Author: admin

  • Annotated bibliography

    Based off of research proposals send Feb 8th that you completed in closed orders

  • Rhetorical Analysis Essay

    I’ve attached the instructions for the assignment and the graded/with feedback from professor Draft Rhetorical Analysis.

    Thank you!

    Attached Files (PDF/DOCX): Rhetorical Analysis Essay Instructions.docx, Malik Dark – Draft Rhetorical Analysis with Feedback.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • EBP Research paper

    Evidence Based Practice Paper

    This assignment focuses on the integration of evidence based practice (EBP) and research in health care. EBP is an integration of research evidence, clinical expertise and a patient’s preferences. This problem-solving approach to clinical practice encourages health care providers to provide individualized patient care. The inclusion of EBP in nursing provides nurses with the scientific research to make well-founded decisions. Through EBP, nurses and providers can stay updated about new medical protocols for patient care. By searching for documented interventions that fit the profiles of their patients, nurses can increase their patients’ chances for recovery.

    EBP enables nurses to evaluate research so they understand the risks or effectiveness of a diagnostic test or treatments. The application of EBP enables nurses to include patients in their care plan. This allows patients to have a proactive role in their own healthcare since they can voice concerns, share their values and preferences and make suggestions on how they want to proceed.

    EBP strategies allow nurse practitioners (NPs) and other health care providers to translate research findings into clinical practice. With efficient literature-searching skills and the application of formal rules of evidence in evaluating research findings, providers can apply existing scientific knowledge in their clinical practice for each individual patient.

    Directions for Paper Assignment

    1. Introduction and Thesis Statement. What is your paper about? Why is research and evidence based practice important in health care?
    2. Identify your POI. Why is the topic important to your future advanced practice role (FNP, educator, leader, informaticist) and your expected population? CHOSEN POI: improved diabetes education improving patient outcomes-DSMES-Diabetes self management Education and support-
    3. Based on the evidence what process, structure, or outcome measure related to your POI will you expect to change in your practice? You can choose management of a disease process, a protocol that needs updating, a process change, additional diagnostic tools and procedures…. Choose a topic that will improve patient outcomes, reduce costs, or save time in treatment protocols (just some ideas).
    4. Identify a change theory you will use. Discuss the specific parts/steps of change you will use in advocating a change in practice. To review change theories, please refer to Week 4 material.
    5. Search the current literature (last five years) for two research articles related to the selected POI/topic and what area you are proposing change. One article must be quantitative research and one must be qualitative research.
    6. Briefly discuss the following for each article.
    7. Purpose, research design, and methodology of studies (steps, procedures, and strategies for gathering and analyzing data)
    8. Data collection. Describe the procedures developed to guide the collection of data for each study, and sampling of participants.
    9. Results and clinical implications for each study
    10. Applicability of study findings to practice.

    Conclusion. Summarize the major points of the paper. Do no include new information or new citations/references in the conclusion.

    References

    1. Chowdhury, H. A., Harrison, C. L., Siddiquea, B. N., Tissera, S., Afroz, A., Ali, L., Joham, A. E., & Billah, B. (2024). The effectiveness of diabetes self-management education intervention on glycaemic control and cardiometabolic risk in adults with type 2 diabetes in low- and middle-income countries: A systematic review and meta-analysis. PloS one, 19(2), e0297328.
    2. Nguyen, P. V. N., Thach, P. T., Tran, H. K., Nguyen, H. T. H., Truong, D. L., Lam, U., Tran, V. Q., To, N. Y., Luong, N. T. H., Le, D. T. T., Tran, K. Q., & Ly, L. D. (2025). Effectiveness of a digital diabetes self-management education and support program in Vietnamese adults with type 2 diabetes. Scientific reports, 15(1), 41369.
    3. The paper should be 6-8 pages (excluding title page and reference page) and should include at least 5 peer reviewed references (can include your textbooks). APA formatted. No abstract. Use level one and level two headings within the body of the paper to help organize the contents. See grading rubric for allocation of points. Deductions will be made for late submissions.
  • Pain Management

    Part I: Find a YouTube video (or video from another source) of a guided meditation specifically for pain management (minimum of 15 minutes in length). Complete the full session and describe your experience. (i.e. did you enjoy it? Did you find it relaxing? What would you change about it? Would you recommend it to anyone else or ever use it in a therapeutic context?) Be sure to provide the name, length, and link of the video.

    (Video: https://www.youtube.com/watch?v=3TK2zTuqRmg)

    Part II: Find OR write a script for a pain management meditation or guided imagery session, and lead at least one person (or group of people) through the full script (should be a minimum of 15 minutes long). Describe your experience being the facilitator and the reaction/experience of the people who participated. Be sure to include what your process was for choosing the script.

    Part III: If you had to choose an album to play in the background during a pain management session with a client, what album would you choose and why? (Artist: Berlioz, Album: Open this wall)

  • Writing Question

    I am A student.I need Assignment Work to pay mn university fee.

    Requirements:

  • Configuring and Verifying Site-to-Site IPsec VPNs

    Objective:

    The main objective of this assignment is to make efficient use of VPNs as means of secure connections between different locations of an international company. The student will build the company network and then configure Site-to-Site IPsec VPNs between multiple office locations of a fictitious company called Future Tech Enterprises, verify the VPN tunnels, and ensure secure communication between these sites.

    Scenario: Global Tech Enterprises

    Future Tech Enterprises is a multinational corporation with headquarters in New York and

    branch offices in Abu Dhabi and London. The company needs to ensure secure

    communication between its offices over the internet. Each site has its own local network, and

    the organization wants to establish secure Site-to-Site IPsec VPN tunnels between these

    locations to protect sensitive data during transmission.

    Network Overview:

    New York Office:

    Network: 10.11.1.0/24

    Router: NY-R1

    External IP: 203.0.113.1

    Abu Dhabi Office:

    Network: 10.22.2.0/24

    Router: AD-R1

    External IP: 198.51.100.1

    London Office:

    Network: 10.33.3.0/24

    Router: LDN-R1

    External IP: 192.0.2.1

    Your task is to configure and verify Site-to-Site IPsec VPNs between these three offices to

    ensure that all communication over the public internet is encrypted and secure.

    Part 1: Understanding Site-to-Site IPsec VPNs (20 points)

    Conduct your own research and explain the following questions (Make sure to add the necessary citations):

    • List two advantage and two disadvantages of the use of VPNs to connect different sites of this company
    • Define what a Site-to-Site IPsec VPN is and explain its relevance to Future Tech Enterprises.
    • Describe the different phases of IPsec (IKE Phase 1 and IKE Phase 2) and how they secure communication between the New York, Abu Dhabi and London offices.
    • Discuss the encryption and authentication algorithms that would be appropriate for a multinational corporation like Future Tech Enterprises.
    • Compare IPSEC Site-to-Site VPNs with any other alternative. List a scenario where IPSEC remains the preferred choice and another scenario where an alternative might be better suited for Future Tech Enterprises.

    Part 2: Configuring the Site-to-Site IPsec VPNs (50 points)

    Network Topology Setup (10 points)

    Using network simulation software (e.g., Cisco Packet Tracer) design a network topology that

    includes the New York, Abu Dhabi, and London offices.

    Include network address assignments, routing configurations (static routing), and firewall settings as

    necessary.

    Provide a diagram of the network topology showing how each office connects to the other two.

    After configuring static routing test your routing configuration by pinging between office networks. Include screenshots showing successful pings.

    IPsec VPN Configuration (30 points)

    Configure the IPsec VPN on the routers at each office (NY-R1, AD-R1, LDN-R1). Ensure the

    configurations include:

    • ISAKMP Policy
    • IPsec Transform Set
    • Crypto Map
    • Access Control Lists (ACLs) for interesting traffic between the sites
    • Applying the Crypto Map to the appropriate interfaces
    • Document the configuration commands used on each router, explaining the purpose of each
    • command.

    Verification (10 points)

    Verify that the IPsec VPN tunnels are established successfully between all three offices. Provide

    output from relevant verification commands (e.g., show crypto isakmp sa, show crypto ipsec

    sa).

    Demonstrate secure communication between the offices by pinging between devices on

    different networks (e.g., from a device in the New York office to a device in the London office)

    and observing encrypted traffic. Make sure to add screenshots in the report

    Part 3: Testing and Troubleshooting (20 points)

    _Testing the VPN Tunnels _(10 points)

    Test the VPN tunnels by initiating traffic that matches the ACLs defined in the configuration,

    ensuring that communication between New York, Abu Dhabi, and London is secure.

    Provide evidence (screenshots or command outputs) showing successful data transmission over

    the VPNs.

    Part 4: Reflection and Documentation (10 points)

    Write a reflection on what you learned during this assignment. Highlight any challenges you

    faced, particularly in managing multiple VPN tunnels, and how you overcame them.

    ** Add references and also sign the Academic Integrity Disclaimer in the report template.

    Submission

    Each student must submit 2 files in the given order:

    1. Primary file submission: Full report in a single PDF containing answers to all the Parts along with the screenshots wherever applicable. Name the report firstname_lastname_A1.pdf. Use the following to compile your report.
    2. Secondary file submission: A packet tracer file. Make sure the user account details under packet tracer file must have username a s your firstname_lastname and email must match your ZU email.

    Assignment Information

    Length:

    > 2000 words

    Weight:

    15%

    Learning Outcomes Added

    • : Describe information, network and computer attacks and defenses fundamentals, standards, and security challenges.
    • : Evaluate system and network authentication, access control schemes, and components of virtual private networks (VPNs).

    HOW TO GET FULL MARK COMPLETE INSTRUCTIONS


    PART 1 (20 Marks) THEORY SECTION

    What Your Professor Expects

    Not just definitions.

    He wants:

    • Clear explanations
    • Correct terminology
    • Diagrams (optional but gives bonus impression)
    • Proper references (APA style)
    • Connection to the scenario

    What You MUST Do

    1? Write 2 Advantages + 2 Disadvantages

    BUT:

    • Connect each point to Future Tech Enterprises
    • Explain WHY it matters

    Example:
    Wrong: “VPN is secure.”
    Correct: “VPN ensures encrypted communication between New York and London, protecting sensitive financial data from interception.”


    2? Define Site-to-Site IPsec VPN

    • Clear definition
    • Difference from remote access VPN
    • Mention IPsec operates at Layer 3
    • Explain relevance to multinational company

    3? Explain IKE Phase 1 & Phase 2

    You must mention:

    • ISAKMP SA
    • IPsec SA
    • Diffie-Hellman
    • Encryption negotiation
    • Authentication
    • Interesting traffic

    If you miss these marks deducted.


    4? Encryption Algorithms

    Mention:

    • AES-256
    • SHA-256
    • DH Group 14
    • Pre-Shared Key

    Explain WHY enterprise needs strong encryption.


    5? Comparison Section

    Compare IPsec vs SSL VPN:

    Make table:

    | Feature | IPsec | SSL VPN |

    Professors love comparison tables.


    6? References (VERY IMPORTANT)

    Minimum 3 academic references:

    • Cisco documentation
    • NIST
    • Stallings textbook

    If you skip references automatic mark deduction.


    PART 2 (50 Marks) PACKET TRACER (MOST IMPORTANT)

    This is where most students lose marks.

    You must be organized.


    STEP 1: BUILD CLEAN TOPOLOGY (10 Marks)

    You need:

    • 3 Routers (2811 or 2911)
    • 3 Switches
    • 3 PCs
    • Internet cloud (or serial connections between routers)

    IP Addressing (DO NOT GUESS)

    Use exactly:

    NY LAN:
    Router: 10.11.1.1
    PC: 10.11.1.10
    Gateway: 10.11.1.1

    AD LAN:
    Router: 10.22.2.1
    PC: 10.22.2.10

    LDN LAN:
    Router: 10.33.3.1
    PC: 10.33.3.10

    External interfaces:

    • NY: 203.0.113.1
    • AD: 198.51.100.1
    • LDN: 192.0.2.1

    REQUIRED SCREENSHOTS

    You must include:

    1. Full topology diagram
    2. IP configuration of each PC
    3. Router show ip route
    4. Successful ping BEFORE VPN

    If you skip routing test screenshot marks lost.


    STEP 2: STATIC ROUTING

    Configure static routes on ALL routers.

    Then test:

    ping 10.22.2.10ping 10.33.3.10

    Take screenshot of successful ping.


    STEP 3: CONFIGURE IPSEC VPN (30 Marks MOST CRITICAL)

    You must configure:

    ISAKMP policy
    Pre-shared keys
    Transform set
    ACL for interesting traffic
    Crypto map
    Apply crypto map


    IMPORTANT: You Need 3 Tunnels

    NY AD
    NY LDN
    AD LDN

    If you only configure NY as hub YOU LOSE MARKS.

    Your assignment says:

    Configure between these three offices

    That means FULL MESH.


    Common Mistakes That Lose Marks

    Forgetting to mirror ACL on other router
    Applying crypto map on wrong interface
    Wrong peer IP
    Using wrong wildcard mask
    Not testing traffic

    Avoid these.


    STEP 4: VERIFICATION (10 Marks)

    You MUST include screenshots of:

    show crypto isakmp sashow crypto ipsec sa

    Expected:

    • State = QM_IDLE
    • Encrypted packet counter increasing

    Then:

    Ping from:

    • NY PC LDN PC
    • AD PC NY PC

    Then run:

    show crypto ipsec sa

    Take screenshot showing encrypted packets.

    If you do not show packet counters increasing marks deducted.


    PART 3 (20 Marks) TESTING & TROUBLESHOOTING

    You must:

    1. Show traffic triggering VPN
    2. Explain how tunnel forms
    3. Mention at least 3 troubleshooting techniques

    Example:

    • Check ACL match
    • Verify PSK
    • Verify routing
    • Check interface crypto map

    If you only say it worked low mark.


    PART 4 (10 Marks) REFLECTION

    Professor wants:

    • What you learned
    • Challenges
    • How you solved them
    • Connection to learning outcomes

    Mention:

    • SecFundamental
    • AuthAccessVPN

    That gives strong impression.


    SUBMISSION RULES (DON’T LOSE EASY MARKS)

    You must submit:

    1? PDF Report

    Name:

    firstname_lastname_A1.pdf

    Contains:

    • All answers
    • All screenshots
    • References
    • Academic integrity signed

    2? Packet Tracer File

    VERY IMPORTANT:

    Inside Packet Tracer:

    Go to:
    Options User Profile

    Set:
    Username: firstname_lastname
    Email: your ZU email

    If you forget this mark deduction.


    HOW TO GET 100%

    Here is checklist:

    Clear theory
    References
    Clean topology
    Static routing verified
    Full mesh VPN
    Correct crypto configuration
    Tunnel verification screenshots
    Packet counters increasing
    Troubleshooting explanation
    Reflection written properly
    File names correct
    Packet Tracer user profile correct


    FINAL ADVICE (From Experience)

    Most students lose marks because:

    • They configure only 1 tunnel
    • They forget verification screenshots
    • They dont explain commands
    • They skip references

    You will not make these mistakes.

    Requirements: 2000 | Python

  • Persuasive specch with speaker note PowerPoint presentation…

    Types of Persuasive Arguments

    Different types of arguments serve different persuasive purposes. Consider these common argument types for your speech:

    • Problem-Solution: Demonstrates a significant issue and proposes a viable solution
    • Comparative Advantage: Shows why your proposal is superior to alternatives
    • Cause-Effect: Establishes causal relationships between actions and outcomes
    • Value-Based: Appeals to shared values, principles, or ethical standards
    • Testimony-Based: Uses first-hand experiences or expert opinions to support claims

    Most effective persuasive speeches combine multiple argument types to create a comprehensive case. For example, a speech advocating for expanded campus mental health services might include problem-solution arguments about current wait times, cause-effect arguments about the impact of untreated mental health issues, and value-based arguments about institutional responsibility for student wellbeing.

    Creating a Persuasive Argument Structure

    Each main argument in your speech should follow a clear structure that guides your audience from claim to conclusion. A strong argument structure includes:

    1. Claim: A clear statement of your position on a specific aspect of your topic
    2. Evidence: Supporting data, examples, or expert opinions (from your required sources)
    3. Reasoning: Explicit connections showing how your evidence supports your claim
    4. Impact: Explanation of why this point matters to your audience

    For example, in a speech advocating for expanded campus bike lanes, a structured argument might include: a claim about safety concerns for cyclists, evidence from campus accident statistics, reasoning connecting the lack of dedicated lanes to accidents, and impact statements about how improved safety would benefit all campus community members.

    Addressing Opposing Viewpoints

    Acknowledging and responding to potential counterarguments strengthens your persuasive impact by demonstrating fairness and thorough understanding. Effective counterargument strategies include:

    • Acknowledge-and-Refute: Recognize a valid concern, then explain why your proposal still makes sense
    • Common Ground: Identify shared values before showing how your proposal better serves those values
    • Limitation-and-Solution: Admit potential drawbacks while providing mitigating solutions

    Within your 7-8 minute timeframe, plan to address 1-2 significant counterarguments. For instance, if advocating for a campus sustainability fee, you might acknowledge concerns about additional student costs before explaining how the long-term savings and environmental benefits outweigh this initial investment.

    Research and Evidence

    Your assignment requires a minimum of two credible sources cited in MLA format. The “Research” and “Ethical Communication” categories in your rubric specifically evaluate how effectively you integrate and cite these sources.

    Finding Credible Sources

    For your persuasive speech, look for sources that offer reliable, relevant information about your topic. Strong source types include:

    • Academic journals: Peer-reviewed research with rigorous standards
    • Government publications: Official reports, statistics, and policy documents
    • Industry studies: Research from professional organizations or institutes
    • Reputable news sources: In-depth reporting from established outlets
    • Institutional resources: Data and information from relevant organizations

    While you need only two sources for your assignment, having 3-4 quality sources can strengthen your persuasive case if they’re integrated effectively. Focus on finding the most authoritative and relevant sources rather than simply meeting the minimum requirement.

    Evaluating Source Credibility

    When selecting sources for your persuasive speech, evaluate their credibility using these criteria:

    • Authority: Is the author/organization qualified to speak on this topic?
    • Accuracy: Is the information supported by evidence and consistent with other reliable sources?
    • Currency: Is the information up-to-date enough for your topic?
    • Objectivity: Does the source show reasonable balance, or is it heavily biased?
    • Relevance: Does the source directly address aspects of your specific topic?

    Keep in mind that your assignment requires you to “practice ethical communication” by incorporating credible sources that will strengthen your persuasive appeal both logically and ethically.

    Types of Evidence

    Different types of evidence serve different persuasive functions in your speech:

    • Statistical evidence: Numerical data that demonstrates patterns or significance
    • Expert testimony: Opinions or statements from recognized authorities
    • Case studies: Detailed examples that illustrate your points
    • Historical precedents: Similar situations from the past and their outcomes
    • Experimental results: Findings from scientific or social research

    For your 7-8 minute persuasive speech, aim to include 2-3 different types of evidence to create a well-rounded argument. For example, if advocating for a campus food pantry, you might combine statistics about student food insecurity, expert testimony about its impact on academic performance, and case studies of successful pantry programs at similar institutions.

    Citing Sources in MLA Format

    Your assignment requires using MLA citation format for your sources. This includes both in-speech citations and citations in your visual presentation. When citing sources verbally:

    • Introduce the source with relevant credentials: “According to Dr. Maria Chen, a professor of environmental science at Stanford University…”
    • Provide the source’s publication date if relevant: “In a 2023 study published in the Journal of Higher Education…”
    • Make the citation part of your natural delivery rather than an awkward interruption

    In your required 7-10 slide visual presentation, include proper MLA citations for any quoted material, statistics, or specific facts. This typically means adding a brief parenthetical citation (Author Last Name Page#) and including a works cited slide at the end of your presentation.

  • It3240 information

    help with home

    Requirements: Clear

  • Calorimetry Experiment

    Go through all the files I have submitted and read them. Be keen when doing the experiment, calculations and figures.

    Attached Files (PDF/DOCX): FreezingPointReport.pdf, FreezingPointProcedure.pdf, FreezingPointIntro.pdf, FreezingPointLectureSlides.pdf, Calorimetry Experiment Agenda.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • American Anime Paper

    Please analyze an American cartoon of your choosing (must be approved by the professor) that appears to have been influenced by Japanese anime. The purpose of this paper is to exhibit understanding of important class concepts by showing your ability to use these concepts in your own analysis. Students will compare and contrast the chosen media with Japanese anime, paying close attention to the various characteristics and themes learned in this course, and argue whether or not the American-made series should be considered anime. The paper should incorporate class readings in their discussion. This argumentative analysis should be five to six full pages double spaced 12pt Times New Roman font. This assignment requires MLA intext citations (author and page number). Failure to use accurate MLA citations, including page numbers, will result in a 0.

    Attached Files (PDF/DOCX): AnimePaperRubric.pdf

    Note: Content extraction from these files is restricted, please review them manually.