English to Spanish translation, foreign languages homework help Foreign Languages Assignment Help. English to Spanish translation, foreign languages homework help Foreign Languages Assignment Help.
br />
Can you put these two paragrahs into spanish ? No online translators allowed
Both my mom and dad prefer an apartment that is close to the mall and restaurants. They also want an apartment that is on the first floor. My father prefers a big apartment but my mother prefers a medium sized one. The ideal apartment for both my mom and dad would have 3 bed rooms, big kitchen, big closet, 2 bathrooms, and a patio. It would also cost about 700$ dollars a month. Also my mom would like white carpet in her apartment.
The ideal hotel for my mom and dad would contain a big bed, one bathroom, a nice view, and a television. It would also would be close to the mall and many restaurants. Both of them agree they would want the hotel room to be on the third floor. The ideal price for the hotel would be 90$ a day. Also it must be a clean hotel and have free breakfast in the morning. It does not have to be too big a medium room would be perfect.
English to Spanish translation, foreign languages homework help Foreign Languages Assignment Help[supanova_question]
Business intelligence Computer Science Assignment Help
Included with this assignment is an Excel spreadsheet that contains data with two dimension values.
The purpose of this assignment is to demonstrate steps performed in a K-Means Cluster analysis.
Review the “k-MEANS CLUSTERING ALGORITHM” section in Chapter 4 of the Sharda et. al. textbook for additional background.
Use Excel to perform the following data analysis.
- Plot the data on a scatter plot.
- Determine the ideal number of clusters.
- Choose random center points (centroids) for each cluster. (Note: Each student will select a different random set of centroids.)
- Using a standard distance formula measure the distance from each data point to each center point.
- Assign each data point to an initial cluster region based on closeness.
- For each cluster calculate new center points.
- Repeat steps 4 through 6 as a second pass.
- Repeat steps 4 through 6 as a third pass.
Provide final answers on your Excel spreadsheet indicating your initial center points, second pass center points, and third pass center points. You must submit your spreadsheet and these answers to receive full credit.
You will use Excel to help with calculations, but only standard functions should be used (i.e. don’t use a plug-in to perform the analysis for you.) You need to show your work doing this analysis the long way. If you were to repeat steps 4 through 6, what will likely happen with the cluster centroids?
Here is a link to an example spreadsheet using a smaller data set. It contains two tabs. The first tab is the raw data. The second tab contains the analysis that was performed. Make sure that you use a different starting center points from the example
NO PLAGIARISM, 3 CENTER POINTS,
[supanova_question]
Long-Term Assets Business Finance Assignment Help
Using the SEC 10-K for Tesla; NASDAQ; TSLA, answer the following questions:
1.Reading the notes to the financial statements, as well as the balance sheet, post information about the Accounts Receivable for your company. Who owes the company money?
2.Search for the phrase “Bad Debts” or Allowance (for collectible accounts). When you read the balance sheet, you may see that the receivables are listed as a net of $x,xxx to show the Allowance for Bad Debts. Comment about the changes in Accounts Receivable and the Allowance for Bad Debts. Are they increasing or decreasing? How does this relate to sales (are sales increasing or decreasing)?
3.Property, Plants, and Equipment / PPE (Capital Assets; Fixed Assets): Comment about PPE and accumulated depreciation. How are these values changing from year to year: PPE, Accumulated Depreciation, and Net PPE?
[supanova_question]
Journal 1: Thinking about thinking Humanities Assignment Help
Prompt for #1:
- Include a brief summary of all the texts that we engaged with for the week (Bunn, DasBender, Savini) Keep them brief; I want the bulk of your response to be reflective. Try to summarize each reading in a sentence or two, focusing on the main idea(s).
- Explain how these texts can help you as a “critical thinker” not just in the classroom, but in the world.
- Read the following quote by Carl Sagan, American astronomer, educator and author (and then answer the question that follows it): “It seems to me what is called for is an exquisite balance between two conflicting needs: the most skeptical scrutiny of all hypotheses that are served up to us and at the same time a great openness to new ideas. Obviously those two modes of thought are in some tension. But if you are able to exercise only one of these modes, whichever one it is, you’re in deep trouble. If you are only skeptical, then no new ideas make it through to you. You never learn anything new. You become a crotchety old person convinced that nonsense is ruling the world. (There is, of course, much data to support you.) But every now and then, maybe once in a hundred cases, a new idea turns out to be on the mark, valid and wonderful. If you are too much in the habit of being skeptical about everything, you are going to miss or resent it, and either way you will be standing in the way of understanding and progress. On the other hand, if you are open to the point of gullibility and have not an ounce of skeptical sense in you, then you cannot distinguish the useful as from the worthless ones.”
What is Sagan saying? How does it relate to the articles you have read this week?
Once you have finished and posted your response, please reply to two classmates. Make sure your comments to classmates have substance.
Online Discussion Requirements:
- Your post must be a minimum of 350 words. There is no word minimum on peer replies, but you must show that you have engaged with your peers’ responses and not simply said “I agree” or “Great post!” A substantial reply could be anywhere between 50 and 150 words. You are not required, but you are encouraged, to continue replying to one another throughout the weekend. Remember, this is the space for class conversation as we are not together in person. Conversation is where the opening up of perspective really happens.
- Ad Hominem attacks will not be tolerated. If you disagree with someone, critique the argument, not the person. And do it respectfully and constructively.
[supanova_question]
The Planning Process Business Finance Assignment Help
Purpose of Assignment
For this assignment, the student will identify and interview someone they know who is in a management role. This allows the student to integrate the experience of real world managers with their own insights into planning and strategy. The assignment also reinforces the importance of contingency planning.
Assignment Steps
Interview someone you know who is in a management role. This can be at your current place of employment or someone you know personally working in a managerial role. Ensure you attach the completed interview form with your assignment submission.
Prepare a 1,000-word discussion that is a narration (i.e. speaker notes) of what you have learned about 4 topic points below (bullets #1 – 4) and is based upon information gained from the interview. Ensure you attach the completed narration with your assignment submission. Record your narration in the form of an audio file. Discuss these 4 topic points in your audio file.
- Discuss what you discovered about contingency planning and when they may be required.
- Discuss how creativity and critical thinking relate to contingency planning.
- Explain how you might integrate creativity and critical thinking into your own planning process.
- Discuss what you learned about creativity and critical thinking and its relationship to the decision-making process.
NOTE: The narration is not you interviewing the manager nor you and the interviewee talking back and forth to each other in an audio file, it is you recording your narration (i.e. your speaking notes) based on conducting your interview with a manager and then responding to the 4 topic points that you address based on the applicable information from the interview.
Conduct an Internet search on, “How to create an audio file” to locate easy to follow tutorials. You may attach the audio file as its own attachment or you may embed the file into a MSWord document or single MSPowerPoint slide.
Under the Library Tab, go to The Center for Writing Excellence, Select Tutorials and Guides and under Samples you will see examples of papers, business memo, letters, etc. which are in APA style.
Format the assignment consistent with APA guidelines (as applicable to the narration and interview form).
[supanova_question]
[supanova_question]
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience. It should be at least two full, double spaced pages. Again, y Writing Assignment Help
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience.
It should be at least two full, double spaced pages. Again, you must include a photo of the program and a “Selfie” at the venue. You must include discussion of ALL of the music on the program in your paper.
The concerts take place at various locations on campus, the most frequent being the Temple Performing Arts Center (TPAC) on Broad St. and Rock Hall at Broad and Cecil B. Moore. Some jazz programs also take place in Presser Hall.
To access the Boyer College of Music schedule of events, go to: events.temple.edu/department/boyer-college-of-music-and-dance
FOR ALL CONCERT EVENTS, IT IS NECESSARY FOR YOU TO BRING YOUR TEMPLE ID IN ORDER TO GET STUDENT DISCOUNTS!
Allow plenty of time to get where you are going. Look up the locations of the venues on the internet before you go.
Do a little reading in advance about what you are going to hear. This is easily done via Google and Wikipedia. Also, the concerts all have detailed information in the programs. Try to get to your seat early enough to read the information in the program.
While people often dress up for concerts (it is a popular “date night” activity, after all), what you wear to the concert is NOT important. If you would like to use it as a special event to dress up, that might be fun, but you can go in the same clothes you wear to class. No one will be judging you!
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience. It should be at least two full, double spaced pages. Again, y Writing Assignment Help[supanova_question]
case study Writing Assignment Help
MN551-4: Evaluate the presence and effects of alteration in the homeostatic state secondary to gender, genetic, ethnic and temporal variables
Select one of the case studies below, and include in your discussion an evaluation of the presence and effects of alteration in the homeostatic state secondary to gender, genetic, ethnic, and temporal variables.
Requirements:
- Make sure all of the topics in the case study have been addressed.
- Cite at least three sources; journal articles, textbooks or evidenced-based websites to support the content.
- All sources must be within 5 years.
- Do not use .com, Wikipedia, or up-to-date, etc., for your sources.
Case Study 2
Respiratory Tract Infections, Neoplasms, and Childhood Disorders
Patricia was called at work by a woman at the local daycare center. She told Patricia to come and pick up her son because he was not feeling well. Her son, three-and-a-half-year-old Marshall, had been feeling tired and achy when he woke up. While at daycare, his cheeks had become red and he was warm to touch. He did not want to play with his friends, and by the time Patricia arrived, he was crying. Later that afternoon, Marshall’s condition worsened. He had fever, chills, a sore throat, runny nose, and a dry hacking cough. Suspecting Marshall had influenza, Patricia wrapped him up and took him to the community health care clinic.
- Why did Marshall’s presentation lead Patricia to think he had influenza and not a cold? Why is it important to medically evaluate and diagnose a potential influenza infection?
- Describe the pathophysiology of the influenza virus. Outline the properties of influenza A antigens that allow them to exert their effects in the host.
- Marshall may be at risk at contracting secondary bacterial pneumonia. Why is this so? Explain why cyanosis may be a feature associated with pneumonia.
Assignment Requirements:
Before finalizing your work, you should:
- Ensure you have written at least four double-spaced pages.
- be sure to read the Assignment description carefully (as displayed above);
- consult the Grading Rubric (under the Course Resources) to make sure you have included everything necessary; and
- utilize spelling and grammar check to minimize errors.
- follow the conventions of Standard American English (correct grammar, punctuation, etc.);
- be well ordered, logical, and unified, as well as original and insightful;
- display superior content, organization, style, and mechanics; and
- use APA 6th Edition format.
To see your assignment instructions and grading rubric, go to Course Resources / Grading Rubrics.
How to Submit:
[supanova_question]
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience. It should be at least two full, double spaced pages. Again, y Writing Assignment Help
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience.
It should be at least two full, double spaced pages. Again, you must include a photo of the program and a “Selfie” at the venue. You must include discussion of ALL of the music on the program in your paper.
The concerts take place at various locations on campus, the most frequent being the Temple Performing Arts Center (TPAC) on Broad St. and Rock Hall at Broad and Cecil B. Moore. Some jazz programs also take place in Presser Hall.
To access the Boyer College of Music schedule of events, go to: events.temple.edu/department/boyer-college-of-music-and-dance
FOR ALL CONCERT EVENTS, IT IS NECESSARY FOR YOU TO BRING YOUR TEMPLE ID IN ORDER TO GET STUDENT DISCOUNTS!
Allow plenty of time to get where you are going. Look up the locations of the venues on the internet before you go.
Do a little reading in advance about what you are going to hear. This is easily done via Google and Wikipedia. Also, the concerts all have detailed information in the programs. Try to get to your seat early enough to read the information in the program.
While people often dress up for concerts (it is a popular “date night” activity, after all), what you wear to the concert is NOT important. If you would like to use it as a special event to dress up, that might be fun, but you can go in the same clothes you wear to class. No one will be judging you!
[supanova_question]
Network Security Plan Outline Other Assignment Help
A manufacturing company is expanding its sales operation to include territory in the Northwestern United States (U.S.). The sales team will support customers in the states of Washington, Oregon, Alaska, Montana, Wyoming, and Idaho.
The new office will be located in Washington with five people regularly working in the office. An additional five will work from their homes in other states. The employees will need to access the company network from their home offices, the new office, and while traveling.
You have been contracted to develop the network security plan for the new sales office and team.
Prepare a network security plan outline.
Include the following in the outline:
- Identification of the key sections of the security plan
- Summary of what to include in each section
- Required hardware and related security software components
Document your plan in one of the following ways:
- A 1- to 2-page paper
- A 1- to 2-page diagram or flowchart with descriptive callouts
- A 7- to 10-slide presentation with detailed speaker notes
[supanova_question]
Easy Discussion Rpelies Writing Assignment Help
Must be a minimum of 100 words each, and contain useful and relevant content that ads to the conversation.
1) Chapter 8 Internet connection
The most common types of internet connections are DSL (Digital subscriber line), dialup, cable. satellite, wireless hotspots, and cell phone networks. Each one will provide the same initial service but may have differences in quality of signal and service interruption, which will depend on the company and your location. DSL is a broadband connection that comes through your phone line but still allows you to make calls while you’re connected to the internet. It uses fiber-optic cables and phone lines for transmission. With dialup you use a modem that connects to your service provider through your home phone. But you cannot make calls while connected to the internet. Connecting to the internet through your cable provider is another broadband connection. The speeds are pretty fast but you have to pay a monthly fee. In order to connect via satellite, a satellite dish has to be installed. Not all providers offer satellite connections. Wireless hotspots are connections that somebody else had made. A wireless device can pick up hotspots and allow you to connect to the internet free or for a fee. When connecting through your cellphone you are using your providers 3G or 4G network. This also will deplete your data and you will be charged if you go over and you don’t have an unlimited data plan.
2) Chapter 8: Keys to planning a network
Every network is going to be a little different, but some things to keep in mind as you plan your network are:
1. Get a map- Understand the layout of your space where you are installing the network. Draw a map of the office or see if you can get a map of the office. Add distances or a scale if possible so you can determine how far you will need to run cables or how many wireless access points you’ll need. Label Power locations and their capacity. Mark any possible hazards such as lights, pipes, bricks and any potential obsticals that may be in the way of you running cables.
2. Locate your server(s)- If you are installing a small network, you may not have to worry about this. But if you have a network with one or more dedicated servers, decide were they will be located. They need to be in a secured location where only authorized people will have access to them.
3. Identify where clients computers will be- If you are setting up an office in a cubicle farm, just assume one computer (or more, depending on the cubicle type) per cube. This will help you determine where you need shared network resources as well as cable placement.
4. Locate network resources- if your network users are going to share resources such as printers, where will they be located?
5. Determine how you are going to connect-If you are going to go all wireless, you can start figuring out how many wireless routers or access points you’ll need. If you are going to have wired connections, start determining how long the cable runs will be. Remember that UTP has a maximum segment distance of 100 meters. If you have to go up from a patch panel, into a ceiling, and down through a wall or conduit, take that into account too!
6. Designate additional connectivity areas if needed. If you are running cables and some systems are outside of your maximum cable length, you will need to install a repeater of some sort. The best choice is probably a switch, which repeats signals. If you have several hundred computers, though, and you want to separate out networks, then a router is the best choice. These connectivity locations can be just a small closet. Other times, if no space is available, some administrators will put the switch in the drop ceiling.
3) Chapter 6: Servers Reply to Class
Re:Why wouldn’t a non-dedicated server be preferred to rather than a dedicated server?
In my working experiences, there are justifications for each (nondedicated and dedicated) and it usually depends on the role, environment and configuration of the server and the amount of resources it will be supporting. For example, if the print/email server is a secured one that needs to be isolated and contained to meet security compliances that would be one common reason. Another one would be the workload of dedicated server is such that all of its resources are needed to primarily focus on its data transmission or work tasks/request and sharing it as a nondedicated server might require too much contention in sharing its resources. These are some real-world examples that have been the case with me.
4) Discussion Question: Wireless networking and Security Protocols
Research security protocols used for wireless networking; including WEP, WPA, and WPA2.
Describe the key characteristics of these protocols, including differences and similarities.
Post your findings to the discussion forum.
5) Discussion Question:Encryption Technologies
Research encryption technologies.
Determine which technologies work with the security protocols; WEP, WPA, and WPA2.
Post your findings to the discussion forum.
6) It Pro TV Secure: WPS
The IT pro guys covered Wifi protected set up or WPS and basically said don’t let the word “protected” fool you . On most devices there is a wps button either on the front or top of the equipment and pressing this button automatically signs the device on to the network. Also there is an 8 digit WPS pin number that can be manually entered like a pass phrase. The device does have to be WPS capable and usually when attempting to connect to a network there will be instructions to press the button. The option to sign in with the pass phrase is usually available on WPS capable devices. It’s not recommended for SOHO and corporate offices because its too easy to gain access to the network which essentially makes the network unsecured.
7) Lynda.com: Comp Tia Exam Prep Mac Address Filtering
ach Ethernet based node and Ethernet switch/bridge port has a globally unique unchangeable MAC address stored locally on the network interface card, or on the on-board network controller used in network switches or system boards with built-in Ethernet interfaces. And each NIC/controller also has a unique hardwired OUI-derived MAC address, commonly known as the burned in address (BIA) MAC. Even so, it is possible for a node to use a user-defined MAC address to mask the BIA address and take the BIA’s place as the MAC address used for sending and receiving Ethernet frames. So although the MAC is a pretty good bet to filter and track on, it’s not foolproof. However, if a system is compromised or if you have rouge system administrator on your hands, all bets are off.
Then of course, there are all of those “soft MACs.” These virtual MAC addresses are used by Layer 3 switch VLAN interfaces, by Hot Standby Router Protocol (HSRP) interfaces and by the various ether-channel NIC bonding and host availability schemes. (How else would nodes be able to forward packets to these interfaces?) While these “soft” addresses do not mask the BIAs, they do come up as part of the results of a network inventory and will be seen as active hosts on that network. The issue for auditors is that these “dual-identity” nodes now appear twice in the inventory. They are discovered, in both cases, with a different MAC and IP address.
[supanova_question]
https://anyessayhelp.com/
Can you put these two paragrahs into spanish ? No online translators allowed
Both my mom and dad prefer an apartment that is close to the mall and restaurants. They also want an apartment that is on the first floor. My father prefers a big apartment but my mother prefers a medium sized one. The ideal apartment for both my mom and dad would have 3 bed rooms, big kitchen, big closet, 2 bathrooms, and a patio. It would also cost about 700$ dollars a month. Also my mom would like white carpet in her apartment.
The ideal hotel for my mom and dad would contain a big bed, one bathroom, a nice view, and a television. It would also would be close to the mall and many restaurants. Both of them agree they would want the hotel room to be on the third floor. The ideal price for the hotel would be 90$ a day. Also it must be a clean hotel and have free breakfast in the morning. It does not have to be too big a medium room would be perfect.
English to Spanish translation, foreign languages homework help Foreign Languages Assignment Help[supanova_question]
Business intelligence Computer Science Assignment Help
Included with this assignment is an Excel spreadsheet that contains data with two dimension values.
The purpose of this assignment is to demonstrate steps performed in a K-Means Cluster analysis.
Review the “k-MEANS CLUSTERING ALGORITHM” section in Chapter 4 of the Sharda et. al. textbook for additional background.
Use Excel to perform the following data analysis.
- Plot the data on a scatter plot.
- Determine the ideal number of clusters.
- Choose random center points (centroids) for each cluster. (Note: Each student will select a different random set of centroids.)
- Using a standard distance formula measure the distance from each data point to each center point.
- Assign each data point to an initial cluster region based on closeness.
- For each cluster calculate new center points.
- Repeat steps 4 through 6 as a second pass.
- Repeat steps 4 through 6 as a third pass.
Provide final answers on your Excel spreadsheet indicating your initial center points, second pass center points, and third pass center points. You must submit your spreadsheet and these answers to receive full credit.
You will use Excel to help with calculations, but only standard functions should be used (i.e. don’t use a plug-in to perform the analysis for you.) You need to show your work doing this analysis the long way. If you were to repeat steps 4 through 6, what will likely happen with the cluster centroids?
Here is a link to an example spreadsheet using a smaller data set. It contains two tabs. The first tab is the raw data. The second tab contains the analysis that was performed. Make sure that you use a different starting center points from the example
NO PLAGIARISM, 3 CENTER POINTS,
[supanova_question]
Long-Term Assets Business Finance Assignment Help
Using the SEC 10-K for Tesla; NASDAQ; TSLA, answer the following questions:
1.Reading the notes to the financial statements, as well as the balance sheet, post information about the Accounts Receivable for your company. Who owes the company money?
2.Search for the phrase “Bad Debts” or Allowance (for collectible accounts). When you read the balance sheet, you may see that the receivables are listed as a net of $x,xxx to show the Allowance for Bad Debts. Comment about the changes in Accounts Receivable and the Allowance for Bad Debts. Are they increasing or decreasing? How does this relate to sales (are sales increasing or decreasing)?
3.Property, Plants, and Equipment / PPE (Capital Assets; Fixed Assets): Comment about PPE and accumulated depreciation. How are these values changing from year to year: PPE, Accumulated Depreciation, and Net PPE?
[supanova_question]
Journal 1: Thinking about thinking Humanities Assignment Help
Prompt for #1:
- Include a brief summary of all the texts that we engaged with for the week (Bunn, DasBender, Savini) Keep them brief; I want the bulk of your response to be reflective. Try to summarize each reading in a sentence or two, focusing on the main idea(s).
- Explain how these texts can help you as a “critical thinker” not just in the classroom, but in the world.
- Read the following quote by Carl Sagan, American astronomer, educator and author (and then answer the question that follows it): “It seems to me what is called for is an exquisite balance between two conflicting needs: the most skeptical scrutiny of all hypotheses that are served up to us and at the same time a great openness to new ideas. Obviously those two modes of thought are in some tension. But if you are able to exercise only one of these modes, whichever one it is, you’re in deep trouble. If you are only skeptical, then no new ideas make it through to you. You never learn anything new. You become a crotchety old person convinced that nonsense is ruling the world. (There is, of course, much data to support you.) But every now and then, maybe once in a hundred cases, a new idea turns out to be on the mark, valid and wonderful. If you are too much in the habit of being skeptical about everything, you are going to miss or resent it, and either way you will be standing in the way of understanding and progress. On the other hand, if you are open to the point of gullibility and have not an ounce of skeptical sense in you, then you cannot distinguish the useful as from the worthless ones.”
What is Sagan saying? How does it relate to the articles you have read this week?
Once you have finished and posted your response, please reply to two classmates. Make sure your comments to classmates have substance.
Online Discussion Requirements:
- Your post must be a minimum of 350 words. There is no word minimum on peer replies, but you must show that you have engaged with your peers’ responses and not simply said “I agree” or “Great post!” A substantial reply could be anywhere between 50 and 150 words. You are not required, but you are encouraged, to continue replying to one another throughout the weekend. Remember, this is the space for class conversation as we are not together in person. Conversation is where the opening up of perspective really happens.
- Ad Hominem attacks will not be tolerated. If you disagree with someone, critique the argument, not the person. And do it respectfully and constructively.
[supanova_question]
The Planning Process Business Finance Assignment Help
Purpose of Assignment
For this assignment, the student will identify and interview someone they know who is in a management role. This allows the student to integrate the experience of real world managers with their own insights into planning and strategy. The assignment also reinforces the importance of contingency planning.
Assignment Steps
Interview someone you know who is in a management role. This can be at your current place of employment or someone you know personally working in a managerial role. Ensure you attach the completed interview form with your assignment submission.
Prepare a 1,000-word discussion that is a narration (i.e. speaker notes) of what you have learned about 4 topic points below (bullets #1 – 4) and is based upon information gained from the interview. Ensure you attach the completed narration with your assignment submission. Record your narration in the form of an audio file. Discuss these 4 topic points in your audio file.
- Discuss what you discovered about contingency planning and when they may be required.
- Discuss how creativity and critical thinking relate to contingency planning.
- Explain how you might integrate creativity and critical thinking into your own planning process.
- Discuss what you learned about creativity and critical thinking and its relationship to the decision-making process.
NOTE: The narration is not you interviewing the manager nor you and the interviewee talking back and forth to each other in an audio file, it is you recording your narration (i.e. your speaking notes) based on conducting your interview with a manager and then responding to the 4 topic points that you address based on the applicable information from the interview.
Conduct an Internet search on, “How to create an audio file” to locate easy to follow tutorials. You may attach the audio file as its own attachment or you may embed the file into a MSWord document or single MSPowerPoint slide.
Under the Library Tab, go to The Center for Writing Excellence, Select Tutorials and Guides and under Samples you will see examples of papers, business memo, letters, etc. which are in APA style.
Format the assignment consistent with APA guidelines (as applicable to the narration and interview form).
[supanova_question]
[supanova_question]
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience. It should be at least two full, double spaced pages. Again, y Writing Assignment Help
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience.
It should be at least two full, double spaced pages. Again, you must include a photo of the program and a “Selfie” at the venue. You must include discussion of ALL of the music on the program in your paper.
The concerts take place at various locations on campus, the most frequent being the Temple Performing Arts Center (TPAC) on Broad St. and Rock Hall at Broad and Cecil B. Moore. Some jazz programs also take place in Presser Hall.
To access the Boyer College of Music schedule of events, go to: events.temple.edu/department/boyer-college-of-music-and-dance
FOR ALL CONCERT EVENTS, IT IS NECESSARY FOR YOU TO BRING YOUR TEMPLE ID IN ORDER TO GET STUDENT DISCOUNTS!
Allow plenty of time to get where you are going. Look up the locations of the venues on the internet before you go.
Do a little reading in advance about what you are going to hear. This is easily done via Google and Wikipedia. Also, the concerts all have detailed information in the programs. Try to get to your seat early enough to read the information in the program.
While people often dress up for concerts (it is a popular “date night” activity, after all), what you wear to the concert is NOT important. If you would like to use it as a special event to dress up, that might be fun, but you can go in the same clothes you wear to class. No one will be judging you!
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience. It should be at least two full, double spaced pages. Again, y Writing Assignment Help[supanova_question]
case study Writing Assignment Help
MN551-4: Evaluate the presence and effects of alteration in the homeostatic state secondary to gender, genetic, ethnic and temporal variables
Select one of the case studies below, and include in your discussion an evaluation of the presence and effects of alteration in the homeostatic state secondary to gender, genetic, ethnic, and temporal variables.
Requirements:
- Make sure all of the topics in the case study have been addressed.
- Cite at least three sources; journal articles, textbooks or evidenced-based websites to support the content.
- All sources must be within 5 years.
- Do not use .com, Wikipedia, or up-to-date, etc., for your sources.
Case Study 2
Respiratory Tract Infections, Neoplasms, and Childhood Disorders
Patricia was called at work by a woman at the local daycare center. She told Patricia to come and pick up her son because he was not feeling well. Her son, three-and-a-half-year-old Marshall, had been feeling tired and achy when he woke up. While at daycare, his cheeks had become red and he was warm to touch. He did not want to play with his friends, and by the time Patricia arrived, he was crying. Later that afternoon, Marshall’s condition worsened. He had fever, chills, a sore throat, runny nose, and a dry hacking cough. Suspecting Marshall had influenza, Patricia wrapped him up and took him to the community health care clinic.
- Why did Marshall’s presentation lead Patricia to think he had influenza and not a cold? Why is it important to medically evaluate and diagnose a potential influenza infection?
- Describe the pathophysiology of the influenza virus. Outline the properties of influenza A antigens that allow them to exert their effects in the host.
- Marshall may be at risk at contracting secondary bacterial pneumonia. Why is this so? Explain why cyanosis may be a feature associated with pneumonia.
Assignment Requirements:
Before finalizing your work, you should:
- Ensure you have written at least four double-spaced pages.
- be sure to read the Assignment description carefully (as displayed above);
- consult the Grading Rubric (under the Course Resources) to make sure you have included everything necessary; and
- utilize spelling and grammar check to minimize errors.
- follow the conventions of Standard American English (correct grammar, punctuation, etc.);
- be well ordered, logical, and unified, as well as original and insightful;
- display superior content, organization, style, and mechanics; and
- use APA 6th Edition format.
To see your assignment instructions and grading rubric, go to Course Resources / Grading Rubrics.
How to Submit:
[supanova_question]
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience. It should be at least two full, double spaced pages. Again, y Writing Assignment Help
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience.
It should be at least two full, double spaced pages. Again, you must include a photo of the program and a “Selfie” at the venue. You must include discussion of ALL of the music on the program in your paper.
The concerts take place at various locations on campus, the most frequent being the Temple Performing Arts Center (TPAC) on Broad St. and Rock Hall at Broad and Cecil B. Moore. Some jazz programs also take place in Presser Hall.
To access the Boyer College of Music schedule of events, go to: events.temple.edu/department/boyer-college-of-music-and-dance
FOR ALL CONCERT EVENTS, IT IS NECESSARY FOR YOU TO BRING YOUR TEMPLE ID IN ORDER TO GET STUDENT DISCOUNTS!
Allow plenty of time to get where you are going. Look up the locations of the venues on the internet before you go.
Do a little reading in advance about what you are going to hear. This is easily done via Google and Wikipedia. Also, the concerts all have detailed information in the programs. Try to get to your seat early enough to read the information in the program.
While people often dress up for concerts (it is a popular “date night” activity, after all), what you wear to the concert is NOT important. If you would like to use it as a special event to dress up, that might be fun, but you can go in the same clothes you wear to class. No one will be judging you!
[supanova_question]
Network Security Plan Outline Other Assignment Help
A manufacturing company is expanding its sales operation to include territory in the Northwestern United States (U.S.). The sales team will support customers in the states of Washington, Oregon, Alaska, Montana, Wyoming, and Idaho.
The new office will be located in Washington with five people regularly working in the office. An additional five will work from their homes in other states. The employees will need to access the company network from their home offices, the new office, and while traveling.
You have been contracted to develop the network security plan for the new sales office and team.
Prepare a network security plan outline.
Include the following in the outline:
- Identification of the key sections of the security plan
- Summary of what to include in each section
- Required hardware and related security software components
Document your plan in one of the following ways:
- A 1- to 2-page paper
- A 1- to 2-page diagram or flowchart with descriptive callouts
- A 7- to 10-slide presentation with detailed speaker notes
[supanova_question]
Easy Discussion Rpelies Writing Assignment Help
Must be a minimum of 100 words each, and contain useful and relevant content that ads to the conversation.
1) Chapter 8 Internet connection
The most common types of internet connections are DSL (Digital subscriber line), dialup, cable. satellite, wireless hotspots, and cell phone networks. Each one will provide the same initial service but may have differences in quality of signal and service interruption, which will depend on the company and your location. DSL is a broadband connection that comes through your phone line but still allows you to make calls while you’re connected to the internet. It uses fiber-optic cables and phone lines for transmission. With dialup you use a modem that connects to your service provider through your home phone. But you cannot make calls while connected to the internet. Connecting to the internet through your cable provider is another broadband connection. The speeds are pretty fast but you have to pay a monthly fee. In order to connect via satellite, a satellite dish has to be installed. Not all providers offer satellite connections. Wireless hotspots are connections that somebody else had made. A wireless device can pick up hotspots and allow you to connect to the internet free or for a fee. When connecting through your cellphone you are using your providers 3G or 4G network. This also will deplete your data and you will be charged if you go over and you don’t have an unlimited data plan.
2) Chapter 8: Keys to planning a network
Every network is going to be a little different, but some things to keep in mind as you plan your network are:
1. Get a map- Understand the layout of your space where you are installing the network. Draw a map of the office or see if you can get a map of the office. Add distances or a scale if possible so you can determine how far you will need to run cables or how many wireless access points you’ll need. Label Power locations and their capacity. Mark any possible hazards such as lights, pipes, bricks and any potential obsticals that may be in the way of you running cables.
2. Locate your server(s)- If you are installing a small network, you may not have to worry about this. But if you have a network with one or more dedicated servers, decide were they will be located. They need to be in a secured location where only authorized people will have access to them.
3. Identify where clients computers will be- If you are setting up an office in a cubicle farm, just assume one computer (or more, depending on the cubicle type) per cube. This will help you determine where you need shared network resources as well as cable placement.
4. Locate network resources- if your network users are going to share resources such as printers, where will they be located?
5. Determine how you are going to connect-If you are going to go all wireless, you can start figuring out how many wireless routers or access points you’ll need. If you are going to have wired connections, start determining how long the cable runs will be. Remember that UTP has a maximum segment distance of 100 meters. If you have to go up from a patch panel, into a ceiling, and down through a wall or conduit, take that into account too!
6. Designate additional connectivity areas if needed. If you are running cables and some systems are outside of your maximum cable length, you will need to install a repeater of some sort. The best choice is probably a switch, which repeats signals. If you have several hundred computers, though, and you want to separate out networks, then a router is the best choice. These connectivity locations can be just a small closet. Other times, if no space is available, some administrators will put the switch in the drop ceiling.
3) Chapter 6: Servers Reply to Class
Re:Why wouldn’t a non-dedicated server be preferred to rather than a dedicated server?
In my working experiences, there are justifications for each (nondedicated and dedicated) and it usually depends on the role, environment and configuration of the server and the amount of resources it will be supporting. For example, if the print/email server is a secured one that needs to be isolated and contained to meet security compliances that would be one common reason. Another one would be the workload of dedicated server is such that all of its resources are needed to primarily focus on its data transmission or work tasks/request and sharing it as a nondedicated server might require too much contention in sharing its resources. These are some real-world examples that have been the case with me.
4) Discussion Question: Wireless networking and Security Protocols
Research security protocols used for wireless networking; including WEP, WPA, and WPA2.
Describe the key characteristics of these protocols, including differences and similarities.
Post your findings to the discussion forum.
5) Discussion Question:Encryption Technologies
Research encryption technologies.
Determine which technologies work with the security protocols; WEP, WPA, and WPA2.
Post your findings to the discussion forum.
6) It Pro TV Secure: WPS
The IT pro guys covered Wifi protected set up or WPS and basically said don’t let the word “protected” fool you . On most devices there is a wps button either on the front or top of the equipment and pressing this button automatically signs the device on to the network. Also there is an 8 digit WPS pin number that can be manually entered like a pass phrase. The device does have to be WPS capable and usually when attempting to connect to a network there will be instructions to press the button. The option to sign in with the pass phrase is usually available on WPS capable devices. It’s not recommended for SOHO and corporate offices because its too easy to gain access to the network which essentially makes the network unsecured.
7) Lynda.com: Comp Tia Exam Prep Mac Address Filtering
ach Ethernet based node and Ethernet switch/bridge port has a globally unique unchangeable MAC address stored locally on the network interface card, or on the on-board network controller used in network switches or system boards with built-in Ethernet interfaces. And each NIC/controller also has a unique hardwired OUI-derived MAC address, commonly known as the burned in address (BIA) MAC. Even so, it is possible for a node to use a user-defined MAC address to mask the BIA address and take the BIA’s place as the MAC address used for sending and receiving Ethernet frames. So although the MAC is a pretty good bet to filter and track on, it’s not foolproof. However, if a system is compromised or if you have rouge system administrator on your hands, all bets are off.
Then of course, there are all of those “soft MACs.” These virtual MAC addresses are used by Layer 3 switch VLAN interfaces, by Hot Standby Router Protocol (HSRP) interfaces and by the various ether-channel NIC bonding and host availability schemes. (How else would nodes be able to forward packets to these interfaces?) While these “soft” addresses do not mask the BIAs, they do come up as part of the results of a network inventory and will be seen as active hosts on that network. The issue for auditors is that these “dual-identity” nodes now appear twice in the inventory. They are discovered, in both cases, with a different MAC and IP address.
[supanova_question]
https://anyessayhelp.com/
Can you put these two paragrahs into spanish ? No online translators allowed
Both my mom and dad prefer an apartment that is close to the mall and restaurants. They also want an apartment that is on the first floor. My father prefers a big apartment but my mother prefers a medium sized one. The ideal apartment for both my mom and dad would have 3 bed rooms, big kitchen, big closet, 2 bathrooms, and a patio. It would also cost about 700$ dollars a month. Also my mom would like white carpet in her apartment.
The ideal hotel for my mom and dad would contain a big bed, one bathroom, a nice view, and a television. It would also would be close to the mall and many restaurants. Both of them agree they would want the hotel room to be on the third floor. The ideal price for the hotel would be 90$ a day. Also it must be a clean hotel and have free breakfast in the morning. It does not have to be too big a medium room would be perfect.
English to Spanish translation, foreign languages homework help Foreign Languages Assignment Help[supanova_question]
Business intelligence Computer Science Assignment Help
Included with this assignment is an Excel spreadsheet that contains data with two dimension values.
The purpose of this assignment is to demonstrate steps performed in a K-Means Cluster analysis.
Review the “k-MEANS CLUSTERING ALGORITHM” section in Chapter 4 of the Sharda et. al. textbook for additional background.
Use Excel to perform the following data analysis.
- Plot the data on a scatter plot.
- Determine the ideal number of clusters.
- Choose random center points (centroids) for each cluster. (Note: Each student will select a different random set of centroids.)
- Using a standard distance formula measure the distance from each data point to each center point.
- Assign each data point to an initial cluster region based on closeness.
- For each cluster calculate new center points.
- Repeat steps 4 through 6 as a second pass.
- Repeat steps 4 through 6 as a third pass.
Provide final answers on your Excel spreadsheet indicating your initial center points, second pass center points, and third pass center points. You must submit your spreadsheet and these answers to receive full credit.
You will use Excel to help with calculations, but only standard functions should be used (i.e. don’t use a plug-in to perform the analysis for you.) You need to show your work doing this analysis the long way. If you were to repeat steps 4 through 6, what will likely happen with the cluster centroids?
Here is a link to an example spreadsheet using a smaller data set. It contains two tabs. The first tab is the raw data. The second tab contains the analysis that was performed. Make sure that you use a different starting center points from the example
NO PLAGIARISM, 3 CENTER POINTS,
[supanova_question]
Long-Term Assets Business Finance Assignment Help
Using the SEC 10-K for Tesla; NASDAQ; TSLA, answer the following questions:
1.Reading the notes to the financial statements, as well as the balance sheet, post information about the Accounts Receivable for your company. Who owes the company money?
2.Search for the phrase “Bad Debts” or Allowance (for collectible accounts). When you read the balance sheet, you may see that the receivables are listed as a net of $x,xxx to show the Allowance for Bad Debts. Comment about the changes in Accounts Receivable and the Allowance for Bad Debts. Are they increasing or decreasing? How does this relate to sales (are sales increasing or decreasing)?
3.Property, Plants, and Equipment / PPE (Capital Assets; Fixed Assets): Comment about PPE and accumulated depreciation. How are these values changing from year to year: PPE, Accumulated Depreciation, and Net PPE?
[supanova_question]
Journal 1: Thinking about thinking Humanities Assignment Help
Prompt for #1:
- Include a brief summary of all the texts that we engaged with for the week (Bunn, DasBender, Savini) Keep them brief; I want the bulk of your response to be reflective. Try to summarize each reading in a sentence or two, focusing on the main idea(s).
- Explain how these texts can help you as a “critical thinker” not just in the classroom, but in the world.
- Read the following quote by Carl Sagan, American astronomer, educator and author (and then answer the question that follows it): “It seems to me what is called for is an exquisite balance between two conflicting needs: the most skeptical scrutiny of all hypotheses that are served up to us and at the same time a great openness to new ideas. Obviously those two modes of thought are in some tension. But if you are able to exercise only one of these modes, whichever one it is, you’re in deep trouble. If you are only skeptical, then no new ideas make it through to you. You never learn anything new. You become a crotchety old person convinced that nonsense is ruling the world. (There is, of course, much data to support you.) But every now and then, maybe once in a hundred cases, a new idea turns out to be on the mark, valid and wonderful. If you are too much in the habit of being skeptical about everything, you are going to miss or resent it, and either way you will be standing in the way of understanding and progress. On the other hand, if you are open to the point of gullibility and have not an ounce of skeptical sense in you, then you cannot distinguish the useful as from the worthless ones.”
What is Sagan saying? How does it relate to the articles you have read this week?
Once you have finished and posted your response, please reply to two classmates. Make sure your comments to classmates have substance.
Online Discussion Requirements:
- Your post must be a minimum of 350 words. There is no word minimum on peer replies, but you must show that you have engaged with your peers’ responses and not simply said “I agree” or “Great post!” A substantial reply could be anywhere between 50 and 150 words. You are not required, but you are encouraged, to continue replying to one another throughout the weekend. Remember, this is the space for class conversation as we are not together in person. Conversation is where the opening up of perspective really happens.
- Ad Hominem attacks will not be tolerated. If you disagree with someone, critique the argument, not the person. And do it respectfully and constructively.
[supanova_question]
The Planning Process Business Finance Assignment Help
Purpose of Assignment
For this assignment, the student will identify and interview someone they know who is in a management role. This allows the student to integrate the experience of real world managers with their own insights into planning and strategy. The assignment also reinforces the importance of contingency planning.
Assignment Steps
Interview someone you know who is in a management role. This can be at your current place of employment or someone you know personally working in a managerial role. Ensure you attach the completed interview form with your assignment submission.
Prepare a 1,000-word discussion that is a narration (i.e. speaker notes) of what you have learned about 4 topic points below (bullets #1 – 4) and is based upon information gained from the interview. Ensure you attach the completed narration with your assignment submission. Record your narration in the form of an audio file. Discuss these 4 topic points in your audio file.
- Discuss what you discovered about contingency planning and when they may be required.
- Discuss how creativity and critical thinking relate to contingency planning.
- Explain how you might integrate creativity and critical thinking into your own planning process.
- Discuss what you learned about creativity and critical thinking and its relationship to the decision-making process.
NOTE: The narration is not you interviewing the manager nor you and the interviewee talking back and forth to each other in an audio file, it is you recording your narration (i.e. your speaking notes) based on conducting your interview with a manager and then responding to the 4 topic points that you address based on the applicable information from the interview.
Conduct an Internet search on, “How to create an audio file” to locate easy to follow tutorials. You may attach the audio file as its own attachment or you may embed the file into a MSWord document or single MSPowerPoint slide.
Under the Library Tab, go to The Center for Writing Excellence, Select Tutorials and Guides and under Samples you will see examples of papers, business memo, letters, etc. which are in APA style.
Format the assignment consistent with APA guidelines (as applicable to the narration and interview form).
[supanova_question]
[supanova_question]
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience. It should be at least two full, double spaced pages. Again, y Writing Assignment Help
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience.
It should be at least two full, double spaced pages. Again, you must include a photo of the program and a “Selfie” at the venue. You must include discussion of ALL of the music on the program in your paper.
The concerts take place at various locations on campus, the most frequent being the Temple Performing Arts Center (TPAC) on Broad St. and Rock Hall at Broad and Cecil B. Moore. Some jazz programs also take place in Presser Hall.
To access the Boyer College of Music schedule of events, go to: events.temple.edu/department/boyer-college-of-music-and-dance
FOR ALL CONCERT EVENTS, IT IS NECESSARY FOR YOU TO BRING YOUR TEMPLE ID IN ORDER TO GET STUDENT DISCOUNTS!
Allow plenty of time to get where you are going. Look up the locations of the venues on the internet before you go.
Do a little reading in advance about what you are going to hear. This is easily done via Google and Wikipedia. Also, the concerts all have detailed information in the programs. Try to get to your seat early enough to read the information in the program.
While people often dress up for concerts (it is a popular “date night” activity, after all), what you wear to the concert is NOT important. If you would like to use it as a special event to dress up, that might be fun, but you can go in the same clothes you wear to class. No one will be judging you!
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience. It should be at least two full, double spaced pages. Again, y Writing Assignment Help[supanova_question]
case study Writing Assignment Help
MN551-4: Evaluate the presence and effects of alteration in the homeostatic state secondary to gender, genetic, ethnic and temporal variables
Select one of the case studies below, and include in your discussion an evaluation of the presence and effects of alteration in the homeostatic state secondary to gender, genetic, ethnic, and temporal variables.
Requirements:
- Make sure all of the topics in the case study have been addressed.
- Cite at least three sources; journal articles, textbooks or evidenced-based websites to support the content.
- All sources must be within 5 years.
- Do not use .com, Wikipedia, or up-to-date, etc., for your sources.
Case Study 2
Respiratory Tract Infections, Neoplasms, and Childhood Disorders
Patricia was called at work by a woman at the local daycare center. She told Patricia to come and pick up her son because he was not feeling well. Her son, three-and-a-half-year-old Marshall, had been feeling tired and achy when he woke up. While at daycare, his cheeks had become red and he was warm to touch. He did not want to play with his friends, and by the time Patricia arrived, he was crying. Later that afternoon, Marshall’s condition worsened. He had fever, chills, a sore throat, runny nose, and a dry hacking cough. Suspecting Marshall had influenza, Patricia wrapped him up and took him to the community health care clinic.
- Why did Marshall’s presentation lead Patricia to think he had influenza and not a cold? Why is it important to medically evaluate and diagnose a potential influenza infection?
- Describe the pathophysiology of the influenza virus. Outline the properties of influenza A antigens that allow them to exert their effects in the host.
- Marshall may be at risk at contracting secondary bacterial pneumonia. Why is this so? Explain why cyanosis may be a feature associated with pneumonia.
Assignment Requirements:
Before finalizing your work, you should:
- Ensure you have written at least four double-spaced pages.
- be sure to read the Assignment description carefully (as displayed above);
- consult the Grading Rubric (under the Course Resources) to make sure you have included everything necessary; and
- utilize spelling and grammar check to minimize errors.
- follow the conventions of Standard American English (correct grammar, punctuation, etc.);
- be well ordered, logical, and unified, as well as original and insightful;
- display superior content, organization, style, and mechanics; and
- use APA 6th Edition format.
To see your assignment instructions and grading rubric, go to Course Resources / Grading Rubrics.
How to Submit:
[supanova_question]
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience. It should be at least two full, double spaced pages. Again, y Writing Assignment Help
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience.
It should be at least two full, double spaced pages. Again, you must include a photo of the program and a “Selfie” at the venue. You must include discussion of ALL of the music on the program in your paper.
The concerts take place at various locations on campus, the most frequent being the Temple Performing Arts Center (TPAC) on Broad St. and Rock Hall at Broad and Cecil B. Moore. Some jazz programs also take place in Presser Hall.
To access the Boyer College of Music schedule of events, go to: events.temple.edu/department/boyer-college-of-music-and-dance
FOR ALL CONCERT EVENTS, IT IS NECESSARY FOR YOU TO BRING YOUR TEMPLE ID IN ORDER TO GET STUDENT DISCOUNTS!
Allow plenty of time to get where you are going. Look up the locations of the venues on the internet before you go.
Do a little reading in advance about what you are going to hear. This is easily done via Google and Wikipedia. Also, the concerts all have detailed information in the programs. Try to get to your seat early enough to read the information in the program.
While people often dress up for concerts (it is a popular “date night” activity, after all), what you wear to the concert is NOT important. If you would like to use it as a special event to dress up, that might be fun, but you can go in the same clothes you wear to class. No one will be judging you!
[supanova_question]
Network Security Plan Outline Other Assignment Help
A manufacturing company is expanding its sales operation to include territory in the Northwestern United States (U.S.). The sales team will support customers in the states of Washington, Oregon, Alaska, Montana, Wyoming, and Idaho.
The new office will be located in Washington with five people regularly working in the office. An additional five will work from their homes in other states. The employees will need to access the company network from their home offices, the new office, and while traveling.
You have been contracted to develop the network security plan for the new sales office and team.
Prepare a network security plan outline.
Include the following in the outline:
- Identification of the key sections of the security plan
- Summary of what to include in each section
- Required hardware and related security software components
Document your plan in one of the following ways:
- A 1- to 2-page paper
- A 1- to 2-page diagram or flowchart with descriptive callouts
- A 7- to 10-slide presentation with detailed speaker notes
[supanova_question]
Easy Discussion Rpelies Writing Assignment Help
Must be a minimum of 100 words each, and contain useful and relevant content that ads to the conversation.
1) Chapter 8 Internet connection
The most common types of internet connections are DSL (Digital subscriber line), dialup, cable. satellite, wireless hotspots, and cell phone networks. Each one will provide the same initial service but may have differences in quality of signal and service interruption, which will depend on the company and your location. DSL is a broadband connection that comes through your phone line but still allows you to make calls while you’re connected to the internet. It uses fiber-optic cables and phone lines for transmission. With dialup you use a modem that connects to your service provider through your home phone. But you cannot make calls while connected to the internet. Connecting to the internet through your cable provider is another broadband connection. The speeds are pretty fast but you have to pay a monthly fee. In order to connect via satellite, a satellite dish has to be installed. Not all providers offer satellite connections. Wireless hotspots are connections that somebody else had made. A wireless device can pick up hotspots and allow you to connect to the internet free or for a fee. When connecting through your cellphone you are using your providers 3G or 4G network. This also will deplete your data and you will be charged if you go over and you don’t have an unlimited data plan.
2) Chapter 8: Keys to planning a network
Every network is going to be a little different, but some things to keep in mind as you plan your network are:
1. Get a map- Understand the layout of your space where you are installing the network. Draw a map of the office or see if you can get a map of the office. Add distances or a scale if possible so you can determine how far you will need to run cables or how many wireless access points you’ll need. Label Power locations and their capacity. Mark any possible hazards such as lights, pipes, bricks and any potential obsticals that may be in the way of you running cables.
2. Locate your server(s)- If you are installing a small network, you may not have to worry about this. But if you have a network with one or more dedicated servers, decide were they will be located. They need to be in a secured location where only authorized people will have access to them.
3. Identify where clients computers will be- If you are setting up an office in a cubicle farm, just assume one computer (or more, depending on the cubicle type) per cube. This will help you determine where you need shared network resources as well as cable placement.
4. Locate network resources- if your network users are going to share resources such as printers, where will they be located?
5. Determine how you are going to connect-If you are going to go all wireless, you can start figuring out how many wireless routers or access points you’ll need. If you are going to have wired connections, start determining how long the cable runs will be. Remember that UTP has a maximum segment distance of 100 meters. If you have to go up from a patch panel, into a ceiling, and down through a wall or conduit, take that into account too!
6. Designate additional connectivity areas if needed. If you are running cables and some systems are outside of your maximum cable length, you will need to install a repeater of some sort. The best choice is probably a switch, which repeats signals. If you have several hundred computers, though, and you want to separate out networks, then a router is the best choice. These connectivity locations can be just a small closet. Other times, if no space is available, some administrators will put the switch in the drop ceiling.
3) Chapter 6: Servers Reply to Class
Re:Why wouldn’t a non-dedicated server be preferred to rather than a dedicated server?
In my working experiences, there are justifications for each (nondedicated and dedicated) and it usually depends on the role, environment and configuration of the server and the amount of resources it will be supporting. For example, if the print/email server is a secured one that needs to be isolated and contained to meet security compliances that would be one common reason. Another one would be the workload of dedicated server is such that all of its resources are needed to primarily focus on its data transmission or work tasks/request and sharing it as a nondedicated server might require too much contention in sharing its resources. These are some real-world examples that have been the case with me.
4) Discussion Question: Wireless networking and Security Protocols
Research security protocols used for wireless networking; including WEP, WPA, and WPA2.
Describe the key characteristics of these protocols, including differences and similarities.
Post your findings to the discussion forum.
5) Discussion Question:Encryption Technologies
Research encryption technologies.
Determine which technologies work with the security protocols; WEP, WPA, and WPA2.
Post your findings to the discussion forum.
6) It Pro TV Secure: WPS
The IT pro guys covered Wifi protected set up or WPS and basically said don’t let the word “protected” fool you . On most devices there is a wps button either on the front or top of the equipment and pressing this button automatically signs the device on to the network. Also there is an 8 digit WPS pin number that can be manually entered like a pass phrase. The device does have to be WPS capable and usually when attempting to connect to a network there will be instructions to press the button. The option to sign in with the pass phrase is usually available on WPS capable devices. It’s not recommended for SOHO and corporate offices because its too easy to gain access to the network which essentially makes the network unsecured.
7) Lynda.com: Comp Tia Exam Prep Mac Address Filtering
ach Ethernet based node and Ethernet switch/bridge port has a globally unique unchangeable MAC address stored locally on the network interface card, or on the on-board network controller used in network switches or system boards with built-in Ethernet interfaces. And each NIC/controller also has a unique hardwired OUI-derived MAC address, commonly known as the burned in address (BIA) MAC. Even so, it is possible for a node to use a user-defined MAC address to mask the BIA address and take the BIA’s place as the MAC address used for sending and receiving Ethernet frames. So although the MAC is a pretty good bet to filter and track on, it’s not foolproof. However, if a system is compromised or if you have rouge system administrator on your hands, all bets are off.
Then of course, there are all of those “soft MACs.” These virtual MAC addresses are used by Layer 3 switch VLAN interfaces, by Hot Standby Router Protocol (HSRP) interfaces and by the various ether-channel NIC bonding and host availability schemes. (How else would nodes be able to forward packets to these interfaces?) While these “soft” addresses do not mask the BIAs, they do come up as part of the results of a network inventory and will be seen as active hosts on that network. The issue for auditors is that these “dual-identity” nodes now appear twice in the inventory. They are discovered, in both cases, with a different MAC and IP address.
[supanova_question]
https://anyessayhelp.com/
Can you put these two paragrahs into spanish ? No online translators allowed
Both my mom and dad prefer an apartment that is close to the mall and restaurants. They also want an apartment that is on the first floor. My father prefers a big apartment but my mother prefers a medium sized one. The ideal apartment for both my mom and dad would have 3 bed rooms, big kitchen, big closet, 2 bathrooms, and a patio. It would also cost about 700$ dollars a month. Also my mom would like white carpet in her apartment.
The ideal hotel for my mom and dad would contain a big bed, one bathroom, a nice view, and a television. It would also would be close to the mall and many restaurants. Both of them agree they would want the hotel room to be on the third floor. The ideal price for the hotel would be 90$ a day. Also it must be a clean hotel and have free breakfast in the morning. It does not have to be too big a medium room would be perfect.
English to Spanish translation, foreign languages homework help Foreign Languages Assignment Help[supanova_question]
Business intelligence Computer Science Assignment Help
Included with this assignment is an Excel spreadsheet that contains data with two dimension values.
The purpose of this assignment is to demonstrate steps performed in a K-Means Cluster analysis.
Review the “k-MEANS CLUSTERING ALGORITHM” section in Chapter 4 of the Sharda et. al. textbook for additional background.
Use Excel to perform the following data analysis.
- Plot the data on a scatter plot.
- Determine the ideal number of clusters.
- Choose random center points (centroids) for each cluster. (Note: Each student will select a different random set of centroids.)
- Using a standard distance formula measure the distance from each data point to each center point.
- Assign each data point to an initial cluster region based on closeness.
- For each cluster calculate new center points.
- Repeat steps 4 through 6 as a second pass.
- Repeat steps 4 through 6 as a third pass.
Provide final answers on your Excel spreadsheet indicating your initial center points, second pass center points, and third pass center points. You must submit your spreadsheet and these answers to receive full credit.
You will use Excel to help with calculations, but only standard functions should be used (i.e. don’t use a plug-in to perform the analysis for you.) You need to show your work doing this analysis the long way. If you were to repeat steps 4 through 6, what will likely happen with the cluster centroids?
Here is a link to an example spreadsheet using a smaller data set. It contains two tabs. The first tab is the raw data. The second tab contains the analysis that was performed. Make sure that you use a different starting center points from the example
NO PLAGIARISM, 3 CENTER POINTS,
[supanova_question]
Long-Term Assets Business Finance Assignment Help
Using the SEC 10-K for Tesla; NASDAQ; TSLA, answer the following questions:
1.Reading the notes to the financial statements, as well as the balance sheet, post information about the Accounts Receivable for your company. Who owes the company money?
2.Search for the phrase “Bad Debts” or Allowance (for collectible accounts). When you read the balance sheet, you may see that the receivables are listed as a net of $x,xxx to show the Allowance for Bad Debts. Comment about the changes in Accounts Receivable and the Allowance for Bad Debts. Are they increasing or decreasing? How does this relate to sales (are sales increasing or decreasing)?
3.Property, Plants, and Equipment / PPE (Capital Assets; Fixed Assets): Comment about PPE and accumulated depreciation. How are these values changing from year to year: PPE, Accumulated Depreciation, and Net PPE?
[supanova_question]
Journal 1: Thinking about thinking Humanities Assignment Help
Prompt for #1:
- Include a brief summary of all the texts that we engaged with for the week (Bunn, DasBender, Savini) Keep them brief; I want the bulk of your response to be reflective. Try to summarize each reading in a sentence or two, focusing on the main idea(s).
- Explain how these texts can help you as a “critical thinker” not just in the classroom, but in the world.
- Read the following quote by Carl Sagan, American astronomer, educator and author (and then answer the question that follows it): “It seems to me what is called for is an exquisite balance between two conflicting needs: the most skeptical scrutiny of all hypotheses that are served up to us and at the same time a great openness to new ideas. Obviously those two modes of thought are in some tension. But if you are able to exercise only one of these modes, whichever one it is, you’re in deep trouble. If you are only skeptical, then no new ideas make it through to you. You never learn anything new. You become a crotchety old person convinced that nonsense is ruling the world. (There is, of course, much data to support you.) But every now and then, maybe once in a hundred cases, a new idea turns out to be on the mark, valid and wonderful. If you are too much in the habit of being skeptical about everything, you are going to miss or resent it, and either way you will be standing in the way of understanding and progress. On the other hand, if you are open to the point of gullibility and have not an ounce of skeptical sense in you, then you cannot distinguish the useful as from the worthless ones.”
What is Sagan saying? How does it relate to the articles you have read this week?
Once you have finished and posted your response, please reply to two classmates. Make sure your comments to classmates have substance.
Online Discussion Requirements:
- Your post must be a minimum of 350 words. There is no word minimum on peer replies, but you must show that you have engaged with your peers’ responses and not simply said “I agree” or “Great post!” A substantial reply could be anywhere between 50 and 150 words. You are not required, but you are encouraged, to continue replying to one another throughout the weekend. Remember, this is the space for class conversation as we are not together in person. Conversation is where the opening up of perspective really happens.
- Ad Hominem attacks will not be tolerated. If you disagree with someone, critique the argument, not the person. And do it respectfully and constructively.
[supanova_question]
The Planning Process Business Finance Assignment Help
Purpose of Assignment
For this assignment, the student will identify and interview someone they know who is in a management role. This allows the student to integrate the experience of real world managers with their own insights into planning and strategy. The assignment also reinforces the importance of contingency planning.
Assignment Steps
Interview someone you know who is in a management role. This can be at your current place of employment or someone you know personally working in a managerial role. Ensure you attach the completed interview form with your assignment submission.
Prepare a 1,000-word discussion that is a narration (i.e. speaker notes) of what you have learned about 4 topic points below (bullets #1 – 4) and is based upon information gained from the interview. Ensure you attach the completed narration with your assignment submission. Record your narration in the form of an audio file. Discuss these 4 topic points in your audio file.
- Discuss what you discovered about contingency planning and when they may be required.
- Discuss how creativity and critical thinking relate to contingency planning.
- Explain how you might integrate creativity and critical thinking into your own planning process.
- Discuss what you learned about creativity and critical thinking and its relationship to the decision-making process.
NOTE: The narration is not you interviewing the manager nor you and the interviewee talking back and forth to each other in an audio file, it is you recording your narration (i.e. your speaking notes) based on conducting your interview with a manager and then responding to the 4 topic points that you address based on the applicable information from the interview.
Conduct an Internet search on, “How to create an audio file” to locate easy to follow tutorials. You may attach the audio file as its own attachment or you may embed the file into a MSWord document or single MSPowerPoint slide.
Under the Library Tab, go to The Center for Writing Excellence, Select Tutorials and Guides and under Samples you will see examples of papers, business memo, letters, etc. which are in APA style.
Format the assignment consistent with APA guidelines (as applicable to the narration and interview form).
[supanova_question]
[supanova_question]
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience. It should be at least two full, double spaced pages. Again, y Writing Assignment Help
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience.
It should be at least two full, double spaced pages. Again, you must include a photo of the program and a “Selfie” at the venue. You must include discussion of ALL of the music on the program in your paper.
The concerts take place at various locations on campus, the most frequent being the Temple Performing Arts Center (TPAC) on Broad St. and Rock Hall at Broad and Cecil B. Moore. Some jazz programs also take place in Presser Hall.
To access the Boyer College of Music schedule of events, go to: events.temple.edu/department/boyer-college-of-music-and-dance
FOR ALL CONCERT EVENTS, IT IS NECESSARY FOR YOU TO BRING YOUR TEMPLE ID IN ORDER TO GET STUDENT DISCOUNTS!
Allow plenty of time to get where you are going. Look up the locations of the venues on the internet before you go.
Do a little reading in advance about what you are going to hear. This is easily done via Google and Wikipedia. Also, the concerts all have detailed information in the programs. Try to get to your seat early enough to read the information in the program.
While people often dress up for concerts (it is a popular “date night” activity, after all), what you wear to the concert is NOT important. If you would like to use it as a special event to dress up, that might be fun, but you can go in the same clothes you wear to class. No one will be judging you!
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience. It should be at least two full, double spaced pages. Again, y Writing Assignment Help[supanova_question]
case study Writing Assignment Help
MN551-4: Evaluate the presence and effects of alteration in the homeostatic state secondary to gender, genetic, ethnic and temporal variables
Select one of the case studies below, and include in your discussion an evaluation of the presence and effects of alteration in the homeostatic state secondary to gender, genetic, ethnic, and temporal variables.
Requirements:
- Make sure all of the topics in the case study have been addressed.
- Cite at least three sources; journal articles, textbooks or evidenced-based websites to support the content.
- All sources must be within 5 years.
- Do not use .com, Wikipedia, or up-to-date, etc., for your sources.
Case Study 2
Respiratory Tract Infections, Neoplasms, and Childhood Disorders
Patricia was called at work by a woman at the local daycare center. She told Patricia to come and pick up her son because he was not feeling well. Her son, three-and-a-half-year-old Marshall, had been feeling tired and achy when he woke up. While at daycare, his cheeks had become red and he was warm to touch. He did not want to play with his friends, and by the time Patricia arrived, he was crying. Later that afternoon, Marshall’s condition worsened. He had fever, chills, a sore throat, runny nose, and a dry hacking cough. Suspecting Marshall had influenza, Patricia wrapped him up and took him to the community health care clinic.
- Why did Marshall’s presentation lead Patricia to think he had influenza and not a cold? Why is it important to medically evaluate and diagnose a potential influenza infection?
- Describe the pathophysiology of the influenza virus. Outline the properties of influenza A antigens that allow them to exert their effects in the host.
- Marshall may be at risk at contracting secondary bacterial pneumonia. Why is this so? Explain why cyanosis may be a feature associated with pneumonia.
Assignment Requirements:
Before finalizing your work, you should:
- Ensure you have written at least four double-spaced pages.
- be sure to read the Assignment description carefully (as displayed above);
- consult the Grading Rubric (under the Course Resources) to make sure you have included everything necessary; and
- utilize spelling and grammar check to minimize errors.
- follow the conventions of Standard American English (correct grammar, punctuation, etc.);
- be well ordered, logical, and unified, as well as original and insightful;
- display superior content, organization, style, and mechanics; and
- use APA 6th Edition format.
To see your assignment instructions and grading rubric, go to Course Resources / Grading Rubrics.
How to Submit:
[supanova_question]
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience. It should be at least two full, double spaced pages. Again, y Writing Assignment Help
There are hundreds of student concerts and recitals each year at the Boyer College of Music at Temple. You are required to go to a Boyer performance and write a paper about your experience.
It should be at least two full, double spaced pages. Again, you must include a photo of the program and a “Selfie” at the venue. You must include discussion of ALL of the music on the program in your paper.
The concerts take place at various locations on campus, the most frequent being the Temple Performing Arts Center (TPAC) on Broad St. and Rock Hall at Broad and Cecil B. Moore. Some jazz programs also take place in Presser Hall.
To access the Boyer College of Music schedule of events, go to: events.temple.edu/department/boyer-college-of-music-and-dance
FOR ALL CONCERT EVENTS, IT IS NECESSARY FOR YOU TO BRING YOUR TEMPLE ID IN ORDER TO GET STUDENT DISCOUNTS!
Allow plenty of time to get where you are going. Look up the locations of the venues on the internet before you go.
Do a little reading in advance about what you are going to hear. This is easily done via Google and Wikipedia. Also, the concerts all have detailed information in the programs. Try to get to your seat early enough to read the information in the program.
While people often dress up for concerts (it is a popular “date night” activity, after all), what you wear to the concert is NOT important. If you would like to use it as a special event to dress up, that might be fun, but you can go in the same clothes you wear to class. No one will be judging you!
[supanova_question]
Network Security Plan Outline Other Assignment Help
A manufacturing company is expanding its sales operation to include territory in the Northwestern United States (U.S.). The sales team will support customers in the states of Washington, Oregon, Alaska, Montana, Wyoming, and Idaho.
The new office will be located in Washington with five people regularly working in the office. An additional five will work from their homes in other states. The employees will need to access the company network from their home offices, the new office, and while traveling.
You have been contracted to develop the network security plan for the new sales office and team.
Prepare a network security plan outline.
Include the following in the outline:
- Identification of the key sections of the security plan
- Summary of what to include in each section
- Required hardware and related security software components
Document your plan in one of the following ways:
- A 1- to 2-page paper
- A 1- to 2-page diagram or flowchart with descriptive callouts
- A 7- to 10-slide presentation with detailed speaker notes
[supanova_question]
Easy Discussion Rpelies Writing Assignment Help
Must be a minimum of 100 words each, and contain useful and relevant content that ads to the conversation.
1) Chapter 8 Internet connection
The most common types of internet connections are DSL (Digital subscriber line), dialup, cable. satellite, wireless hotspots, and cell phone networks. Each one will provide the same initial service but may have differences in quality of signal and service interruption, which will depend on the company and your location. DSL is a broadband connection that comes through your phone line but still allows you to make calls while you’re connected to the internet. It uses fiber-optic cables and phone lines for transmission. With dialup you use a modem that connects to your service provider through your home phone. But you cannot make calls while connected to the internet. Connecting to the internet through your cable provider is another broadband connection. The speeds are pretty fast but you have to pay a monthly fee. In order to connect via satellite, a satellite dish has to be installed. Not all providers offer satellite connections. Wireless hotspots are connections that somebody else had made. A wireless device can pick up hotspots and allow you to connect to the internet free or for a fee. When connecting through your cellphone you are using your providers 3G or 4G network. This also will deplete your data and you will be charged if you go over and you don’t have an unlimited data plan.
2) Chapter 8: Keys to planning a network
Every network is going to be a little different, but some things to keep in mind as you plan your network are:
1. Get a map- Understand the layout of your space where you are installing the network. Draw a map of the office or see if you can get a map of the office. Add distances or a scale if possible so you can determine how far you will need to run cables or how many wireless access points you’ll need. Label Power locations and their capacity. Mark any possible hazards such as lights, pipes, bricks and any potential obsticals that may be in the way of you running cables.
2. Locate your server(s)- If you are installing a small network, you may not have to worry about this. But if you have a network with one or more dedicated servers, decide were they will be located. They need to be in a secured location where only authorized people will have access to them.
3. Identify where clients computers will be- If you are setting up an office in a cubicle farm, just assume one computer (or more, depending on the cubicle type) per cube. This will help you determine where you need shared network resources as well as cable placement.
4. Locate network resources- if your network users are going to share resources such as printers, where will they be located?
5. Determine how you are going to connect-If you are going to go all wireless, you can start figuring out how many wireless routers or access points you’ll need. If you are going to have wired connections, start determining how long the cable runs will be. Remember that UTP has a maximum segment distance of 100 meters. If you have to go up from a patch panel, into a ceiling, and down through a wall or conduit, take that into account too!
6. Designate additional connectivity areas if needed. If you are running cables and some systems are outside of your maximum cable length, you will need to install a repeater of some sort. The best choice is probably a switch, which repeats signals. If you have several hundred computers, though, and you want to separate out networks, then a router is the best choice. These connectivity locations can be just a small closet. Other times, if no space is available, some administrators will put the switch in the drop ceiling.
3) Chapter 6: Servers Reply to Class
Re:Why wouldn’t a non-dedicated server be preferred to rather than a dedicated server?
In my working experiences, there are justifications for each (nondedicated and dedicated) and it usually depends on the role, environment and configuration of the server and the amount of resources it will be supporting. For example, if the print/email server is a secured one that needs to be isolated and contained to meet security compliances that would be one common reason. Another one would be the workload of dedicated server is such that all of its resources are needed to primarily focus on its data transmission or work tasks/request and sharing it as a nondedicated server might require too much contention in sharing its resources. These are some real-world examples that have been the case with me.
4) Discussion Question: Wireless networking and Security Protocols
Research security protocols used for wireless networking; including WEP, WPA, and WPA2.
Describe the key characteristics of these protocols, including differences and similarities.
Post your findings to the discussion forum.
5) Discussion Question:Encryption Technologies
Research encryption technologies.
Determine which technologies work with the security protocols; WEP, WPA, and WPA2.
Post your findings to the discussion forum.
6) It Pro TV Secure: WPS
The IT pro guys covered Wifi protected set up or WPS and basically said don’t let the word “protected” fool you . On most devices there is a wps button either on the front or top of the equipment and pressing this button automatically signs the device on to the network. Also there is an 8 digit WPS pin number that can be manually entered like a pass phrase. The device does have to be WPS capable and usually when attempting to connect to a network there will be instructions to press the button. The option to sign in with the pass phrase is usually available on WPS capable devices. It’s not recommended for SOHO and corporate offices because its too easy to gain access to the network which essentially makes the network unsecured.
7) Lynda.com: Comp Tia Exam Prep Mac Address Filtering
ach Ethernet based node and Ethernet switch/bridge port has a globally unique unchangeable MAC address stored locally on the network interface card, or on the on-board network controller used in network switches or system boards with built-in Ethernet interfaces. And each NIC/controller also has a unique hardwired OUI-derived MAC address, commonly known as the burned in address (BIA) MAC. Even so, it is possible for a node to use a user-defined MAC address to mask the BIA address and take the BIA’s place as the MAC address used for sending and receiving Ethernet frames. So although the MAC is a pretty good bet to filter and track on, it’s not foolproof. However, if a system is compromised or if you have rouge system administrator on your hands, all bets are off.
Then of course, there are all of those “soft MACs.” These virtual MAC addresses are used by Layer 3 switch VLAN interfaces, by Hot Standby Router Protocol (HSRP) interfaces and by the various ether-channel NIC bonding and host availability schemes. (How else would nodes be able to forward packets to these interfaces?) While these “soft” addresses do not mask the BIAs, they do come up as part of the results of a network inventory and will be seen as active hosts on that network. The issue for auditors is that these “dual-identity” nodes now appear twice in the inventory. They are discovered, in both cases, with a different MAC and IP address.
[supanova_question]
English to Spanish translation, foreign languages homework help Foreign Languages Assignment Help
English to Spanish translation, foreign languages homework help Foreign Languages Assignment Help