proposed security measures.

Encryption and data backups

           The weaknesses in the encryption and data backup strategies can be improved through the following measures:

Encrypt in layers

Exercise proper implementation of encryption

Secure encryption keys 

Ensure use of new encryption ciphers

Use different backup locations

Limit access to backup data

Protect backup media devices

Employee education

           The weakness of employee education is that the threats are constantly evolving, and attackers will always devise new methods, tools, and techniques for use in their attempts to get past an organization’s security measures. However, this weakness can be mitigated by regularly training and educating the employees on the advancement in cyber-attacks and how to overcome new threats (Conteh & Schmick, 2016).

System audits

           System audits should be done regularly. A complete system audit by experienced experts will help unearth any security gaps in the organization’s systems that may arise due to the sophistication and evolvement of cyber-attackers strategies.

Limiting admin rights

           Unrestricted admin rights can increase the risks of unauthorized access. It is, therefore, essential to control the admin’s rights by ensuring the system is set to default setting to remove the admin’s rights automatically. Limiting admin rights can lead to low morale. However, educating the admin on the benefit of limiting their rights can help overcome the risk of low morale and mistrust by letting them understand that the measure is aimed at the organization’s best interest (Ahanger & Aljumah, 2018).

Restricting the amount of information accessed by employees

           Employees need only to access the information they require. Access to information that is not necessary to the employees may increase the chances of unauthorized access and data leaks. Letting the employees know the limit of the data they can access in advance will help reduce the risk of developing a sense of mistrust within the organization.

Advanced technology

           Advanced technology reduces the security gaps in the organization’s network systems. The organization’s management should ensure that their organizations have the latest technologies to promote the security of their network systems. 

Goals

           The above-proposed solutions are aimed at promoting the security of the organization’s network systems. The implementation of the above proposals will reduce the chances of cyber-attacks, thus ensuring the effectiveness of the organization’s computer systems for an effective and efficient running of the organization’s processes.

Action steps

           The following actions can be implemented to promote the effective implementation of the above proposals:

Conduct workshops for employee pieces training on cyber security

Hiring experienced experts for conducting system audits

Replacing admin rights with the principle of at least privilege

Require authorization for the employee to access various categories of information

Allocate funds for acquiring and updating the organization’s computer technology

Protocols

           The following network security protocols can be used to promote the security of an organization’s computer systems:

IPsec and VPNs

SSL and TLS

Application Transparent Transport Layer Security

Kerberos

OSPF authentication

SNMPv3.

Resources

To ensure there is security of the organization’s system, the following resources are necessary:

Trained staff

Advanced computer technology

Installed firewall performance

Advanced endpoint detection

Updated passwords

Virtual private networks

References

Ahanger, T. A., & Aljumah, A. (2018, 11 01). Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms. Retrieved 04 09, 2022, from IEEE Xplore: https://doi.org/10.1109/ACCESS.2018.2876939

Conteh, N. Y., & Schmick, P. J. (2016). Cybersecurity:risks, vulnerabilities and countermeasures to prevent social. International Journal of Advanced Computer Research, 31-36.