The Saudi-Iranian Rivalry Writing Assignment Help. The Saudi-Iranian Rivalry Writing Assignment Help.
(/0x4*br />
I have wrote 4 pages of the paper and included some of the references, So just go through the references in the paper and include the flash points between the Saudi-Iranian rivalry from the 1979 of the Iranian revolutionary until the current time
Identify the Enduring rivalry and Strategic Rivalry
bring the Analysis of the article below to come out with result to between the Saudi-Iranian Rivalry
“The Initiation and Termination of Enduring Rivalries: The Impact of Political Shocks
Author(s): Gary Goertz and Paul F. Diehl”
My hypothesis is deprived from the article above:
“If there is a political shock, then a strategic rivalry is more likely to occur? What I am going to demonstrate to you is the Saudi-Iranian rivalry?”
Flash points of history about the Saudi-Iranian rivalry should include the history of:
– The Iranian revolution 1979
– The fall of Saddam Hussien (Iraq)
– Arab Spring 2011 (Anti-government protest in the Middle East)
– Execution by saudis of Shia cleric Sheikh Nimr Al-Nimr (2016)
– Lebanese Prime Minster Saad Hariri resigns
– All I need is scholarly articles that indicates the history of those two countries in the next 5 hours please.
The Saudi-Iranian Rivalry Writing Assignment Help[supanova_question]
write a reflection paper of the first conceptual framework of the college of education, Technological skills. In your pape Humanities Assignment Help
you are supposed to write a reflection paper of the first conceptual framework of the college of education, Technological skills. In your paper:
1/explain the meaning of the conceptual framework using your own words.
2/explain how the work attached can be considered as an evidence that you have, as a student in college of education, achieved this conceptual framework.
this can be done through:
a/mentioning the title of the work and the subject, World Literature, in which it had been submitted.
b/mentioning the objectives of the work.
c/ writing a brief summary of the work.
d/the reason why you chose this particular work as an evidence.
e/ how this work is related to the conceptual framework.
[supanova_question]
why to include in your response to the following: Business Finance Assignment Help
Before starting this activity, review the Week 5 LEARN (e-Activity) (there are several) and read Chapter 6 in the course text book. Doing this will give you the why to include in your response to the following:
“Victory Motorcycles”
· From the LEARN e-Activity and the case study 29 (p. 419 in the textbook), evaluate the Corporate-Level Strategy of Victory Motorcycles to determine whether you believe the strategy is appropriate to offset forces in the industry.
o Provide specific examples to support your response.
· Make recommendations for improving this strategy as well as describing any challenges you foresee in executing those recommendations.
o Provide specific examples to support your response.
Be sure to respond to at least one (1) other student.
[supanova_question]
Management and implementation of investment portfolio Business Finance Assignment Help
James O’Hara, an ABC client, is a single, 37-year-old, self-employed plastic surgeon who currently owns a condominium in Tiburon, CA, worth $1.4 million. James is doing quite well financially. His gross income from his practice last year exceeded $350,000. Upon graduation from medical school, he began investing in stocks and opened an IRA. He made his selections mostly on the basis of articles he read describing good investment opportunities in various personal finance magazines. Because of his hectic schedule, Dr. O’Hara has seldom taken the time to evaluate his portfolio performance, but he feels it is not quite up to par.
Dr. O’Hara currently has about $350,000 in investable funds with about $130,000 currently invested in several stocks at a local discount brokerage house, as well as an IRA account funded with three mutual funds that are currently worth about $170,000. After working with a staff financial planner and investment advisor at ABC, the following investment strategies have been drafted for Dr. O’Hara based on his financial needs and objectives:
- Dr. O’Hara will contribute the maximum allowable yearly contribution to his newly established private practice 401(k) plan, which will also be managed and monitored by ABC. The account is to be funded with only one well-performing mutual fund. The fund investment objectives must include the ability to earn market returns consistently and minimal yearly management fees.
- A sum of $30,000 is to be earmarked for Dr. O’Hara’s upcoming wedding and honeymoon trip in June of next year. Dr. O’Hara wants this portion invested in a very safe place with no expense, sales, or early withdrawal charges.
- Dr. O’Hara is also planning to assist his nephew with medical school expenses in 3 years. To this end, he wants $60,000 earmarked in an account with higher than current certificate of deposit or money market rates but minimal market volatility.
- Dr. O’Hara’s average, long-term (5 years and on) minimum required rate on equity investments is 9%.
- Dr. O’Hara’s risk tolerance questionnaire indicates that he is a moderately aggressive investor.
Assignment:
You are asked to assist the ABC financial advisor in charge of Dr. O’Hara’s account with the compilation of a presentation package. Present the information in a report of 4-5 pages that covers the following:
- Construct an asset allocation model for Dr. O’Hara given his financial objectives and risk tolerance level.
- Explain and defend the rationale behind recommending the model.
- The asset allocation must have between 3 and 5 asset classes.
- Recommend a suitable investment alternative for Dr. O’Hara’s wedding and his nephew’s tuition assistance objectives.
- Thoroughly explain and defend your recommendations.
- Recommend a suitable mutual fund for Dr. O’Hara’s 401(k) plan. Provide detailed information about the fund, including the following:
- The name of the fund
- Its portfolio manager’s name, experience, and qualifications
- Its investment philosophy and strategy
- How long this fund been in existence
- Its current NAV
- Its yearly management fees, which must not exceed 1% of amount invested
- The fund’s 1-year, 3-year, and 5-year returns*
- An assessment of some of the risks involved in investing in this fund
*Please do not pick a mutual fund that has been in existence for less than 5 years because it may not have an established track record. Providing a link to a fund Web page is not an acceptable substitute for your executive summary for the client.
- Assuming a risk-free rate of 4%, the following data were derived after a close examination of Dr. O’Hara’s IRA mutual fund portfolio:
Fund Average Annual Return Beta Franklin Domestic Fund 0.078 0.950 Scudder Pacific Basin Fund 0.125 1.250 American Mortgage Securities Fund 0.0750 0.25
Using the Treynor ratio (also known as the Treynor measure), which fund has the best risk-adjusted performance? Show your calculations.
apa citations format
[supanova_question]
I need this finished by 6 pm today. Please help!!! Other Assignment Help
In your role as a security professional in XYZ company, you have been asked to present a PowerPoint presentation to address cybersecurity challenges the company may face as it plans to expand into global sales. Address the issues below in your presentation.
- Determine the scope of e-commerce crime and security challenges.
- Outline the concerns as the company conducts business internationally.
- Describe any governmental compliance needs to which the company needs to adhere.
- How do you protect the organization from repudiation?
- What challenges does the company face with exchange rates for online purchases?
- How are the company’s policies and procedures important in creating the security?
- Describe the differences between a U.S. customer and an international customer who each make a purchase from your fictitious organization, which is based in the United States.
- Find at least one graphic illustrating an Internet-based payment system, and utilize it in your presentation.
You must elaborate on the information provided on each slide. To do so, you can either utilize the speaker notes function within PowerPoint to summarize and/or explain the slides’ contents, or you can record voice narration for each slide. You are not required to do both, but you must choose one of the two options above to receive full credit.
Your PowerPoint presentation must contain at least eight slides; the title and reference slides do not count toward meeting the minimum slide requirement.
[supanova_question]
[supanova_question]
W2 Microsoft Word Assignment – “Table of Job Listings” Writing Assignment Help
Do Project 2E Table of Job Listings that begins on page 263 of your textbook. Submit the document by clicking the Attachments button to attach the file. Do not paste the document in the Message area.
You will need to download and use the following file to complete this project:
In addition to the assignment file, answer the following question with your submission. This can be answered directly in your Submission comment area, or as a separate Word attachment file:
In this Week’s reading and prep work, you learned about templates in Word. Think about some examples of where creating a template in Microsoft Word might be useful. How could you either envision yourself benefitting from a template, or how someone in a position in an office that deals with creating a particular document type or form on a regular basis might use a template? Please look to answer this in at least 3 complete sentences in order to address it adequately.
W2 Microsoft Word Assignment – “Table of Job Listings” Writing Assignment Help[supanova_question]
Looking for help Writing Assignment Help
The final project is a comprehensive project covering all the topics covered throughout the course.The specific instructions are included in the document template below. Make sure you follow these guidelines (if you use the template, many of the formatting guidelines are already set):
- The entire document should follow these formatting requirements:
- Times New Roman, 12 point font
- Double-spaced (with no extra spacing before or after paragraphs)
- One-inch margins
- Correct spelling, grammar, and punctuation
- Complete sentences
- Each new main heading should start on a new page (as in the template)
- The title of the report should include your business name
- When you open the template, it will be Read Only. Save it before editing.
- Save the project as Implementation Plan – YourName
- Do not upload your final Implementation Plan until you have finished the entire project.
Implementation Plan Template.docx
Grading will be based upon the Implementation Plan Rubric.pdf.
[supanova_question]
Defense in Depth Computer Science Assignment Help
Assignment: Defense in Depth
Oftentimes, the process of implementing security opens one’s eyes to other forms of security not previously considered. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this assignment, you are to design a network to incorporate the following:
Corporate Site (Chicago)
- All servers exist here (Web server, file server, print server, mail server, ftp server)
- Connection to the Internet (50mbps)
- 300 employees who only need access to local corporate resources and the Internet
1 Remote Site (8 miles away)
- 20 employees who need access to all resources at corporate plus the Internet
- Connection to the Internet (3mbps)
Write a paper in which you:
- Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind which depicts:
- All network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and/or others)
- The interconnections between network devices
- The end user (client) devices (desktops, laptops)
- The Internet cloud, generically, to represent your network’s interface to the Internet
- Describe the flow of data through your network, and explain how your network design provides multiple layers of security.
- Use at least four(4) quality resources in this assignment. (Note: Wikipedia and similar websites do not qualify as quality resources.)
- Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams/charts must be imported into the Word document before the paper is submitted.
Your assignment must follow these formatting requirements:
- Use proper APA format.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page (if applicable) are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
- Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.
- Identify network security tools and discuss techniques for network protection.
- Use technology and information resources to research issues in network security design.
- Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.
Note: The graphically depicted solution is not included in the required page length. Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric.
Points: 80 |
Assignment 1: Defense in Depth |
||||
Criteria |
Unacceptable |
Needs Improvement |
Fair |
Proficient |
Exemplary |
1a. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind, which depicts all network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and/or others). Weight: 15% |
Did not submit or complete the assignment. |
Attempted to use Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts all network devices used (routers, switches, hubs, firewalls, VPNsproxies, and/or others). |
Partially used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts all network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and/or others). |
Satisfactorily used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts all network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and/or others). |
Thoroughly used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts all network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and/or others). |
1b. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind, which depicts the interconnections between network devices. |
Did not submit or complete the assignment. |
Attempted to use Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the interconnections between network devices. |
Partially used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the interconnections between network devices. |
Satisfactorily used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the interconnections between network devices. |
Thoroughly used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the interconnections between network devices. |
1c. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind, which depicts the end user (client) devices (desktops, laptops). Weight: 15% |
Did not submit or complete the assignment. |
Attempted to use Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the end user (client) devices (desktops, laptops). |
Partially used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the end user (client) devices (desktops, laptops). |
Satisfactorily used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the end user (client) devices (desktops, laptops). |
Thoroughly used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the end user (client) devices (desktops, laptops). |
1d. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind, which depicts the Internet cloud, generically, to represent your network’s interface to the Internet. Weight: 15% |
Did not submit or complete the assignment. |
Attempted to use Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts the Internet cloud, generically, to represent your network’s interface to the Internet. |
Partially used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the Internet cloud, generically, to represent your network’s interface to the Internet. |
Satisfactorily used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the Internet cloud, generically, to represent your network’s interface to the Internet. |
Thoroughly used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the Internet cloud, generically, to represent your network’s interface to the Internet. |
2. Describe the flow of data through your network and explain how your network design provides multiple layers of security. Weight: 30% |
Did not submit or complete the assignment. |
Attempted to describe the flow of data through your network. Attempted to explain how your network design provides multiple layers of security. |
Partially described the flow of data through your network. Partially explained how your network design provides multiple layers of security. |
Satisfactorily described the flow of data through your network. Satisfactorily explained how your network design provides multiple layers of security. |
Thoroughly described the flow of data through your network. Thoroughly explained how your network design provides multiple layers of security. |
3. Cite 4 references. Weight: 5% |
Did not submit or complete the assignment. |
No references provided. |
Does not meet the required number of references; some or all references are poor-quality choices. |
Meets the number of required references; all references are high-quality choices. |
Exceeds the number of required references; all references are high-quality choices. |
4. Clarity, writing mechanics, and proper APA formatting requirements. Weight: 5% |
Did not submit or complete the assignment. |
More than 6 errors present. |
5-6 errors present. |
3-4 errors present. |
0-2 errors present. |
[supanova_question]
5-7 page essay Humanities Assignment Help
task: construct a 5-7 essay on a social problem in todays society & explain how it relates to 1 of the 4 sociology theories.
-my social problem I choose is immigration
-the theory I will relate it to is experimental method.
-must use informative in the 5 sources I provided for you in the attachment below (any additional sources please work cite it )
p.s: if you the writer, believe the theory I choose isn’t a good one to work on you can gladly switch for another theory that best suits the essay. the other 3 theories are SURVEY, PARTICIPANT OBSERVATION AND EXISTING SOURCES.you may google these theories to see their definition
-in the essay talk about subjects like causes and effects ,difference and similarities on illegal and legal, what’s wrong with the immigration policy, why are people getting into the U.S illegally in the first place, the asylum policy (refugee), & visa privileges.
**use each subject explained above to make a paragraph for the body
-before concussion explain why you choose this topic (immigration)
-work cited
-if possible please keep it at a beginner college level thanks
[supanova_question]
Week 2 Google Docs Assignment – “Parks and Rec” Writing Assignment Help
Overview:
You are the director of Parks and Recreation for a small town in Indiana..One of your regular duties is to enroll children into the summer teeballleague and assign them to teams. Each May, you prepare a newsletterwith the team rosters, mascots, and coach’s name and phone number.This year you will have 63 kids to enroll into 6 teams.To accomplish this, you will need to:1)Open a new Doc and rename itLastNameFirstName_GoogleAssignment22)Create a 4×7 table.3)Label the top row of cells with: “Team Name”, “Team Members”,“Mascot” and “Coach”4)Use background fill to turn the top row of the tables a different color,center and bold the text within the cells. (If your background fill colormakes the text hard to read, you will need to change your font colorto provide contrast)5)Download and use this document to copy and paste information intoyour table:CS165 W2 Assignment Data File You will need to divideup the children between the six teams, but you may use anycombination of teams, children, and coaches that you like.6)Use the “Insert Image” tool to search for a mascot image for eachteam. You may either use Insert–>Image–>Search or perform aGoogle search outside of Docs, copy the URl and useInsert–>Image–>URL to paste in the link.
7)Make sure all content is the same font, same font size, andleft-justified8)Copy and paste the text your summer intern wrote at the top of yourdocument9)At the top of the document, create a title that is appropriate for itspurpose.10)Center, bold, and underline the title. Set the font size to 24 pt.11)Create three line spaces after the title and paste in the greetingblurb from your summer intern. (You will notice your intern’s writinghas several errors. You will suggest changes for her to make.)12)Turn on Suggesting Mode13)Pick 3 errors your intern made and correct them so SuggestingMode generates the sidebar suggestions. Do not resolve thesuggestions.14)Share the document, set the permission to “anyone with agrantham.edu link can EDIT”, copy the sharing link, and paste it intoyour assignment dropbox.
[supanova_question]