only hifsa 5850217 2

Read Carefully…

 

Annotated Bibliography

The purpose of the annotated bibliography is to assist you in developing research analysis skills including critical thinking, writing, and literature research skills. The annotated bibliography should include a paragraph for each source containing the following information:

  • Name of the article, including the complete bibliographic citation, using APA format.
  • Summary/abstract of the article – annotation (sometimes it is helpful to ask yourself the following questions in synthesizing the information:
    • Who? (author)
    • What was done? (e.g., an experimental study investigating the interaction of short term memory and attention)
    • How? (was it done)
  • What were the findings? (identify the major ones)
  • Contributions? (new findings, applications, etc.)

Review the complete instructions for the Final Paper in Week Five. To conduct accurate research for the annotated bibliography, consider the following:

  • Research in peer-reviewed journals or other journals that are considered to have reliable information (do not use sources from the secular press (e.g., Time, Newsweek, or Wikipedia). Review the guidelines for acceptable sources by reading the “Academic Research” section within the Student Responsibilities and Policies tab under Course Home on the left navigation toolbar in your online course.
  • Identify at least ten academic sources at least six of which can be found in the Ashford Online Library. If you do find something on the World Wide Web, it must be authored and be a reliable source.
  • In these journals, the research and information is either reviewed by an editorial team (such as for the Academy of Management Review) or a group of peers (such as in many journals you find through the Ashford Online Library).

For information regarding the annotated bibliography, refer to the Sample Annotated Bibliography found in the Ashford Writing Center within the Learning Resources tab on the left navigation toolbar.

You must use at least ten scholarly sources (at least six of which can be found in the Ashford Online Library) other than the textbook. The descriptions for each source must be at least one paragraph in length. For information regarding APA samples and tutorials, visit the Ashford Writing Center, within the Learning Resources tab on the left navigation toolbar

short paper kant no plagiarism

Short Paper on Kant

Kant famously–and controversially–argued that some knowledge is synthetic a priori. Can you explain in your own words what Kant might have meant by this, and can you give an example of the sort of knowledge that Kant believed possessed this strange status?

HINT: To answer this question in a clear and well-organized manner, you might want to first explain and illustrate Kant’s distinction between apriori and aposteori knowledge and also his distinction between empirical and synthetic judgments.

Please ensure that your essay addresses each component of the assigned questions and that your answer is well-organized, uses excellent, college-level prose, and makes judicious use of textual evidence. Your essay should be 600-900 words long.

 

designing secure network cis534

This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting there three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of [email protected] The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary site of ftp.netneering.com. The third workflow is an externally located employee initiating a VPN session to corporate in order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work. 

Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts. Note: Please use the following page breakdown to complete your assignment:

  • Overall network diagram: One (1) page
  • Datapath diagrams: Three (3) pages (one for each diagram)
  • Write-up: six to ten (6-10) pages

Part 1

  • Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you’ve designed from the user or endpoint device to the Internet cloud, and everything in between, in which you:
    • Follow the access, core, distribution layer model.
    • Include at a minimum:
      • Authentication server (i.e. Microsoft Active Directory)
      • Routers
      • Switches (and / or hubs)
      • Local users
      • Remote users
      • Workstations
      • Files share (i.e. CIFS)
      • Mail server
      • Web servers (both internal and external)
      • Firewalls
      • Internet cloud
      • Web proxy
      • Email proxy
      • FTP server (for internal-to-external transport)
  • Explain each network device’s function and your specific configuration of each networking device.
  • Design and label the bandwidth availability or capacity for each wired connection.

Part 2

  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Local user sends email to a Yahoo recipient. Local (corporate) user having email address [email protected] sends an email to [email protected]
      • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. 
      • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 
      • Show user authentication when necessary.
  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Local user, Jonny Hill, transfers file using ftp through the Internet to another company’s site (ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com.
      • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. 
      • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 
      • Show user authentication when necessary.
  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing tohttps://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.
  • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. 
  • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 
  • Show user authentication when necessary.
  • Explain how your overall design protects the organization from both inside and outside attacks. Give examples. 
  • Explain how your layered design compensates for possible device failures or breaches in network security.
  • Determine whether any possible bottlenecks exist in your design.
  • Explain how to make the file transfer process more secure.

Part 3 

  • Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.
  • Identify network security tools and discuss techniques for network protection
  • Describe the foundational concepts of VPNs.
  • Design a secure network to address a business problem.
  • Use technology and information resources to research issues in network security design.
  • Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.

250 300 words week 2 discussion

I need this done today within the next 3 to 5 hours. NO PLAGIARISM. I WILL CHECK WITH PLAGIARISM SOFTWARE!

 

Select one of the companies below and conduct some basic research. State what you believe is the distinctive competence and core competence of your selected company.  Give an example of how the values and mission statement help to shape planning.Also give some internal and external factors that may influence the business in the future and explain how they will influence the business.

 

1) British Petroleum (BP)
2) Facebook
3) Hyundai
4) Dunkin’ Donuts
5) Netflix

econ 0

A selfless person approaches Jones and Smith with a $100 bill and offers to sell it to the highest bidder, but both the winning and losing bidders must pay her their bids. So if Jones bids $2 and Smith bids $1 they pay a total of $3, but Jones gets the money, leaving him with a net gain of $98 and Smith win -$1. If both bid the same amount, the $100 is split evenly between them. Assume that each of them has only two $1 bills on hand, leaving three possible bids: $0, $1, or $2. Write out the payoff matrix for this game, and then find its Nash equilibrium.

substance has definite shape crystalline structure and definite volume stp f2 b cl2 cbr2 d i

A substance that has a definite shape, a crystalline structure, and a definite volume at STP is

A) F2

B) Cl2

C)Br2

D) I2

influence of quot tax cuts and jobs acts of 2017 quot research

Topic: Influence of “Tax Cuts and Jobs Acts of 2017” for Individuals

Requirements:

To sum up the assignment prompt, you are asked to take an artifact from your professional discourse community/inquiry topic and analyze what you observe about it. For instance, what do you learn about the larger values/goals of the field or organization by virtue of looking at this source? Is the source’s use of language, tone, style, etc. appropriate for meeting the needs of its audience? Is the document or Web site designed in an effective way? These are just some examples of the observations you could make. The key is to take those observations of your source and do more than summarize them but instead, make an argument about them. What do they reveal about your discourse community?

As you think about Unit 1, keep these core thoughts on targeting audience in mind:

  • Try to avoid technical jargon unless totally necessary
  • Think about what you can assume your audience (me) will know/understand
  • Strive for brevity without sacrificing accuracy
  • Use an appropriate tone—formal enough for an academic assignment, not as formal as a research paper

You should cite from your artifact, as bringing in evidence of what you claim adds necessary credibility.

Please remember there are sample Unit 1 rough drafts posted on the Unit 1 Assignment Prompt. They are rough drafts, and you will see some strong elements in each, and some choices that you might make differently, especially in terms of the amount of summary and overview versus analysis and text evidence. I encourage you to use sources relevant to your inquiry question for Unit 1, and hopefully some of the searches and work you’ve done have yielded some credible, reliable sources in your field you can use. Do not hesitate to contact me if you have questions about your source.

**Lastly, note you are expected to include a brief reflective note with the draft and the final—see the Unit 1 prompt for specific instructions, but you should consider how this piece may or may not fit into a professional portfolio of your work. This note does not factor into the word count for this assignment, nor will it be graded. I simply want you to start thinking about the idea of a professional portfolio early on, so by the end of the term you aren’t starting from scratch.

Word count: I am most interested in quality, not quantity (within reason, of course). Your word count is 1500 words (a little over 4 pages), but a little under or over is fine with me. I’d rather have 1350 compelling words than 1500 words with a lot of fluff. Hint: do not turn in 1000 words, or 1800, either. Please double-space your essay, include citations for any in-text quotes and paraphrase from your source and possibly the textbook, and a reference page.

Citation

Please refer to the resources available on the Links tab on our course’s Blackboard site. Again, the choice of citation style is yours and depends on your field; I just ask that you remain consistent with it throughout the semester. The OWL (Online Writing Lab) at Purdue University has a fabulous online guide for APA, and I’ve included that in the resources under the Links tab on BB.

topic women s health exam and plan of care

The purpose of this unit is to focus on performing the necessary components of the women’s health exam and to learn to identify crucial exams and necessary age appropriate screenings for the women’s health client.

Discuss how the age of the female patient, demographics, race, and lifestyle will drive your exam and plan of care. Give examples and support with evidence-based practice.

trigonometric 2

Trigonometric

Instructions

For this assignment, you have to define a problem (the best project would be the topic you encountered in real life) that involves solving a problem of three dimensional world. Examples of such problems are estimate of surface area, perimeter, and volume, approximation of optimal shape or change involved in such. For instance, finding out of a volume of an octagonal bin with a defined ratio of height between octagonal bases to the pyramidal cap. Another example would include an estimation of a surface for an arbitrary shape by approximating it with triangles. In conjunction with algebra or calculus one can find an optimal surface, the volume, optimal surface of a three-dimensional shape etc. If you choose a project please communicate it to me and the classmates, you may use the suggestions described below.

Tasks for Trigonometric (TM)

(LR-1) Describe your topic, provide your data, and cite your source

The idea with the discussion posting is two-fold: (1) To share your interesting project idea with your classmates, and (2) To give me a chance to give you a brief thumbs-up or thumbs-down about your proposed topic and data. Sometimes students get off on the wrong foot or misunderstand the intent of the project, and your posting provides an opportunity for some feedback. Remark:

(LR-2) Plot the relevant data (if applicable) in two or three dimensional form. Use an appropriate scale on the horizontal and vertical axes and be sure to label carefully.

(LR-3) Define a strategy of reaching the goal (surface, volume) like: subdivision, summation, solving the triangles converting units. State the equations.

(LR-4) Solve intermediate steps.

(LR-5) Show the final result. Show how calculation work.

(LR-7) Write a brief narrative of a paragraph or two. Summarize your findings and be sure to mention any aspect that you found particularly important or interesting. Discuss possible errors and applicability of the general methodology.

You may submit all of your project in one document or a combination of documents, which may consist of word processing documents or spreadsheets or scanned handwritten work, provided it is clearly labeled where each task can be found. Projects are graded on the basis of completeness, correctness, ease in locating all of the checklist items, and strength of the narrative portions.

verbal communication 4

Find and cite (in APA format) an article from a popular or journal publication that addresses an area of verbal communication. Identify three interpersonal concepts from the article which are interesting to you, and write areflection of 3-6 paragraphs in length (1-2 paragraphs for each question).

First (paragraphs 1-2), outline the three concepts of interest to you and analyze why these concepts are important to effective interpersonal communication. It is critical you provide support from your weekly textbook reading.

Second (paragraphs 3-4), illustrate examples of how these concepts have impacted your life.

Third, (paragraphs 5-6) discuss how you have integrated or can integrate these concept into your relationships to be a more competent communicator.

Writing requirements:

3-6 paragraphs

APA style for the reference section.