I have 4 Pages research paper! Humanities Assignment Help

I have 4 Pages research paper! Humanities Assignment Help. I have 4 Pages research paper! Humanities Assignment Help.


(/0x4*br />

the research paper is about why college students should travel. and what are the benefits of it. it has to be done in MLA format. I have to put 6 academic sources that support what I’m saying, and two of them have to be from our book, and I have those two quotes ready. and at the end of the paper, there has to be a counter paragraph which talks about what obstacles could college students have to make them traveling a little harder to be done, it shouldn’t be long paragraph.

I have 4 Pages research paper! Humanities Assignment Help[supanova_question]

paper with PowerPoint Humanities Assignment Help

Topic: The impact of students’ loans to youths and families in DMV (Washington DC, Maryland, Virginia) During 1980 – 2019

Requirements:

  • Table of contents
  • Abstract >1 page
  • Introduction> 1-2
  • Abbreviated Literature Review >2 pages
  • Abbreviated Methodology >1
  • Body (with sub-sections)
  • Findings (Including figures and graphs, where appropriate) >2 pages maximum
  • Conclusion
  • Areas for Further Research
  • Footnotes
  • Bibliography
  • PowerPoint maximum 5 slides
  • You should present papers clearly and persuasively with adequate documentation.
  • The entire paper is minimum 20 pages (double-spaced, one-inch margins,12-point type) excluding the cover page, Footnotes and the Bibliography.
  • Materials you wish to use must come from reputable sources.
  • The papers must follow the standards set forth in Turabian 8th edition.

[supanova_question]

Your assignment is to watch at least two hours of televised/or video streamed shows that includes one drama, one comedy, and one reality program. Business Finance Assignment Help

Nickels defines advertising as “paid, non-personal communication through various media by organizations and individuals who are in some way identified in the message” (438).

Although television offers many advantages to national advertisers, it is clearly the most expensive. However, TV advertising isn’t limited to traditional commercials; sometimes the products appear in the programs themselves.

  • With product placement, advertisers pay to put their products into TV shows and movies where the audience will see them. The goal is to influence you to want that product yourself by causing you to react positively to this subtle advertising tool.
  • One classic example of product placement is the trail of Reese’s Pieces in the movie E.T. Did you ever notice the Coca-Cola cups on the judges’ table on American Idol? Many placements are more subtle, like the wheeled luggage from Zuca Inc. that appeared on the TV show CSI. (Nickels 441).

The latest wrinkle in product placement puts virtual products into video games. If you’re a gamer, you’ve seen in-game ads, like ads around the court in basketball games. New technology allows vending machines in racing games to be branded and rebranded over time, depending on whether Coke, Pepsi, Exxon, or Shell has purchased ad time.

Product placement is often subtle. You can see it in the products used in movies like the ones shown on the table in Talladega Nights. The goal is to influence you to want that product yourself. What product placements have you noticed in your favorite TV shows and movies?

Discussion Forum Instructions:

Your assignment is to watch at least two hours of televised/or video streamed shows that includes one drama, one comedy, and one reality program.

  • Watch closely and try to identify three brand-name products that are featured. Include the products in your list.
  • Analyze the effect the product placement had on you and whether it created a positive or negative result. In other words, did it make you think about buying/using the product? Defend your analysis. Be specific.

Example:

In the scene below from the comedy movie Talladega Nights I would complete the matrix for the assignment like this:

Program Network Product Featured Is the product placement effect positive/negative? Why
Comedy Movie Talladega Nights Movie TMC (Turner Movie Classics) KFC Chicken & Sides The effect of this product on me is negative because as a member of Weight Watcher’s it would cost me too many daily points (calories). I do enjoy the food, but it makes me sad to have to make the decision to avoid it in order to continue my successful weight loss.

Submission Instructions:

Submit your result information by typing in the Reply (Links to an external site.) box and include the following for each show:

  • Type of program (i.e., movie, TV sitcom, TV drama, TV reality)
  • Program name
  • TV Network or Streaming Application (i.e., NBC, Hulu, Netflix)
  • Product(s) featured (please list at least two)
  • Product’s effect on you…positive/negative…and why

Due Date: Post your original thread by 11:59 p.m. Thursday (worth 5 of 15 points)

Response Guidelines:

After you have posted your original thread, engage in a discussion with at least two of your classmates’ regarding his or her results and responses to the questions (worth 10 of 15 points-5 points per response)

  • Discuss any similarities and/or differences you may have if you chose to watch the same show
  • Ask questions to get further clarifications on why the product’s effect was positive/negative

[supanova_question]

You will then have to offer an interpretation of every room as well as suggest whether or not Room f was used for prostitution Humanities Assignment Help

You have to finish the work in SKetchUp to write a paper about it. Remember the purpose of this project is to replicate the experience of visiting this thermopolium, not create a precisely accurate model. Most of grade is about the paper in the end . The Romans used all of these Latin words to describe rooms in a house, which shows where the website author lands on the question of the first floor being used for only business or both business and residence.You must decide if you agree with him

[supanova_question]

information technology Computer Science Assignment Help

Context

The purpose of this lab is to practice examining traffic using a protocol analyzer and recognize a SYN attack.

The SYN flood attack is one of the common Denial of Service (DoS) attacks in the Internet. In the SYN flood attack, an attacker sends a large number of SYN packets to the server, ignores SYN/ACK replies and never sends the expected ACK packet. Basically, the attacker overwhelms the server with many half-established connections and exhausts the server resources, and hence the attack is known as a DoS attack.

The tool you will be using is known as Wireshark, a well-known open source packet analyzer. The exercise will demonstrate that recognizing an attack requires sophisticated tools (such as Wireshark), hard work (what you are about to put in) and knowledge of the domain (TCP/IP network).

Assignment

If you want to perform the exercise on your home computer, download wireshark from http://www.wireshark.org. Select all installation options. (Note: These files are about 20 MB and may take a long time to download on a slow link.) You may also download the documentation.

Wireshark can both capture packets and read trace files of packets that have already been captured. However, this is not a packet capturing exercise. This is a packet analysis exercise of packets that were previously captured.

1. Obtain trace files of the TCP handshake process.

  1. Get the files: “tcpshake.cap” (TCP: Handshake Process) and “tcp-syn-attack.cap” (TCP: TCP SYN Attack) from the LEO Lab 2 assignment folder. The .cap files are the ones you really need in this exercise. The .cap files are in the proprietary Sniffer format and can be read only with Wireshark.
  2. There are also two other files, ending in .prn in the LEO Lab 2 folder. The two .prn files are text files corresponding to the respective .cap files; you can read it with Notepad or Wordpad.

2. Read the tcpshake.cap trace file. This trace file captured three packets of a successful connection handshake. Become familiar with Wireshark’s interface.

  1. Double click tcpshake.cap. This will automatically bring up wireshark, since the .cap files are associated with Wireshark.
  2. Explore the trace in the three cap filespanes of the analyzer. These three panes are standard to most analyzers. They are the summary pane, the protocol tree pane, and the hex pane.
  3. Explore the preferences and configuration options in Wireshark.

3. Read the tcp-syn-attack.cap file and answer the following 10 questions (10 points each):

  1. Is this a two-way conversation?
  2. Are there any ACK’s?
  3. How long is the data portion of each packet? Why?
  4. Why is the sequence number zero (seq=0) in every packet?
  5. Why do the port numbers change in every packet?
  6. Look at the “Time” column in the summary pane. Explain the various options it supports?
  7. Click the “View” menu and select “Time Display Format”. “Seconds since beginning of capture” is checked. Select “Seconds since Previous Captured Packet”. How frequently are these packets being sent?
  8. Where in the protocol tree pane would you find the protocol “Type” field?
  9. Look in the flags section of the transport layer (Transmission Control Protocol” in the protocol tree section for one of the packets. What flags are set?
  10. How does a SYN attack deny service?

Post your answer in the Lab 2 assignment folder.

If you are getting stuck with the assignment, here are a few links that may be useful:

YouTube videos:

https://www.youtube.com/watch?v=NHLTa29iovU

https://www.youtube.com/watch?v=nQyWWWDl_5c (This is perhaps what is most relevant for Lab 2)

A “how to” tutorial:

http://www.howtogeek.com/104278/how-to-use-wireshark-to-capture-filter-and-inspect-packets/

[supanova_question]

[supanova_question]

2 reading response (picture 0857-0866 for the first reading response, the rest of picture for the second response. I need two assignments) Business Finance Assignment Help

The response must be written in MLA format, be at least 750 words and include the following:
1. An introduction which must include the title of the play, the name of the playwright, and the
venue. It also must include some kind of thesis statement.
2. The body of the paper which must be at least three paragraphs long. It must address at least
three different aspects of the production. For example, the story, the script, the direction, the
acting or the production values such as lighting, set or costumes. It must use specific examples
from the play to back up every one of the writer’s views. It must include a personal response to
the work. How did it affect you?
3. The conclusion must voice some kind of overall opinion of the performance.

2 reading response (picture 0857-0866 for the first reading response, the rest of picture for the second response. I need two assignments) Business Finance Assignment Help[supanova_question]

goverment 121 term paper Humanities Assignment Help

The “Term Paper” assignment, to be submitted November 8th, will consist of a list of elected officials who represent you on all levels, local, state and federal. You are also required to write letters to three of those officials. One of those letters has to be written to your representative in the House, or one of your two senators in the Senate. You may write the remaining two letters to the officials of your choice.

The letters must be written about an actual problem in your city, state or the nation. This entails researching the problem and the official, to whom you are writing, to ascertain if that person is able to help with the problem. Please be aware that the letters do not have to be actually mailed (unless you decide to do so). I will read each letter; and grade it based on the authenticity of the problem, the ability of the official to help solve it and how well it is written. The letters must be error free and persuasive. Hastily written letters, full of errors, will receive scores reflecting that lack of effort. I strongly suggest that this assignment be started immediately. Identify the elected officials; find out what their jurisdictions are (does s/he have the power to address the problem). Identify a problem; begin writing rough drafts. Ask family members, and others in the community, for input regarding the problem and what is needed to address it. Finally, ask that your letters be proof read by the Writing Center, a qualified family member, or a friend.

Do not attack officials. Do not write partisan letters (democrat or republican slanted). Be respectful; but be firm in your request for help. I have attached a sample letter to guide you. You may submit your letters to me prior to the deadline (at least a week before); and I will look at them, make corrections and return them to you, to correct and resubmit. Do not take this assignment lightly, obviously to earn a good grade (20% of the final grade); but, also to practice the most important right that you possess – the right to petition your elected officials for service, which you helped to elect them to provide.

I live in poughkeepsie newyork

Example

Wesley J. Lee

99 Wakeman Dr.

Poughkeepsie, NY 12601

Honorable Rob Rolison

Mayor of the City of Poughkeepsie

62 Civic Center Plaza
Poughkeepsie, New York 12061

Mayor Rolison,

First, I would like to congratulate you for your landslide win. I join other voters, in looking forward to the many positive improvements to our city, which you promised. I attended your inauguration; and was further inspired by your proposed administrative agenda.

My reason, for writing today, is to ask for your help in reinstating family literacy in the Poughkeepsie City School District (PCSD). Family literacy is a program which helps improve the quality of life for low income families. The program provides literacy for families in their homes and in a center, in intensity and duration, to make a sustained positive difference. Family literacy includes four components: Adult Education to help parents earn GE D’s and become employable; Early Childhood Education to help children (infants and toddlers) acquire an adequate vocabulary to be successful in school (10,000 words in Pre K); Parent/Child Interactive Literacy, in which children and parents read together and to each other and Parenting Education, to help parents become better parents and full partners in the education of their children.

The dire need for the project is evidenced by the fact that less than fifty percent of the senior class, of the Poughkeepsie High School, has graduated for over thirty years. Both, the Middle and High Schools, are in NY State Receivership. Quite simply, this is due to the absences of literacy, for generations, in the homes of low income families. Over eighty percent of PCSD students are low income. Due to the lack of exposure to literacy, these students enter school, Pre K, with 900 or 1,000 vocabulary words, not the required 10,000. With this low number of vocabulary words, it is like attempting to learn using a foreign language. They fall behind and, in most instances, they never catch up. This leads to poor performance all the way through the 12th grade. Therein lies the reason for the less than fifty percent graduation rate.

.

Family literacy was provided for families in the Poughkeepsie City School District from 1995 until 2006. I was the director of the program from 2000 until 2006. There were many success stories for both parents and children, who participated in the project. In 2014, one of the children who was in the program as an infant, graduated valedictorian. In 2006, the federal funding for the project was diverted to the wars. We were able to continue the program for two more years, with funding from local businesses and foundations, until the financial down turn in 2008, when it ended.

Now, that the economy has improved, it is imperative that we start this project again, immediately. Please speak to the Common Council about putting start up funding in the budget for family literacy. Also, we ask that you support our effort to garner funding, for this cause, from local businesses, foundations, the state and the federal government. Our most important obligation is the proper care of our children. And success, in that regard, is very much tied to educating them properly.

Those of us, spearheading this extremely important endeavor, are targeting September 2019 to implement Poughkeepsie Family Literacy again. We are optimistic that, with your help, we will meet that goal. Our committee would like to meet with you in the near future to discuss our strategy further; and get your input. You may reach me at (845) 964-2335, if you have questions; and to give me some tentative dates that we may meet.

Sincerely,

Wesley J. Lee, President of the Family Literacy Project

[supanova_question]

MGMT 650 Critical Article Review Mathematics Assignment Help

MGMT 650 Critical Review Assignment

The article for this assignment is provided in the syllabus, under week 9. This is not a group project and it must be done independently.

Read through this outline carefully. When your instructor grades your submission, they will be looking to see if you followed the provided format: you can lose points if you do not. If you have any questions about what to do or need interpretation of the instructions, please post them in the Questions breakout room so that all students can benefit from the information.

Mastery of statistics involves not only the ability to generate sound statistical data, but also the ability to critically evaluate the statistical analysis of others. The latter is the focus of the Critical Review assignment in MGMT 650. A review, or critique, is not a summary or a simple retelling of the major findings in a research article. It is much more. It assesses how well the researcher carries out the required steps in the research process.

Elements of the critique

Summary of the article (Discuss what the article is about) This part SHOULD NOT include any of your personal input but rather just summarize what the author did in his/her research.

  • Research Topic
    • What question is the researcher trying to answer?
  • Research Methodology
    • How did the researcher study the topic? Survey? Experiment? Statistical Analysis?
    • Briefly answer who, what, where, and when, and how.
  • Major Conclusions
    • What does the author conclude?
    • What recommendations does he make?

This section should be about 1.5 pages in general.

The next part is the key of the critique.This next sections of your paper gives an assessment of how well the research was conducted based on what you learned.Remember you can use your own personal experience and outside articles to help you support your point of view in this section of the assignment.

In-depth critique of the article (Discuss how well the research is conducted in your own words)

Write a brief paragraph for each of the following listed elements in your own words:

  • Purpose
  • Literature Review
    • Is the review logically organized?
    • Does it offer a balanced critical analysis of the literature?
    • Is the majority of the literature of recent origin?
    • Is it empirical in nature?
  • Objectives/hypotheses
    • Has a research question or hypothesis been identified?
    • Is it clearly stated?
    • Is it consistent with discussion in the literature review?
  • Ethical Standards Applied
    • Were the participants fully informed about the nature of the research?
    • Was confidentiality guaranteed?
    • Were participants protected from harm?
  • Operational Definitions
    • Are all terms, theories, and concepts used in the study clearly defined?
  • Methodology
    • Is the research design clearly identified?
    • Has the data gathering instrument been described?
    • Is the instrument appropriate? How was it developed?
    • Were reliability and validity testing undertaken and the results discussed?
    • Was a pilot study undertaken?
  • Data Analysis/Results
    • What type of data and statistical analysis was undertaken? Was it appropriate?
    • How many of the sample participated? Significance of the findings?
  • Discussion
    • Are the findings linked back to the literature review?
    • If a hypothesis was identified was it supported?
    • Were the strengths and limitations of the study including generalizability discussed?
    • Was a recommendation for further research made?
  • References
    • Were all the books, journals and other media alluded to in the study accurately referenced?
  • Conclusion
    • Considering all of the evaluation categories, is the article well or poorly researched?

The following online article may be helpful to you. Step-by-step guide to critiquing research. Part 1:

Quantitative research

https://lancashirecare.files.wordpress.com/2008/03/step-by-step-guide-to-criti-research-part-1-quantitative-reseawrch.pdf

Layout of your paper and other writing requirements

Your final report should be organized in the following format:

  • Title page
  • Brief summary of article
  • In-depth critique of article
  • Bibliography

Additional writing requirements:

  • Submit your paper as a Word document. No PDF files.
  • Double-space
  • Use 12 point Times New Roman font and 1 inch margins
  • Use section headings to identify the different components of your discussion
  • Number all pages after the title page
  • Use APA format for citations and bibliography
  • Do not use quotes from the article, paraphrase
  • Keep the tone formal. Write like a researcher. Avoid the use of first person pronouns such as I, we, me, us, etc.
  • Check for spelling, punctuation and grammatical errors
  • Keep your paper to 5-6 pages, not including the title page
  • When submitting to LEO, incorporate your name in the filename that you use. For example, Smith_critique.docx
  • Normal late penalties apply

[supanova_question]

Ethics, Law and Cybersecurity Computer Science Assignment Help

Instructions: There are four (4) topic areas listed below that are designed to measure your knowledge level specific to the social issues of equity and access relative to class, race and gender. You must respond to #2 and select any other two of these topic areas providing appropriate responses in essay form. In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class, all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate.

Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text. Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well. You cannot use information from the text book or any book/article by the author of the text book as a current event. Make sure that your reference has a date of publication. For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question. This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies. You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified.

You should type your responses directly under the appropriate question. Be sure to include your name on your quiz. Only the first three (3) questions with answers will be graded. Include your name in the document filename. Your completed quiz must be placed in the appropriate eCollege Dropbox, no later than 11:59pm on the due date. Do well.

  1. (a) Do we, as a society, have a special obligation to disabled persons to ensure that they have full Internet access? (b) Is the argument that by providing improved access and services for disabled persons, non-disabled users will benefit as well, a reasonable argument? Consider that it can be dangerous to reason along this line; for example, suppose that non-disabled persons did not benefit from software applications designed for the disabled. (c) Would that be a reason for not investing in software for disabled people? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  2. Theismeyer described racist/hate Web sites in this chapter. (a) Should Web sites that promote racist speech be allowed to thrive on the Internet? (b) Has the proliferation of these sites increased the incidence of racism on a global scale? Or is the Internet, as some have suggested, a force that can help to reduce racism? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  3. The increased use of expert systems (ES) technology in many professional fields has generated some ethical and social concerns. Some ethical controversies surrounding ESs have to do with critical decisions, including life and death decisions; for example, (a) should “expert doctors” be allowed to make decisions that could directly result in the death of, or cause serious harm to a patient? If so, (b) who is ultimately responsible for the ES’s decision? (c) Is the hospital that owns the particular ES responsible? (d) Should the knowledge engineer who designed the ES be held responsible? Or is the ES itself responsible? In answering these questions, you may want to take a look back in chapter 4, specifically the case involving Therac-25. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  4. (a) What obligations does the United States have, as a democratic nation concerned with guaranteeing equal opportunities for all its citizens, to ensure that all its citizens have full access to the Internet? (b) Does the United States also have obligations to developing countries to ensure that they have global access to the Internet? If so, (c) What is the extent of those obligations? If not, (d) Why? For example, (e) Should engineers working in the United States and other developed countries design applications to ensure that people living in remote areas with low connectivity and poor bandwidth have reasonable Internet access? If so, (f) Who should pay for the development of these software applications? If not, (g) Why? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

[supanova_question]

Assignment and Discussion Computer Science Assignment Help

Task 1

Assignment 1:

Topic: Cloud Security (based on content from Chapter 6 in Cloud Computing: Concepts, Technology & Architecture)

Overview: The diagram provided in the assignment rubric illustrates interaction between two cloud service consumers (A and B) and two virtual servers (A and B) hosted on a cloud.

Based on the limited information provided in the depicted scenario, describe three types of attacks that could potentially be carried out if any of the programs outside of the cloud were malicious.

Provide a brief explanation justifying the threat of each proposed attack. For each of the three types of attacks, please list and describe a potential cause.

Please ensure you refer to the attached document for details on the requirements for this assignment!

Note: Your answer should be 1500 words please refer below attached Assignment 3 document

Task 2:

Assignment 2

1. Briefly discuss the major approaches you would recommend for sourcing. What factors should be considered in deciding which strategy to adopt?

2. If you need to change demand to bring it closer to available capacity, what methods would you use to achieve this? Briefly discuss.

Note : Each Answer should be 500 words (Question 1 and Question 2)

Task 3:

Discussion

In your initial post, discuss the differences between Virtualization and Cloud Computing. You are to post directly to the thread. Any discussion posted in an attachment will be disregarded.

Please find one organization that has recently adopted virtualization and summarize their reasons for taking this approach. What challenges did they face?

Your initial post is due by 11:59 PM Wednesday 11/06/19 and be a minimum of 500 words.

Respond substantively to at least two other students’ posts. Compare and discuss the key challenges that other classmates listed in their initial post. Were they similar to other organizations? If not, why? If so, how?

Your responses are due by 11:59 PM Sunday 11/10/19 and be a minimum of 250 words each. Discussions threads will close on Sunday, 11:59 pm Eastern Time (EST)in the week they are assigned.

*please remember to include at least three credible scholarly references with your initial post and two credible scholarly references with your response posts!

Note Discussion should be 1000 words

and each response should be 300 words: Total 3 responses

[supanova_question]

https://anyessayhelp.com/

Layout of your paper and other writing requirements

Your final report should be organized in the following format:

  • Title page
  • Brief summary of article
  • In-depth critique of article
  • Bibliography

Additional writing requirements:

  • Submit your paper as a Word document. No PDF files.
  • Double-space
  • Use 12 point Times New Roman font and 1 inch margins
  • Use section headings to identify the different components of your discussion
  • Number all pages after the title page
  • Use APA format for citations and bibliography
  • Do not use quotes from the article, paraphrase
  • Keep the tone formal. Write like a researcher. Avoid the use of first person pronouns such as I, we, me, us, etc.
  • Check for spelling, punctuation and grammatical errors
  • Keep your paper to 5-6 pages, not including the title page
  • When submitting to LEO, incorporate your name in the filename that you use. For example, Smith_critique.docx
  • Normal late penalties apply

[supanova_question]

Ethics, Law and Cybersecurity Computer Science Assignment Help

Instructions: There are four (4) topic areas listed below that are designed to measure your knowledge level specific to the social issues of equity and access relative to class, race and gender. You must respond to #2 and select any other two of these topic areas providing appropriate responses in essay form. In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class, all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate.

Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text. Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well. You cannot use information from the text book or any book/article by the author of the text book as a current event. Make sure that your reference has a date of publication. For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question. This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies. You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified.

You should type your responses directly under the appropriate question. Be sure to include your name on your quiz. Only the first three (3) questions with answers will be graded. Include your name in the document filename. Your completed quiz must be placed in the appropriate eCollege Dropbox, no later than 11:59pm on the due date. Do well.

  1. (a) Do we, as a society, have a special obligation to disabled persons to ensure that they have full Internet access? (b) Is the argument that by providing improved access and services for disabled persons, non-disabled users will benefit as well, a reasonable argument? Consider that it can be dangerous to reason along this line; for example, suppose that non-disabled persons did not benefit from software applications designed for the disabled. (c) Would that be a reason for not investing in software for disabled people? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  2. Theismeyer described racist/hate Web sites in this chapter. (a) Should Web sites that promote racist speech be allowed to thrive on the Internet? (b) Has the proliferation of these sites increased the incidence of racism on a global scale? Or is the Internet, as some have suggested, a force that can help to reduce racism? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  3. The increased use of expert systems (ES) technology in many professional fields has generated some ethical and social concerns. Some ethical controversies surrounding ESs have to do with critical decisions, including life and death decisions; for example, (a) should “expert doctors” be allowed to make decisions that could directly result in the death of, or cause serious harm to a patient? If so, (b) who is ultimately responsible for the ES’s decision? (c) Is the hospital that owns the particular ES responsible? (d) Should the knowledge engineer who designed the ES be held responsible? Or is the ES itself responsible? In answering these questions, you may want to take a look back in chapter 4, specifically the case involving Therac-25. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  4. (a) What obligations does the United States have, as a democratic nation concerned with guaranteeing equal opportunities for all its citizens, to ensure that all its citizens have full access to the Internet? (b) Does the United States also have obligations to developing countries to ensure that they have global access to the Internet? If so, (c) What is the extent of those obligations? If not, (d) Why? For example, (e) Should engineers working in the United States and other developed countries design applications to ensure that people living in remote areas with low connectivity and poor bandwidth have reasonable Internet access? If so, (f) Who should pay for the development of these software applications? If not, (g) Why? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

[supanova_question]

Assignment and Discussion Computer Science Assignment Help

Task 1

Assignment 1:

Topic: Cloud Security (based on content from Chapter 6 in Cloud Computing: Concepts, Technology & Architecture)

Overview: The diagram provided in the assignment rubric illustrates interaction between two cloud service consumers (A and B) and two virtual servers (A and B) hosted on a cloud.

Based on the limited information provided in the depicted scenario, describe three types of attacks that could potentially be carried out if any of the programs outside of the cloud were malicious.

Provide a brief explanation justifying the threat of each proposed attack. For each of the three types of attacks, please list and describe a potential cause.

Please ensure you refer to the attached document for details on the requirements for this assignment!

Note: Your answer should be 1500 words please refer below attached Assignment 3 document

Task 2:

Assignment 2

1. Briefly discuss the major approaches you would recommend for sourcing. What factors should be considered in deciding which strategy to adopt?

2. If you need to change demand to bring it closer to available capacity, what methods would you use to achieve this? Briefly discuss.

Note : Each Answer should be 500 words (Question 1 and Question 2)

Task 3:

Discussion

In your initial post, discuss the differences between Virtualization and Cloud Computing. You are to post directly to the thread. Any discussion posted in an attachment will be disregarded.

Please find one organization that has recently adopted virtualization and summarize their reasons for taking this approach. What challenges did they face?

Your initial post is due by 11:59 PM Wednesday 11/06/19 and be a minimum of 500 words.

Respond substantively to at least two other students’ posts. Compare and discuss the key challenges that other classmates listed in their initial post. Were they similar to other organizations? If not, why? If so, how?

Your responses are due by 11:59 PM Sunday 11/10/19 and be a minimum of 250 words each. Discussions threads will close on Sunday, 11:59 pm Eastern Time (EST)in the week they are assigned.

*please remember to include at least three credible scholarly references with your initial post and two credible scholarly references with your response posts!

Note Discussion should be 1000 words

and each response should be 300 words: Total 3 responses

[supanova_question]

https://anyessayhelp.com/

Layout of your paper and other writing requirements

Your final report should be organized in the following format:

  • Title page
  • Brief summary of article
  • In-depth critique of article
  • Bibliography

Additional writing requirements:

  • Submit your paper as a Word document. No PDF files.
  • Double-space
  • Use 12 point Times New Roman font and 1 inch margins
  • Use section headings to identify the different components of your discussion
  • Number all pages after the title page
  • Use APA format for citations and bibliography
  • Do not use quotes from the article, paraphrase
  • Keep the tone formal. Write like a researcher. Avoid the use of first person pronouns such as I, we, me, us, etc.
  • Check for spelling, punctuation and grammatical errors
  • Keep your paper to 5-6 pages, not including the title page
  • When submitting to LEO, incorporate your name in the filename that you use. For example, Smith_critique.docx
  • Normal late penalties apply

[supanova_question]

Ethics, Law and Cybersecurity Computer Science Assignment Help

Instructions: There are four (4) topic areas listed below that are designed to measure your knowledge level specific to the social issues of equity and access relative to class, race and gender. You must respond to #2 and select any other two of these topic areas providing appropriate responses in essay form. In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class, all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate.

Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text. Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well. You cannot use information from the text book or any book/article by the author of the text book as a current event. Make sure that your reference has a date of publication. For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question. This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies. You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified.

You should type your responses directly under the appropriate question. Be sure to include your name on your quiz. Only the first three (3) questions with answers will be graded. Include your name in the document filename. Your completed quiz must be placed in the appropriate eCollege Dropbox, no later than 11:59pm on the due date. Do well.

  1. (a) Do we, as a society, have a special obligation to disabled persons to ensure that they have full Internet access? (b) Is the argument that by providing improved access and services for disabled persons, non-disabled users will benefit as well, a reasonable argument? Consider that it can be dangerous to reason along this line; for example, suppose that non-disabled persons did not benefit from software applications designed for the disabled. (c) Would that be a reason for not investing in software for disabled people? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  2. Theismeyer described racist/hate Web sites in this chapter. (a) Should Web sites that promote racist speech be allowed to thrive on the Internet? (b) Has the proliferation of these sites increased the incidence of racism on a global scale? Or is the Internet, as some have suggested, a force that can help to reduce racism? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  3. The increased use of expert systems (ES) technology in many professional fields has generated some ethical and social concerns. Some ethical controversies surrounding ESs have to do with critical decisions, including life and death decisions; for example, (a) should “expert doctors” be allowed to make decisions that could directly result in the death of, or cause serious harm to a patient? If so, (b) who is ultimately responsible for the ES’s decision? (c) Is the hospital that owns the particular ES responsible? (d) Should the knowledge engineer who designed the ES be held responsible? Or is the ES itself responsible? In answering these questions, you may want to take a look back in chapter 4, specifically the case involving Therac-25. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  4. (a) What obligations does the United States have, as a democratic nation concerned with guaranteeing equal opportunities for all its citizens, to ensure that all its citizens have full access to the Internet? (b) Does the United States also have obligations to developing countries to ensure that they have global access to the Internet? If so, (c) What is the extent of those obligations? If not, (d) Why? For example, (e) Should engineers working in the United States and other developed countries design applications to ensure that people living in remote areas with low connectivity and poor bandwidth have reasonable Internet access? If so, (f) Who should pay for the development of these software applications? If not, (g) Why? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

[supanova_question]

Assignment and Discussion Computer Science Assignment Help

Task 1

Assignment 1:

Topic: Cloud Security (based on content from Chapter 6 in Cloud Computing: Concepts, Technology & Architecture)

Overview: The diagram provided in the assignment rubric illustrates interaction between two cloud service consumers (A and B) and two virtual servers (A and B) hosted on a cloud.

Based on the limited information provided in the depicted scenario, describe three types of attacks that could potentially be carried out if any of the programs outside of the cloud were malicious.

Provide a brief explanation justifying the threat of each proposed attack. For each of the three types of attacks, please list and describe a potential cause.

Please ensure you refer to the attached document for details on the requirements for this assignment!

Note: Your answer should be 1500 words please refer below attached Assignment 3 document

Task 2:

Assignment 2

1. Briefly discuss the major approaches you would recommend for sourcing. What factors should be considered in deciding which strategy to adopt?

2. If you need to change demand to bring it closer to available capacity, what methods would you use to achieve this? Briefly discuss.

Note : Each Answer should be 500 words (Question 1 and Question 2)

Task 3:

Discussion

In your initial post, discuss the differences between Virtualization and Cloud Computing. You are to post directly to the thread. Any discussion posted in an attachment will be disregarded.

Please find one organization that has recently adopted virtualization and summarize their reasons for taking this approach. What challenges did they face?

Your initial post is due by 11:59 PM Wednesday 11/06/19 and be a minimum of 500 words.

Respond substantively to at least two other students’ posts. Compare and discuss the key challenges that other classmates listed in their initial post. Were they similar to other organizations? If not, why? If so, how?

Your responses are due by 11:59 PM Sunday 11/10/19 and be a minimum of 250 words each. Discussions threads will close on Sunday, 11:59 pm Eastern Time (EST)in the week they are assigned.

*please remember to include at least three credible scholarly references with your initial post and two credible scholarly references with your response posts!

Note Discussion should be 1000 words

and each response should be 300 words: Total 3 responses

[supanova_question]

https://anyessayhelp.com/

Layout of your paper and other writing requirements

Your final report should be organized in the following format:

  • Title page
  • Brief summary of article
  • In-depth critique of article
  • Bibliography

Additional writing requirements:

  • Submit your paper as a Word document. No PDF files.
  • Double-space
  • Use 12 point Times New Roman font and 1 inch margins
  • Use section headings to identify the different components of your discussion
  • Number all pages after the title page
  • Use APA format for citations and bibliography
  • Do not use quotes from the article, paraphrase
  • Keep the tone formal. Write like a researcher. Avoid the use of first person pronouns such as I, we, me, us, etc.
  • Check for spelling, punctuation and grammatical errors
  • Keep your paper to 5-6 pages, not including the title page
  • When submitting to LEO, incorporate your name in the filename that you use. For example, Smith_critique.docx
  • Normal late penalties apply

[supanova_question]

Ethics, Law and Cybersecurity Computer Science Assignment Help

Instructions: There are four (4) topic areas listed below that are designed to measure your knowledge level specific to the social issues of equity and access relative to class, race and gender. You must respond to #2 and select any other two of these topic areas providing appropriate responses in essay form. In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class, all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate.

Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text. Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well. You cannot use information from the text book or any book/article by the author of the text book as a current event. Make sure that your reference has a date of publication. For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question. This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies. You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified.

You should type your responses directly under the appropriate question. Be sure to include your name on your quiz. Only the first three (3) questions with answers will be graded. Include your name in the document filename. Your completed quiz must be placed in the appropriate eCollege Dropbox, no later than 11:59pm on the due date. Do well.

  1. (a) Do we, as a society, have a special obligation to disabled persons to ensure that they have full Internet access? (b) Is the argument that by providing improved access and services for disabled persons, non-disabled users will benefit as well, a reasonable argument? Consider that it can be dangerous to reason along this line; for example, suppose that non-disabled persons did not benefit from software applications designed for the disabled. (c) Would that be a reason for not investing in software for disabled people? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  2. Theismeyer described racist/hate Web sites in this chapter. (a) Should Web sites that promote racist speech be allowed to thrive on the Internet? (b) Has the proliferation of these sites increased the incidence of racism on a global scale? Or is the Internet, as some have suggested, a force that can help to reduce racism? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  3. The increased use of expert systems (ES) technology in many professional fields has generated some ethical and social concerns. Some ethical controversies surrounding ESs have to do with critical decisions, including life and death decisions; for example, (a) should “expert doctors” be allowed to make decisions that could directly result in the death of, or cause serious harm to a patient? If so, (b) who is ultimately responsible for the ES’s decision? (c) Is the hospital that owns the particular ES responsible? (d) Should the knowledge engineer who designed the ES be held responsible? Or is the ES itself responsible? In answering these questions, you may want to take a look back in chapter 4, specifically the case involving Therac-25. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  4. (a) What obligations does the United States have, as a democratic nation concerned with guaranteeing equal opportunities for all its citizens, to ensure that all its citizens have full access to the Internet? (b) Does the United States also have obligations to developing countries to ensure that they have global access to the Internet? If so, (c) What is the extent of those obligations? If not, (d) Why? For example, (e) Should engineers working in the United States and other developed countries design applications to ensure that people living in remote areas with low connectivity and poor bandwidth have reasonable Internet access? If so, (f) Who should pay for the development of these software applications? If not, (g) Why? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

[supanova_question]

Assignment and Discussion Computer Science Assignment Help

Task 1

Assignment 1:

Topic: Cloud Security (based on content from Chapter 6 in Cloud Computing: Concepts, Technology & Architecture)

Overview: The diagram provided in the assignment rubric illustrates interaction between two cloud service consumers (A and B) and two virtual servers (A and B) hosted on a cloud.

Based on the limited information provided in the depicted scenario, describe three types of attacks that could potentially be carried out if any of the programs outside of the cloud were malicious.

Provide a brief explanation justifying the threat of each proposed attack. For each of the three types of attacks, please list and describe a potential cause.

Please ensure you refer to the attached document for details on the requirements for this assignment!

Note: Your answer should be 1500 words please refer below attached Assignment 3 document

Task 2:

Assignment 2

1. Briefly discuss the major approaches you would recommend for sourcing. What factors should be considered in deciding which strategy to adopt?

2. If you need to change demand to bring it closer to available capacity, what methods would you use to achieve this? Briefly discuss.

Note : Each Answer should be 500 words (Question 1 and Question 2)

Task 3:

Discussion

In your initial post, discuss the differences between Virtualization and Cloud Computing. You are to post directly to the thread. Any discussion posted in an attachment will be disregarded.

Please find one organization that has recently adopted virtualization and summarize their reasons for taking this approach. What challenges did they face?

Your initial post is due by 11:59 PM Wednesday 11/06/19 and be a minimum of 500 words.

Respond substantively to at least two other students’ posts. Compare and discuss the key challenges that other classmates listed in their initial post. Were they similar to other organizations? If not, why? If so, how?

Your responses are due by 11:59 PM Sunday 11/10/19 and be a minimum of 250 words each. Discussions threads will close on Sunday, 11:59 pm Eastern Time (EST)in the week they are assigned.

*please remember to include at least three credible scholarly references with your initial post and two credible scholarly references with your response posts!

Note Discussion should be 1000 words

and each response should be 300 words: Total 3 responses

[supanova_question]

I have 4 Pages research paper! Humanities Assignment Help

I have 4 Pages research paper! Humanities Assignment Help

× How can I help you?