Discussion Replies Chapter 14 Bitlocker File Encryption, writing homework help

Must be 150 words each and contain relevant content. Do not just critique the others writing.

1) Chapter 14 Bitlocker File Encryption

Let explore this scenario, you travel extensively for business and travel with a laptop and you are worried that you confidential data on your computer will be compromised. In this thread let talk about BitLocker Encryption. What is a BitLocker Drive Encryption? What are the pro and cons of using this technology? If you’ve used BitLocker, what has your experience been with it?

Answer the questions and respond or comment to any of your classmates responses.

2) Chapter 14 FAT

Class,

This is a discussion on FAT (file allocation table) and how it relates to storage. Let’s list and define them to make certain everyone understand what is it. There are FAT16 and FAT32. What are the difference between those two. There is technology called NTFS. What is NTFS and how does it relate to FAT32 or FAT 16?

Answer the questions and respond or comment to any of your classmates responses

3) Chapter 14 Direct Access vs VPN

lass,

Here’s another scenario. You are working at your home but you forgot an important document on your work server and need to finish your work. That’s where the innovation of VPN or virtual private network comes in. I’d like to discuss that in this thread and also discuss DirectAccess. What is DirectAccess? What is VPN? What are the similiarities or differnces of each.

4) Chapter 14 MCSA Windows Server 2012

Everything I’ve read to this point, and including this point, tells me not to put a bunch of different servers on one machine. And, if you have different locations – especially like our Wadley Inc. example – we have the ability to set up a server network and implement a BCP/DRP at the same time.

Active Directory appears to work, reference making things easier.

I was aware that I needed to publish shared folders. Not sure if it’s in my Lab Sim notes, Plural Sight notes, class book notes, or where – but I remember reading about it before this.

Off line folders and synchronization sounds like a really good thing to me. I’ve been wondering what I could do for my network, should I choose not to allow access to my network during off work hours. This seems ideal as an alternative.

I understand the benefits of NTFS. Ah, good tip reference encryption, after a person leaves the company.

I wondered about the security of individual folders – excellent! Oh, NOW I understand the need for Deny! I saw this on one of our simulations and thought, if I am handing out the permissions why would I need to deny anyone? Now I get it. We use deny if the person has multiple permissions, and we want them in another group, but we want them to have no permissions in that specific group. Makes sense.

This was a good tip – shared permissions can only be placed on the folder – not on individual files.

I thought how NTFS Security and Shared Permissions work together was an interesting section.

I have the feeling, based on what I’m reading, FSRM is going to be one of my favorite tools.

I like the idea of bit locker, although I’m not so sure I like that every User has the ability to reset passwords and stuff. I’ve not had a personal experience though, so, I’m thinking – particularly in a large company – that’s probably a plus in the long run.

Oddly enough, I have heard of direct access before this. I was kind of curious about alternatives to VPN’s – although I love the idea of VPN’s, they do use a lot of resources – anyways, up popped direct access via IPsec. (I also sort of chewed on APIPA).

Now this is the part I’ve been waiting all morning for – disk quotas. Wow, it reads like it’s simple to implement, I like that!

I found a really good article reference DFS Replication – not sharing yet though. As I understand DFS Replication, it’s not only good for load balancing and fault tolerance, but it’s an excellent avenue when exploring BCP/DRPs also.

Publishing printers (or anything really) to AD is new for me, but I’m keen to learn how. I think it’s an immensely useful tool in a network!

This was an excellent read!

5) Chapter 17

Chapter 17 covers file and storage systems which includes basic and dynamic disks, RAID sets, some material on virtual disks, and configuring firewalls. A lot of the material falls right in line with the information needed for this weeks writing assignment on protecting files and folders. Protecting data starts with ensuring the integrity of it, through RAID (redundant array of independent disks). There are a couple different types of RAID, each with their own pros and cons. RAID-5 seems to be a common and popular one, it uses a minimum of 3 disks and a maximum of 32. Data is striped (like RAID-0) across all the available disks with built in error correction blocks called “parity”. In the event of a failure, parity is used to reconstruct lost data using pieces stored on other disks.

This weeks LabSim exercises really helped me get a working knowledge of how RAID actually works by giving me a visual of the different disks and how the data gets distributed when using different styles.

6) Supporting Activity Printer Options

Many factors that’ll help improve scalability and performance of print servers; some involve the number of clients, client-side rendering, and printer hardware. According to TechNet (2014), the number of clients can cause some problems for the print server, when a large number of clients connect to the server it’ll cause a significant drain on system resources. Another thing to note about these amount of clients is that if one leaves an application activated for an extended amount of time, then the connection with the print server might remain open and constrain it, a large number of clients connected when printing while connected. Client-side rendering allows the print system on that client to translate the document to a printer specific PDL before data gets sent to print server, the client-side rendering sometimes gets used instead of server-side rendering so it can maximize server capacity. Printer hardware may vary depending on what printer gets utilized for a print server, printers that support OpenXPS require minimal server support and printers that support PCL6 or PostScript are less efficient than XPS because they are vector formats (TechNet, 2014).

7) Supporting Activity Securing the Network

think rights delegation and file access, particularly reference security, are all steeped in least privilege. I’ve not encountered a situation/scenario where least privilege was called rights delegation or file access though, so I’m going to research a bit before I make up my mind. However, I think it might be least privilege on a higher plane than just Users or Groups. I mean, if I think about it, who has security or permission rights? IT Admin. So perhaps rights delegation is the hierarchy of IT Admin? Not sure about file access though.

Okay, as I complete my research (because now I HAVE to know!), I’ll post more.

8) Chapter 17 MSCA Windows Server

In this chapter, it mentions how to work with volume sets, created from volumes that span multiple drives by using the free space from the said drives to construct something that looks like a single drive. There are many types of volume sets, and they are simple volume, spanned volume, striped volume, mirrored volume, and RAID-5 volume, these included work in various ways. According to Panek (2015), simple volume uses either one disk or a portion, spanned volume spans multiple disks with a maximum of 32 and used when volume needs are too high for one. Striped Volume stores the data in stripes across two or more disks if the set of stripes fall the entire volume will fail. Mirrored volume duplicates the data across two disks, its fault tolerant because if one of the drives fails, then data on the other isn’t affected. RAID-5 volume stores its data in stripes like striped volume, but across three or more disks, the thing is the OS files and boot files can’t reside on the RAID-5 disks (Panek, 2015).

Peer Influence Discussion How do peers contribute to adolescent decision-making, and how does this relate to peer influence?

(1) What parallels do you see between various media sources used to influence their audience and the kinds of peer influences adolescents experience in “real life”?

(2) How do peers contribute to adolescent decision-making, and how does this relate to peer influence?

(3) So what?

Hint: In order to engage in this discussion, you need to have read and thought about the various methods relevant to peer influence processes (for example: is peer influence always synonymous with peer pressure? What else is going on developmentally?).

Remember to:

  • pull from course material to demonstrate connections you’re making;
  • address all parts of the prompt, and how they are interrelated;

Management Accounting (BUS 262-55) Points Spring 2018 Information Literacy Assignment 1

All submissions must be in 12 point font, double spaced.

Refer to the document, “Guidelines for Citing Sources” to cite sources.

Clearly label your answers with the question number and letter

Information Literacy Concept

Define the term “information literacy.”

Cite 3 sources for the definition of information literacy.

Include at least one from a published periodical using the

“Business Source Premier” database on the library website.

Include a reference list in proper form for the 3 sources.

see “Guidelines for Citing Sources.”

Discuss how information literacy skills will help you in the following:

as a college student

in your career.

Using information literacy in your personal life

List 3 decisions in your personal life which require information.

For each decision, list one key piece of information to help you to make

decision.

List a source for the information for each of the three.

Vargas Family Case Study Second Session

Part One: Read “Topic 2: Vargas Case Study.” Complete a Cultural Formulation Interview based on the “Cultural Formulation” section in the DSM-5 and given the new information learned in session two of the Vargas case study. Refer to the attached CFI form for guidance and complete the CFI template.

Include a citation for the Cultural Formulation Interview. APA format is not required, but solid academic writing is expected.

Part Two: Review the Topic 2: Vargas Family Case Study. Write a 750-1,000-word paper in which you demonstrate how therapists apply psychoanalytic and cognitive-behavioral theories to analyze the presenting problem(s) and choose appropriate interventions.

Be sure to answer the following questions in your paper:

  1. What are the two main presenting problems for the Vargas family?
  2. How are the problems maintained according to: a) The psychoanalytic perspective? b) The cognitive-behavioral perspective?
  3. What interventions would you plan to use in your next session?
    • From the psychoanalytic perspective (identify and describe your plan for two interventions)
    • From the cognitive-behavioral perspective (identify and describe your plan for two interventions)

Cite at least three academic sources (peer-reviewed journal articles, books, etc.).

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

The Relationship between Celebrity And Social Media

Research Essay

Proposal: A proposal sets out the goals, scope and organization of your research paper so that you can get feedback and assistance. Proposals are helpful in that they allow you to think through the process of your final research paper with little effort. In the proposal, you communicate to the reader, in as much detail as possible, the research question you are interested in and the line of investigation you intend to pursue. The clearer you make this to the reader, the better the help they can give to you, and the better your final paper will be.

Background: Briefly describe the general topic of the proposed paper and explain why it is a significant area to research. Describe your topic in detail, so that the reader has a good idea of what you intend to research and provide some information about why you chose this topic. Explain what you think you already know about the topic and try to identify any preconceived notions or biases you may have.

Research Question: The central research question deals with the issue of the topic you have chosen and the questions you would like to pursue in your paper. It should notbe a statement that describes a phenomenon, but be written to focus on a contradiction, puzzle or dilemma. The question should be framed as a “why” or “how” question.

Discussion

The research question must be posed so that there are several realistic alternative answers or outcomes to it. These should be outlined. A major purpose of the research paper is to gather evidence for and against each possible answer. In other words, the proposal reflects that you have considered evidence that is counter to and challenges possible answers to your research question. This allows you to weigh and assess the evidence for and against possible outcomes to finally arrive at an overall assessment of your research question. Provide definitions of key concepts arising out of your reading that may be used to develop your paper. For example, look for theories that explain the phenomenon under discussion and the perspectives that are used to examine the issues you have identified.

Annotated bibliography: An annotated bibliography is an alphabetical list of selected academic sources on a given topic. It indicates to the reader the quality and depth of the reading you have done in preparation for writing up the results of your inquiry. Creating an annotated bibliography ensures that you have found adequate scholarly resources, that you have read your sources carefully and have a good sense of how they relate to your topic.

For this assignment you must use a minimum of five (5) sources. Each source should be relevant to the research question. It may not have a direct bearing on your research question, but there may be key ideas or perspectives that can be applied to your inquiry.

Each entry begins with a citation that provides full bibliographic information, formatted to conform to APA style guidelines, as set out in Chapter 10 of the Northey, Tepperman and Albanese text. It is followed by the annotation, your summary of the main points of the article. In three (3) sentences, identify the main argument of each source, the evidence that supports the argument and the major conclusions arrived at. The relevance of the source to your research question should be clear from the annotation.

Security Management Case Study Research Paper

Case Study #2.Be sure to answer the following questions in the paper.No plagiarism tolerated!

Questions: 1. Read all of Mantri (2011). He discusses a variety of topics and sub-topics that characterize the “New Terrorism.” Mantri (2011) writes that the United States has been more successful in the socializing of immigrants than Europe has (pp. 90-91). This lack of social integration was in fact cited recently as a cause of the November 2015 Paris attacks, when it was discovered that the attackers hailed from a neighborhood in Brussels known to hold a largely disenfranchised population. Then: a. Identify three (3) social theories for terrorismb. Identify three (3) psychological theories for terrorism.

In your explanation, provide explanations where possible to help relate the concepts. Your response must be more than a mere listing or defining of terms, but should be well articulate, academic explanation of the theories presented by sociologists/psychologists.

2. Mantri (2011) explains that inside information from friends and family was the best intelligence to warn of impending terror incidences (p. 93).The two most-used tools in the fight against terrorism, however, have inarguably been the United States Department of Defense, and legislation such as the USA PATRIOT Act and USA FREEDOM Act.Given this, please: a. Briefly identify the primary legislation that is currently in place, and identify at least three tools of that legislation that are used as counterterrorism tools. b. Chose one (1) of the tools listed and identify one (1) case where it was used as a successful counterterrorism tool.

3. Mantri (2011) states, “The threat from Islamic terror is not going to be defeated by waging a conventional or sub-conventional war.” (p. 94) This leads to the point that the power behind jihadism is the ideology. Using all available resources: a. Identify any and all key components of jihadi ideology. (What is the core of ideas behind it?). b. Identify at least three key ways to deal with the ideology that are non-kinetic (done without bullets or bombs). (This can come from case examples, prominent theories, or your own concepts. There must be academic rooting in your response, however. Do not just make up ideas, but use valid examples, theories,

methods).

4. This article bounces around from domestic terrorism to international terrorism references, and covers a large part of history in a very short period of time. Please, using all available resources: a. Define domestic terrorism from a United States’ legal perspective. b. Define international terrorism from a United States’ legal perspective. c. Identify at least five (5) categories of terrorist groups and give at least two (2) groups as examples for each

You will provide a case study analysis report.

It must be a minimum of 3,000 words (excluding title page and references).

It must include a separate title page.

It must include a separate reference page.

MRKT 310 Principles of Marketing, writing homework help

MRKT 310 Principles of Marketing

Week 6 Writing Assignment

Part 1 – Creating Offerings

Learning Outcomes

  1. Offering. Student can describe an offering based on features, benefits, price, and costs of ownership
  2. Type of consumer offerings. Student can suggest marketing strategy implications based on the type of consumer offering under examination.
  3. Product line extensions or new product development. Student can suggest possible product line extensions or related product or service offerings based on the student’s chosen product or service offering.
  4. Product lifecycle. Student can suggest potential marketing strategies based on the product or service’s lifecycle stage.

Directions

  • Your job in this Writing Assignment is to develop marketing mix strategies to ensure a value offering for the target market you identified in the previous assignment. We begin with the value offering this week.
  • We don’t expect you to develop strategies based on a total knowledge of the product or service since you are not, or most likely not, employed by your product or service’s company. We will be looking to see if you can apply the marketing concepts to the real world situation.
  • Again, do not fall into the trap of reporting on the product or service. This is obvious because your assignment will look like a rewrite of the company’s website. Don’t be afraid to make strategy recommendations based on what you have discovered about the product or service, and how you think it can move forward. Be creative, be reasoned, take risks.
  • Remember your product’s target market(s) from the previous paper. Always keep them in mind when making your recommendations. You now work for the company, and your goal it to help them grow sales.
  • Prepare your assignment beginning with a title page including your name, your product or service, and the name of your target market. Then answer each of the following four questions in order and number the beginning of each question. There is no need to repeat the question text.
  1. Offering. Describe your product or service offering as it is currently in terms of features and benefits, price and the total cost of ownership as discussed in the week’s readings. Is it more product dominant or service dominant? What are the tangible and intangible aspects?
  2. Type of consumer offering. Based on the four categories of type of offerings discussed in course content, describe the category in which your product or service offering belongs. Based on your new target market, would that category of the offering change and if so, how? How would it change the marketing strategy?
  3. Product line extensions or new product development. Should the current product or service be modified to more fully meet the needs of your new target market? Would the changes constitute a new product line, a product line extension or a new product? If no product changes are needed, how does the same product or service meet the need of your target market differently than current customers? Would the product line extension or new product allow the offering to occupy uncontested space in the perceptual map for the target market as covered in thr previous paper?
  4. Product lifecycle. In which stage of the product lifecycle is your product or service offering now? Would the changes described in number 3 above change the lifecycle stage and if so how? What would this mean to the lifecycle marketing strategy?

Part 2 – Using Marketing Channels and Price to Create Value for Customers

Learning Outcomes

  1. Marketing Channels. Student can outline a multi-channel distribution system
  2. Marketing channel strategy. Student can recommend a marketing channel strategy for a product or service offering that assures the correct amount of intensity.
  3. Value chain. Student can discuss how each channel in the product or service offering adds value to the customer.
  4. Pricing strategy. Student can analyze a current pricing strategy and make recommendations for modifications.

Directions

  • This part of the assignment assesses your ability to relate marketing mix concepts of distribution and pricing to your product or service offering. You will also have a chance to recommend new distribution and pricing strategies based on your new target market to meet their needs.
  • Answer each of the following four questions, in order, numbering each of your responses. There is no need to repeat the question.
  1. Marketing channels. To the best of your ability, outline the marketing channels of your product or service offering as they currently exist. Refer to Figure 6.2 for some ideas. Most product and service offerings will have more than one channel, so your system should include at least two; for example (1) a direct channel for internet sales: manufacturer –> customer; and (2) an indirect channel such as manufacturer –> distributor –> wholesaler –> retailer –> customer. If your product or service only has only a direct channel, explain why. Would this channel strategy change as a result of your new target market? Why or why not?
  2. Marketing channel strategy. Why type of distribution intensity strategy does your product or service currently use? How do you know this? Would this distribution intensity strategy change for your new target market? Why or why not?
  3. Value chain. Referring back to your marketing channel diagram, discuss what each member of the value chain does to bring value to the consumer.
  4. Pricing strategy. Referring to the various pricing strategies outlined in the week’s readings, which one does your product or service currently use? Would you recommend any changes for your new target market? If so, how would you change it and why?

General Submission Requirements

  • Prepare as a word processed document (such as Microsoft Word). Do not use Pages. Export to .doc or .pdf. Use 12-point font Times New Roman. Use black ink for majority of your work and only use colors if it enhances your ability to communicate your thoughts.
  • Your assignment should be the equivalent of approximately five pages of double-spaced text, approximately 1/2 page for each of the eight questions (four in Part 1 and four in Part 2). You may attach exhibits that will not be counted towards the page count of double-spaced text. The cover page and References page are not part of the five pages of written analysis.

Literacy Analysis compare and contrast essay

Essay 4 Assignment: Literary Analysis

This essay assignment brings together many of the course outcomes that have been included in various assignments this semester.

Minimum Course Outcomes: Students will be competent in reading instructions and essays. Students will be able to write essays substantially free of major errors of standard written English. Students will be able to use supporting details in an essay. Students will be competent in structuring essays. Students will be competent in formatting their essays according to MLA conventions. Students will be able to incorporate information from two or more distinct sources into an essay with an analytical or argumentative purpose. Students will learn that the process of writing requires working with drafts in order to achieve an effective final product.

Essay 4: Literary Analysis Prompt: Compare and contrast the settings in “A Rose for Emily” by William Faulkner and Trifles by Susan Glaspell. How might these settings contribute to the loneliness and isolation of the main characters? What significant ways are the settings alike and in what significant ways are they different?

Essay 4 is a text-based essay; use “A Rose for Emily” from the Norton Field Guide to Writing with Readingsand Trifles from our class modules as evidence. Do not consult outside sources. Do not use Internet sources. I have read these sources, and I want to know your thoughts. Be wary of finding ideas on the Internet as well. These ideas usually show up in the writing and on Turnitin as plagiarism.

Read the following form The Norton Field Guide to Writing: “Comparing and Contrasting” (380-387); “Literary Analyses” (206-215), and “Synthesizing Ideas” (473-475).

  • Stay within 25 words of the assignment word count. Write 700 to 850 words.
  • Create an introduction that provides background on authors, that provides a short summary of their works, and that grabs a reader’s attention. A short summary might be one or two sentences. More evidence from their works will be posted in the body of the essay as evidence for your points.
  • Create an assertive thesis that responds to this specific assignment. This thesis should be one or two sentences. (Try placing your thesis at the end of the introduction for clear organization.)
  • Create assertive topic sentences that reflect the content and organization established in the thesis.
  • Boldface the thesis and topic sentences.
  • Develop each body paragraph with examples and quotations from “A Rose from Emily” and Trifles.
  • Write your essay in the present tense. (Write in the present tense when writing about a text.)
  • Include an author’s full name on first mention. In the body of the essay, use the
    author’s last name without a title. In the conclusion, include the author’s full name as a reminder to the reader.
  • MLA-style documentation is required. Examples and quotations must be cited according to MLA standards. Include at least one quotation in each body paragraph. Missing or incorrect MLA documentation may result in a failing grade for the essay.
  • Create a conclusion that refers back to the thesis. The conclusion should sum up the meaning of the essay and be memorable to the reader. Don’t use the phrase “in conclusion.” Encourage the reader to keep reading until the last word.
  • Do not use the pronouns “I,” “you,” or “we” to present ideas. Instead, state your points directly. “You” is too informal and can offend the reader if he or she disagrees with your point. “We” is unclear; who is the “we”? The pronoun “I” serves as an unnecessary filter between your idea and the reader.
  • Proofread your writing. Read your essay from the last sentence to the first sentence, looking for errors. Do not rely on your computer’s spelling and grammar checker. Essays with numerous errors may earn a failing grade.
  • Present your paper using MLA style format. Essays with missing or incorrect MLA paper format may earn 15 fewer points.

MLA Documentation and MLA Paper Format

  • MLA Works Cited page entry “A Rose for Emily” by William Faulkner: Since our textbook is an anthology, the Works Cited entry will be #19. Work(s) in an anthology, page 525, in The Norton Field Guide
  • MLA Works Cited page for Trifles by Susan Glaspell will be #31: Work on a Web Site, page 531 in The Norton Field Guide.
  • MLA paper format: MLA paper format is required for essay assignments. See Formatting a Paper, pages 539-548, in The Norton Field Guide. (The example paper is a research paper, but the basic format is the same for class submissions.)
  • MLA in-text citations: See MLA Style, In-text Citations, page 498, The Norton Field Guide.
  • MLA Style Official Web Site (Links to an external site.)Links to an external site. Our textbook provides this link that covers MLA style.

Please ask any questions you have about this assignment. One-on-one writing help is available during office hours, at the Writing Lab in G-006 on Santa Fe College’s main campus, an through Smarthinking Online Tutoring.

EHR Design and Assessment

One of the key roles of health information management professionals is their involvement in the review, selection, and design of an electronic health record (EHR).

Doing an online search of the topic, “how to select an EHR” or “selecting an EHR-AHIMA,” select and read a few of the articles in your search in order to document a list of questions (at least 10 questions) that a healthcare facility could use in evaluating the usability and screen design of a proposed system.

Make sure your list of questions considers the following areas:

  • Usability
  • Performance
  • User interface and screens
  • Customization
  • User needs and input

After each question, state which of the five bullet point(s) above the question addresses.

Business Strategy Game Paper

Below is the outline for what is required for this paper. Please read through and address concerns thoroughly. I have completed the majority of the paper, and have attached the draft a page and a half currently. I need it beefed up and in total it needs to be 4 pages in length (excluding exhibits).

– Key points

– This has been conducted over 4 weeks, multiple years in the game

– We are Company E, a shoe company

-If you have any questions please let me know.

There was a limit on attachements I can add so I will insert them into the body of the question after posting.

_____________ OUTLINE FOR WHAT NEEDS TO GO INTO PAPER______________

The purpose of the BSG paper is to demonstrate what you have learned over the course of the game and to analyze your strengths and weaknesses, thus you will specifically need to address six areas:

1. Executive Summary: How did you perform? What was your strategy?

2. What did you do right?

3. What did you do wrong?

4. What was your competition doing?

5. What did you learn?

6. Conclusion

The winners of the game must explain why you think you won (we are currently in 2nd and should win or come close); what overall strategy did you use to beat your competition and what specific choices went into achieving your strategy? Was there anything you think you might have adjusted to win by a bigger margin? You also must address both the “What was your competition doing” and “What did you learn?” categories. If you can’t convince me you knew what you were doing and why you won, you will not receive full credit for winning the game.

If you did not win, explain what you would have done differently. What overall strategy did you use and why didn’t it work to propel you to the number one spot? Was it a part of your tactical decisions to achieve your end goal that was weak, or did you pick the wrong direction from the beginning? For example, did you try to compete on too many levels or was your focus too narrow?

Whether you win or lose, you should use specific examples of actions you took that led to your lessons learned, as well as specific actions that you would have changed. Numbers and ratios in the form of exhibits can be used to explain your conclusions, but this is not meant to be a numerical analysis.