Data Analytics

 

Prior to beginning work on this discussion forum, review the Domain 3: Data Analytics review questions in your Registered Health Information Administrator (RHIA) Exam Preparation textbook, and review Chapters 15 through 19 from your Health Information Management: Concepts, Principles, and Practice Every week you are reviewing different RHIA domains. During the weekly discussion, you will be expected to review the RHIA practice questions for the respective domain being covered. The weekly discussions will provide an opportunity for you to ask questions about the practice questions, concepts, definitions, or review of the weekly domain.
Domain 3: Data Analytics and Informatics makes up 24% of the RHIA exam. The following knowledge is covered in this week’s domain review:
• Develop productivity reports.
• Prepare to support end user in EHR applications.
• Apply knowledge necessary to create visual representation of data for decision-making.
• Provide summary reports based on trends.
• Apply the knowledge necessary to optimize health information technology to improve workflow.
• Support health information exchange solutions.
• Examine clinical, administrative, and specialty service applications.
• Validate healthcare statistics for organizational stakeholders.

How can health information technology be optimized to improve workflow in healthcare settings?

 

Recruitment and hiring of law enforcement officers.

 

 

focus on the recruitment and hiring of law enforcement officers. Choose three of the areas below and provide your main post on the issues at hand. I

What are some of the current challenges in recruiting candidates for a law enforcement career?

What can agencies do to attract suitable candidates?

How can law enforcement agencies recruit candidates in order to provide a diverse department that is more reflective of the community it serves?

Provides some pros and cons of requiring law enforcement officers to have a college degree

Intelligence Test Measure

 

Choose one of the following topics below and address the corresponding questions.Option #1 – Intelligence Test
Base your answers on your observations about the intelligence test you took in the Unit Readings and Activities.

Were the concepts of fluid and/or crystallized intelligence demonstrated through the test you took? Why or why not? Provide examples from the test itself in support of your response.
Did the test measure practical and/or emotional intelligence? If so, how? If not, how did it not measure practical and/or emotional intelligence? Provide examples from the test in support of your response.
Was the test accurate in measuring intelligence, according to Binet? If so, how? If not, how was it not accurate? Provide examples from the test to support your answer.
How might this test have been culturally biased? Conversely, do you feel that it was culture fair? Provide examples from the test that support your perspective.

Multiple Intelligences

What is meant by Multiple Intelligences?
Take the Multiple Intelligence Inventory and determine which intelligences you score “high” on and which you score “low” on. Are the results consistent with your perception of yourself? Why or why not?
Do you feel the test was culturally fair? Explain.
What applications do the theory of Multiple Intelligences have in educational settings?
Be sure to provide the URL link(s) and/or title(s) to any resource used as reference in your post.

 

Design 3-5 activities to engage students in active learning.

 

 

 

 

Step 1. Design a case study to support a selected topic in your field.
• Set the stage for learning about the topic.
• Establish a “big problem scenario.”
• Read examples of case studies available from the National Center for Case Study Teaching in Science, from: http://sciencecases.lib.buffalo.eduLinks to an external site.
• Additional ideas available – Vanderbilt University, Center for Teaching, from: https://cft.vanderbilt.edu/guides-sub-pages/case-studies/Links to an external site.
• Additional ideals available – Carnegie Mellon University, from: https://www.cmu.edu/teaching/designteach/teach/instructionalstrategies/casestudies.htmlLinks to an external site.
Step 2. Identify the outcomes.
• Using standards and curriculum objectives, determine 3-5 outcomes, including one for content, one for a specific reading skill, and one for thinking.
Step 3. Design activities.
• Using the case study as the focus, design 3-5 activities to engage students in active learning. One should have assessment possibilities. For example: Learners scan the case study to identify unique nouns. Place the nouns into groups because they are alike in some way. Label the group.

 

The hospital has decided to build an oncology unit

 

The hospital has decided to build an oncology unit, and you are asked to view the planning strategy for the site. As with any business, one must assess the overall strengths, weaknesses, opportunities, and threats (SWOT) of the location and the business processes. Therefore, you will lead the discussion on some of the problems that they might incur. Complete the following:

Define which data sources they might consider using.
Select the data mining techniques that could be used.
Interpret and translate the mining results into an actionable business strategy.

 

 

Analyzing A Case

 

Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.

Based on the ‘Probable Cause of affidavit’ a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.

You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.

Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about “investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn’t any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:

What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it’s a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?

Data Analysis Discussion

 

Expanding on our discussion about the use of data analytics in retail, you are going to create a survey in the free version of Survey Monkey to gather data
related to some aspect of retail operation that would relate to one or more of the 3 core goals of big data learned this week. You are designing this survey so
that you can gather data, create a report and analyze the data you have gathered.
Clearly identify the the goal or goals you are using as the basis of your survey
Identify 2 objectives of what you want the survey to accomplish based on the goal(s) selected
Create a 7-10 questions survey related to the the objectives you have identified (be sure to identify which questions relate to which objectives)
Provide the link to your survey so others can take your survey
Discuss how the goal(s) related to your objectives and why you think the objectives you created would be important to management as they relate to one or
more of the core goals of big data. In your response, take at least one of your classmate’s survey, analyze the survey, and comment on how you feel their
survey meets the objectives they identified in their post