Based off of research proposals send Feb 8th that you completed in closed orders
Author: admin
-
Rhetorical Analysis Essay
I’ve attached the instructions for the assignment and the graded/with feedback from professor Draft Rhetorical Analysis.
Thank you!
Attached Files (PDF/DOCX): Rhetorical Analysis Essay Instructions.docx, Malik Dark – Draft Rhetorical Analysis with Feedback.pdf
Note: Content extraction from these files is restricted, please review them manually.
-
EBP Research paper
Evidence Based Practice Paper
This assignment focuses on the integration of evidence based practice (EBP) and research in health care. EBP is an integration of research evidence, clinical expertise and a patient’s preferences. This problem-solving approach to clinical practice encourages health care providers to provide individualized patient care. The inclusion of EBP in nursing provides nurses with the scientific research to make well-founded decisions. Through EBP, nurses and providers can stay updated about new medical protocols for patient care. By searching for documented interventions that fit the profiles of their patients, nurses can increase their patients’ chances for recovery.
EBP enables nurses to evaluate research so they understand the risks or effectiveness of a diagnostic test or treatments. The application of EBP enables nurses to include patients in their care plan. This allows patients to have a proactive role in their own healthcare since they can voice concerns, share their values and preferences and make suggestions on how they want to proceed.
EBP strategies allow nurse practitioners (NPs) and other health care providers to translate research findings into clinical practice. With efficient literature-searching skills and the application of formal rules of evidence in evaluating research findings, providers can apply existing scientific knowledge in their clinical practice for each individual patient.
Directions for Paper Assignment
- Introduction and Thesis Statement. What is your paper about? Why is research and evidence based practice important in health care?
- Identify your POI. Why is the topic important to your future advanced practice role (FNP, educator, leader, informaticist) and your expected population? CHOSEN POI: improved diabetes education improving patient outcomes-DSMES-Diabetes self management Education and support-
- Based on the evidence what process, structure, or outcome measure related to your POI will you expect to change in your practice? You can choose management of a disease process, a protocol that needs updating, a process change, additional diagnostic tools and procedures…. Choose a topic that will improve patient outcomes, reduce costs, or save time in treatment protocols (just some ideas).
- Identify a change theory you will use. Discuss the specific parts/steps of change you will use in advocating a change in practice. To review change theories, please refer to Week 4 material.
- Search the current literature (last five years) for two research articles related to the selected POI/topic and what area you are proposing change. One article must be quantitative research and one must be qualitative research.
- Briefly discuss the following for each article.
- Purpose, research design, and methodology of studies (steps, procedures, and strategies for gathering and analyzing data)
- Data collection. Describe the procedures developed to guide the collection of data for each study, and sampling of participants.
- Results and clinical implications for each study
- Applicability of study findings to practice.
Conclusion. Summarize the major points of the paper. Do no include new information or new citations/references in the conclusion.
References
- Chowdhury, H. A., Harrison, C. L., Siddiquea, B. N., Tissera, S., Afroz, A., Ali, L., Joham, A. E., & Billah, B. (2024). The effectiveness of diabetes self-management education intervention on glycaemic control and cardiometabolic risk in adults with type 2 diabetes in low- and middle-income countries: A systematic review and meta-analysis. PloS one, 19(2), e0297328.
- Nguyen, P. V. N., Thach, P. T., Tran, H. K., Nguyen, H. T. H., Truong, D. L., Lam, U., Tran, V. Q., To, N. Y., Luong, N. T. H., Le, D. T. T., Tran, K. Q., & Ly, L. D. (2025). Effectiveness of a digital diabetes self-management education and support program in Vietnamese adults with type 2 diabetes. Scientific reports, 15(1), 41369.
- The paper should be 6-8 pages (excluding title page and reference page) and should include at least 5 peer reviewed references (can include your textbooks). APA formatted. No abstract. Use level one and level two headings within the body of the paper to help organize the contents. See grading rubric for allocation of points. Deductions will be made for late submissions.
-
Pain Management
Part I: Find a YouTube video (or video from another source) of a guided meditation specifically for pain management (minimum of 15 minutes in length). Complete the full session and describe your experience. (i.e. did you enjoy it? Did you find it relaxing? What would you change about it? Would you recommend it to anyone else or ever use it in a therapeutic context?) Be sure to provide the name, length, and link of the video.
(Video: https://www.youtube.com/watch?v=3TK2zTuqRmg)
Part II: Find OR write a script for a pain management meditation or guided imagery session, and lead at least one person (or group of people) through the full script (should be a minimum of 15 minutes long). Describe your experience being the facilitator and the reaction/experience of the people who participated. Be sure to include what your process was for choosing the script.
Part III: If you had to choose an album to play in the background during a pain management session with a client, what album would you choose and why? (Artist: Berlioz, Album: Open this wall)
-
Writing Question
I am A student.I need Assignment Work to pay mn university fee.
Requirements:
-
Configuring and Verifying Site-to-Site IPsec VPNs
Objective:
The main objective of this assignment is to make efficient use of VPNs as means of secure connections between different locations of an international company. The student will build the company network and then configure Site-to-Site IPsec VPNs between multiple office locations of a fictitious company called Future Tech Enterprises, verify the VPN tunnels, and ensure secure communication between these sites.
Scenario: Global Tech Enterprises
Future Tech Enterprises is a multinational corporation with headquarters in New York and
branch offices in Abu Dhabi and London. The company needs to ensure secure
communication between its offices over the internet. Each site has its own local network, and
the organization wants to establish secure Site-to-Site IPsec VPN tunnels between these
locations to protect sensitive data during transmission.
Network Overview:
New York Office:
Network: 10.11.1.0/24
Router: NY-R1
External IP: 203.0.113.1
Abu Dhabi Office:
Network: 10.22.2.0/24
Router: AD-R1
External IP: 198.51.100.1
London Office:
Network: 10.33.3.0/24
Router: LDN-R1
External IP: 192.0.2.1
Your task is to configure and verify Site-to-Site IPsec VPNs between these three offices to
ensure that all communication over the public internet is encrypted and secure.
Part 1: Understanding Site-to-Site IPsec VPNs (20 points)
Conduct your own research and explain the following questions (Make sure to add the necessary citations):
- List two advantage and two disadvantages of the use of VPNs to connect different sites of this company
- Define what a Site-to-Site IPsec VPN is and explain its relevance to Future Tech Enterprises.
- Describe the different phases of IPsec (IKE Phase 1 and IKE Phase 2) and how they secure communication between the New York, Abu Dhabi and London offices.
- Discuss the encryption and authentication algorithms that would be appropriate for a multinational corporation like Future Tech Enterprises.
- Compare IPSEC Site-to-Site VPNs with any other alternative. List a scenario where IPSEC remains the preferred choice and another scenario where an alternative might be better suited for Future Tech Enterprises.
Part 2: Configuring the Site-to-Site IPsec VPNs (50 points)
Network Topology Setup (10 points)
Using network simulation software (e.g., Cisco Packet Tracer) design a network topology that
includes the New York, Abu Dhabi, and London offices.
Include network address assignments, routing configurations (static routing), and firewall settings as
necessary.
Provide a diagram of the network topology showing how each office connects to the other two.
After configuring static routing test your routing configuration by pinging between office networks. Include screenshots showing successful pings.
IPsec VPN Configuration (30 points)
Configure the IPsec VPN on the routers at each office (NY-R1, AD-R1, LDN-R1). Ensure the
configurations include:
- ISAKMP Policy
- IPsec Transform Set
- Crypto Map
- Access Control Lists (ACLs) for interesting traffic between the sites
- Applying the Crypto Map to the appropriate interfaces
- Document the configuration commands used on each router, explaining the purpose of each
- command.
Verification (10 points)
Verify that the IPsec VPN tunnels are established successfully between all three offices. Provide
output from relevant verification commands (e.g., show crypto isakmp sa, show crypto ipsec
sa).
Demonstrate secure communication between the offices by pinging between devices on
different networks (e.g., from a device in the New York office to a device in the London office)
and observing encrypted traffic. Make sure to add screenshots in the report
Part 3: Testing and Troubleshooting (20 points)
_Testing the VPN Tunnels _(10 points)
Test the VPN tunnels by initiating traffic that matches the ACLs defined in the configuration,
ensuring that communication between New York, Abu Dhabi, and London is secure.
Provide evidence (screenshots or command outputs) showing successful data transmission over
the VPNs.
Part 4: Reflection and Documentation (10 points)
Write a reflection on what you learned during this assignment. Highlight any challenges you
faced, particularly in managing multiple VPN tunnels, and how you overcame them.
** Add references and also sign the Academic Integrity Disclaimer in the report template.
Submission
Each student must submit 2 files in the given order:
- Primary file submission: Full report in a single PDF containing answers to all the Parts along with the screenshots wherever applicable. Name the report firstname_lastname_A1.pdf. Use the following to compile your report.
- Secondary file submission: A packet tracer file. Make sure the user account details under packet tracer file must have username a s your firstname_lastname and email must match your ZU email.
Assignment Information
Length: > 2000 words
Weight:
15%
Learning Outcomes Added
- : Describe information, network and computer attacks and defenses fundamentals, standards, and security challenges.
- : Evaluate system and network authentication, access control schemes, and components of virtual private networks (VPNs).
HOW TO GET FULL MARK COMPLETE INSTRUCTIONS
PART 1 (20 Marks) THEORY SECTION
What Your Professor Expects
Not just definitions.
He wants:
- Clear explanations
- Correct terminology
- Diagrams (optional but gives bonus impression)
- Proper references (APA style)
- Connection to the scenario
What You MUST Do
1? Write 2 Advantages + 2 Disadvantages
BUT:
- Connect each point to Future Tech Enterprises
- Explain WHY it matters
Example:
Wrong: “VPN is secure.”
Correct: “VPN ensures encrypted communication between New York and London, protecting sensitive financial data from interception.”
2? Define Site-to-Site IPsec VPN
- Clear definition
- Difference from remote access VPN
- Mention IPsec operates at Layer 3
- Explain relevance to multinational company
3? Explain IKE Phase 1 & Phase 2
You must mention:
- ISAKMP SA
- IPsec SA
- Diffie-Hellman
- Encryption negotiation
- Authentication
- Interesting traffic
If you miss these marks deducted.
4? Encryption Algorithms
Mention:
- AES-256
- SHA-256
- DH Group 14
- Pre-Shared Key
Explain WHY enterprise needs strong encryption.
5? Comparison Section
Compare IPsec vs SSL VPN:
Make table:
| Feature | IPsec | SSL VPN |
Professors love comparison tables.
6? References (VERY IMPORTANT)
Minimum 3 academic references:
- Cisco documentation
- NIST
- Stallings textbook
If you skip references automatic mark deduction.
PART 2 (50 Marks) PACKET TRACER (MOST IMPORTANT)
This is where most students lose marks.
You must be organized.
STEP 1: BUILD CLEAN TOPOLOGY (10 Marks)
You need:
- 3 Routers (2811 or 2911)
- 3 Switches
- 3 PCs
- Internet cloud (or serial connections between routers)
IP Addressing (DO NOT GUESS)
Use exactly:
NY LAN:
Router: 10.11.1.1
PC: 10.11.1.10
Gateway: 10.11.1.1AD LAN:
Router: 10.22.2.1
PC: 10.22.2.10LDN LAN:
Router: 10.33.3.1
PC: 10.33.3.10External interfaces:
- NY: 203.0.113.1
- AD: 198.51.100.1
- LDN: 192.0.2.1
REQUIRED SCREENSHOTS
You must include:
- Full topology diagram
- IP configuration of each PC
- Router
show ip route - Successful ping BEFORE VPN
If you skip routing test screenshot marks lost.
STEP 2: STATIC ROUTING
Configure static routes on ALL routers.
Then test:
ping 10.22.2.10ping 10.33.3.10Take screenshot of successful ping.
STEP 3: CONFIGURE IPSEC VPN (30 Marks MOST CRITICAL)
You must configure:
ISAKMP policy
Pre-shared keys
Transform set
ACL for interesting traffic
Crypto map
Apply crypto map
IMPORTANT: You Need 3 Tunnels
NY AD
NY LDN
AD LDNIf you only configure NY as hub YOU LOSE MARKS.
Your assignment says:
Configure between these three offices
That means FULL MESH.
Common Mistakes That Lose Marks
Forgetting to mirror ACL on other router
Applying crypto map on wrong interface
Wrong peer IP
Using wrong wildcard mask
Not testing trafficAvoid these.
STEP 4: VERIFICATION (10 Marks)
You MUST include screenshots of:
show crypto isakmp sashow crypto ipsec saExpected:
- State = QM_IDLE
- Encrypted packet counter increasing
Then:
Ping from:
- NY PC LDN PC
- AD PC NY PC
Then run:
show crypto ipsec saTake screenshot showing encrypted packets.
If you do not show packet counters increasing marks deducted.
PART 3 (20 Marks) TESTING & TROUBLESHOOTING
You must:
- Show traffic triggering VPN
- Explain how tunnel forms
- Mention at least 3 troubleshooting techniques
Example:
- Check ACL match
- Verify PSK
- Verify routing
- Check interface crypto map
If you only say it worked low mark.
PART 4 (10 Marks) REFLECTION
Professor wants:
- What you learned
- Challenges
- How you solved them
- Connection to learning outcomes
Mention:
- SecFundamental
- AuthAccessVPN
That gives strong impression.
SUBMISSION RULES (DON’T LOSE EASY MARKS)
You must submit:
1? PDF Report
Name:
firstname_lastname_A1.pdfContains:
- All answers
- All screenshots
- References
- Academic integrity signed
2? Packet Tracer File
VERY IMPORTANT:
Inside Packet Tracer:
Go to:
Options User ProfileSet:
Username: firstname_lastname
Email: your ZU emailIf you forget this mark deduction.
HOW TO GET 100%
Here is checklist:
Clear theory
References
Clean topology
Static routing verified
Full mesh VPN
Correct crypto configuration
Tunnel verification screenshots
Packet counters increasing
Troubleshooting explanation
Reflection written properly
File names correct
Packet Tracer user profile correct
FINAL ADVICE (From Experience)
Most students lose marks because:
- They configure only 1 tunnel
- They forget verification screenshots
- They dont explain commands
- They skip references
You will not make these mistakes.
Requirements: 2000 | Python
-
Persuasive specch with speaker note PowerPoint presentation…
Types of Persuasive Arguments
Different types of arguments serve different persuasive purposes. Consider these common argument types for your speech:
- Problem-Solution: Demonstrates a significant issue and proposes a viable solution
- Comparative Advantage: Shows why your proposal is superior to alternatives
- Cause-Effect: Establishes causal relationships between actions and outcomes
- Value-Based: Appeals to shared values, principles, or ethical standards
- Testimony-Based: Uses first-hand experiences or expert opinions to support claims
Most effective persuasive speeches combine multiple argument types to create a comprehensive case. For example, a speech advocating for expanded campus mental health services might include problem-solution arguments about current wait times, cause-effect arguments about the impact of untreated mental health issues, and value-based arguments about institutional responsibility for student wellbeing.
Creating a Persuasive Argument Structure
Each main argument in your speech should follow a clear structure that guides your audience from claim to conclusion. A strong argument structure includes:
- Claim: A clear statement of your position on a specific aspect of your topic
- Evidence: Supporting data, examples, or expert opinions (from your required sources)
- Reasoning: Explicit connections showing how your evidence supports your claim
- Impact: Explanation of why this point matters to your audience
For example, in a speech advocating for expanded campus bike lanes, a structured argument might include: a claim about safety concerns for cyclists, evidence from campus accident statistics, reasoning connecting the lack of dedicated lanes to accidents, and impact statements about how improved safety would benefit all campus community members.
Addressing Opposing Viewpoints
Acknowledging and responding to potential counterarguments strengthens your persuasive impact by demonstrating fairness and thorough understanding. Effective counterargument strategies include:
- Acknowledge-and-Refute: Recognize a valid concern, then explain why your proposal still makes sense
- Common Ground: Identify shared values before showing how your proposal better serves those values
- Limitation-and-Solution: Admit potential drawbacks while providing mitigating solutions
Within your 7-8 minute timeframe, plan to address 1-2 significant counterarguments. For instance, if advocating for a campus sustainability fee, you might acknowledge concerns about additional student costs before explaining how the long-term savings and environmental benefits outweigh this initial investment.
Research and Evidence
Your assignment requires a minimum of two credible sources cited in MLA format. The “Research” and “Ethical Communication” categories in your rubric specifically evaluate how effectively you integrate and cite these sources.
Finding Credible Sources
For your persuasive speech, look for sources that offer reliable, relevant information about your topic. Strong source types include:
- Academic journals: Peer-reviewed research with rigorous standards
- Government publications: Official reports, statistics, and policy documents
- Industry studies: Research from professional organizations or institutes
- Reputable news sources: In-depth reporting from established outlets
- Institutional resources: Data and information from relevant organizations
While you need only two sources for your assignment, having 3-4 quality sources can strengthen your persuasive case if they’re integrated effectively. Focus on finding the most authoritative and relevant sources rather than simply meeting the minimum requirement.
Evaluating Source Credibility
When selecting sources for your persuasive speech, evaluate their credibility using these criteria:
- Authority: Is the author/organization qualified to speak on this topic?
- Accuracy: Is the information supported by evidence and consistent with other reliable sources?
- Currency: Is the information up-to-date enough for your topic?
- Objectivity: Does the source show reasonable balance, or is it heavily biased?
- Relevance: Does the source directly address aspects of your specific topic?
Keep in mind that your assignment requires you to “practice ethical communication” by incorporating credible sources that will strengthen your persuasive appeal both logically and ethically.
Types of Evidence
Different types of evidence serve different persuasive functions in your speech:
- Statistical evidence: Numerical data that demonstrates patterns or significance
- Expert testimony: Opinions or statements from recognized authorities
- Case studies: Detailed examples that illustrate your points
- Historical precedents: Similar situations from the past and their outcomes
- Experimental results: Findings from scientific or social research
For your 7-8 minute persuasive speech, aim to include 2-3 different types of evidence to create a well-rounded argument. For example, if advocating for a campus food pantry, you might combine statistics about student food insecurity, expert testimony about its impact on academic performance, and case studies of successful pantry programs at similar institutions.
Citing Sources in MLA Format
Your assignment requires using MLA citation format for your sources. This includes both in-speech citations and citations in your visual presentation. When citing sources verbally:
- Introduce the source with relevant credentials: “According to Dr. Maria Chen, a professor of environmental science at Stanford University…”
- Provide the source’s publication date if relevant: “In a 2023 study published in the Journal of Higher Education…”
- Make the citation part of your natural delivery rather than an awkward interruption
In your required 7-10 slide visual presentation, include proper MLA citations for any quoted material, statistics, or specific facts. This typically means adding a brief parenthetical citation (Author Last Name Page#) and including a works cited slide at the end of your presentation.
-
It3240 information
help with home
Requirements: Clear
-
Calorimetry Experiment
Go through all the files I have submitted and read them. Be keen when doing the experiment, calculations and figures.Attached Files (PDF/DOCX): FreezingPointReport.pdf, FreezingPointProcedure.pdf, FreezingPointIntro.pdf, FreezingPointLectureSlides.pdf, Calorimetry Experiment Agenda.pdf
Note: Content extraction from these files is restricted, please review them manually.
-
American Anime Paper
Please analyze an American cartoon of your choosing (must be approved by the professor) that appears to have been influenced by Japanese anime. The purpose of this paper is to exhibit understanding of important class concepts by showing your ability to use these concepts in your own analysis. Students will compare and contrast the chosen media with Japanese anime, paying close attention to the various characteristics and themes learned in this course, and argue whether or not the American-made series should be considered anime. The paper should incorporate class readings in their discussion. This argumentative analysis should be five to six full pages double spaced 12pt Times New Roman font. This assignment requires MLA intext citations (author and page number). Failure to use accurate MLA citations, including page numbers, will result in a 0.
Attached Files (PDF/DOCX): AnimePaperRubric.pdf
Note: Content extraction from these files is restricted, please review them manually.