Category: uncategorised

  • Critical analysis 4 edit

    I am looking for more raw reflections, which can be relation to current events, something you or someone you know has experienced if you’re comfortable sharing, or just raw thoughts immediately upon reading the material. There are other ways to demonstrate that analysis, so feel free to be creative or think outside-the-box in writing these.

    Attached Files (PDF/DOCX): Critical_analysis_ Final 2 (1).docx

    Note: Content extraction from these files is restricted, please review them manually.

  • rhetorical analysis essay

    You have been learning about plagiarism since week 1, when you took the plagiarism quiz. It is now time to demonstrate proper source citations.

    Assignment Details

    you plan on using for your Rhetorical Analysis Essay from the list provided. View or read the source, then open the link to the document below and follow the instructions. Submit the document for grading.

    : Save this document to your computer and answer the questions based on the source you selected. Number your answers to correspond to the downloaded document. Do not write all your responses as one continuous paragrapheach answer should be listed separately.

    Harris, Dan. “The Benefits of Not Being a Jerk to Yourself.” TED, uploaded by TED2022, 2022,

    Summary

    *First sentence of summary contains title and author of source (meets requirement for in-text citation for a summary only).

    *Summary includes a main idea or concept from the original source, includes important facts and details, and is in writer’s own words with no direct quotations.

    *Summary does not use first or second person.

    10 pts

    This criterion is linked to a Learning Outcome

    Paraphrase

    *Paraphrase effectively and clearly captures the literal meaning of the main idea selected.

    *The paraphrase is effectively written in writer’s own words and free of quotes.

    *Paraphrase contains properly formatted MLA in-text citation.

    10 pts

    This criterion is linked to a Learning Outcome

    Quote

    *Writer effectively uses a signal phrase to introduce the quote.

    *Quote is properly formatted with quotation marks and brackets if necessary.

    *Quote contains a properly formatted MLA in-text citation.

    10 pts

    This criterion is linked to a Learning Outcome

    Document is in MLA Format

    10 pts

    This criterion is linked to a Learning Outcome

    Automatic Deductions

    Answers are not numbered as instructed -5

    0 pts

    Total Points: 40

  • English Question

    You will conduct research on a diverse/disadvantaged and/or oppressed population

    (students’ definition of this can be broad -e.g., some groups that could be considered
    include those with developmental or other physical/mental challenges; sexual or ethnic
    minorities; older adults; men-because they often aren’t a focus of practice). The goal of
    this assignment is to assist you in using social work literature to identify techniques and
    strategies (evidence-based) supported by research in working with diverse groups.
    What you need to do:
    1. Locate one journal article, book, or professional paper that describes some
    aspect of social work practice addressing your chosen population. You might
    begin by looking at the bibliography for the text. In addition, you can consult with
    the computerized databases in the library (e.g., age line, social sciences
    abstracts).
    2. Read the article and identify one technique or strategy that the author(s)
    suggests will be helpful in working with this population.
    3. Prepare a brief (two to three pages) written summary of the technique and a
    critique of the author’s research. In your review, address the following:

    a. What does the author suggest are the main clinical or other issues facing
    this population?
    b. Describe the approach suggested by the author(s).
    c. Does the author cite any research or study that supports his/her suggestions?
    d. What are some of the limitations to using this approach, particularly for
    this population (e.g., is it appropriate? Might it reinforce stereotypes/oppression? Is it an evidence-based approach?)
    e. Are there any ethical considerations in using this approach?
    f. Would you be comfortable using this approach? Why or why not? Include in this any critique you might have of the approach based on your knowledge of the population, research methods, theory, or any values conflicts you might have personally.
    g. What did you learn about this population? Did what you learned change any previously held beliefs, values, ideas, stereotypes etc. about this population? How?
    h. Be sure to include a full citation for the article you used.

    MUST be in APA format and 3 pages long : I have attached the article I chose below that goes with the assignment

    Requirements: 3 pages

  • Current Event

    This application assignment requires you to share a business-related article from the past 18 months that describes your view of our assigned course topic(s) for the week. In other words, your view may explain the topic’s effect, relevance, importance, non-significance, etc., in workplace behavior. This assignment should consist of four distinct paragraphs. In the first paragraph, you will summarize the article you chose. In the second paragraph, you will clearly identify and discuss the course topic(s) relevant to the article. In the third paragraph, provide a thoughtful critique of the article, examining its strengths and limitations. Limitations include biases,

    assumptions, or gaps in the articles argumentation or evidence. In the final paragraph, provide personal reflections, including your learning and growth from engaging with the article, and offer insights into its influence on your understanding and perspectives.

    Current Event:

    • The current event story must be from a credible source within the last 18 months with appropriate citation.
    • The context must be provided on why the story is immediately relevant to the topics being covered.
    • Responses that are purely opinion and anecdotal are not considered to be substantive in nature.
    • Original current event story from an external source plus two additional external sources required.

    PLEASE USE THE NOTES PROVIDED TO FIND AN ARTICLE THAT CONNECTS

    Attached Files (PDF/DOCX): PPS1_Charm Pricing.docx, Pricing Methods-AL-Script.docx, PPS2_Anchoring.docx, Pricing Methods-AL-Script.docx, PPS2_Anchoring.docx, PPS1_Charm Pricing.docx, rubric.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Literature Question

    Description:

    Students will read the following article correlating to the weeks topic and write a reaction paper following the prompts given by the Instructor. Reaction paper should be 2 pages (no more) and follow American Psychological Association (APA) formatting with proper grammar and syntax. Failure to properly cite including in-text citations and a reference page will result in a zero.

    After reading CH. 11 in your text, give a brief overview of the topic. Then discuss how social workers can develop and engage in inclusive, intersectional, and participatory practice as related to childrens rights. Include theories and thoughts on social justice, anti-racism, diversity, equity, and inclusion

    I have attached ch 11 below. She wants two page reflection essay on it . I posted her instructions above . MUST be in APA format ! Thank you

    Requirements: 2 pages

  • M7: Team Discussion Summary 5

    Requirements: M7: Team Discussion Summary 5

  • Mughal Miniature Painting: Mukhya Visheshtaayein (Key Featur…

    Samishran (Synthesis): Mughal shaili Persian aur Bhartiya (Rajput/Hindu) kalakritiyon ka sundar mel hai.

    Kagaz ka upyog: Isme adhikatar ‘Wasli’ (kahi paraton wala kagaz) ka istemal hota tha.

    Rang: Prachur matra mein sone (gold), chandi (silver) aur kimiyaayi rangon ka prayog hota tha.

    Vishesh Prabhav: Isme ‘Persian’ style ki nanuta aur ‘Indian’ style ki sahajta dikhti hai.

    Darbari Jeevan: Mughal chitra adhikatar darbar, shikar, aur rajaon ke niji jeevan par aadharit hote the.

    Vastavikta (Realism): Chehron ko banane mein ‘portraiture’ (chehre ki bariki) par vishesh dhyan diya jata tha.

    Prakriti ka chitran: Ped-paudhon, phoolon aur janwaron ka chitran bahut hi sajeev hota tha.

    Bhasha aur Sahitya: ‘Hamzanama’ jaise granthon ka chitran is shaili ki shuruat mana jata hai.

    Kala ka samrakshan: Humayun ise Iran se laya, Akbar ne ise nikhara, aur Jahangir ke samay ye apne charam (peak) par thi.

    Aatmakatha: ‘Tuzuk-e-Jahangiri’ mein chitron ke prati Jahangir ka lagav spasht dikhta hai.

    Bariki (Fine Detailing): Ek-ek baal aur kapdon ki silvaton ko bahut bariki se dikhaya jata tha.

    Shanti aur Yuddh: Yuddh ke drishyon mein uttejna aur darbar mein shanti ka sahi santulan hota tha.

    Rang-sanyojan: Chamkile aur gahre rangon ka prayog hota tha jo samay ke sath bhi dhundhle nahi hue.

    Vastukala ka prabhav: Chitron ki prishthbhumi (background) mein aksar Mughal bhavanon aur jharokhon ko dikhaya jata tha.

    Akbar ka yogdan: Akbar ke samay ‘Dastan-e-Amir Hamza’ ka nirman hua, jisme 1400 chitra the.

    Jahangir ka kaal: Jahangir ke samay chitra kala mein ‘Naturalism’ (prakritikta) badh gayi.

    Shah Jahan ka kaal: Is samay rangon mein aur adhik chamak aur sone ka prayog badh gaya.

    Aura (Halo): Rajaon aur badshahon ke sir ke peeche ‘divya prabhav’ ya ‘halo’ dikhana shuru hua.

    Hashiya (Borders): Chitron ke charon taraf sundar nakashi wale ‘borders’ banaye jate the.

    Lipi (Calligraphy): Aksar chitron ke upar ya niche sundar aksharon mein likhayi ki jati thi.

    Vastra-vibhushan: Mughal darbar ke poshakon, pagdiyon aur jewar ka varnan bahut vistrit hota tha.

    Shikari drishya: Sher ka shikar karte raja ka chitra bahut lokpriya tha.

    Mahila chitra: Mahilaon ko sundar aur aakarshak, aksar jharokhon mein ya garden mein dikhaya jata tha.

    Samyakta: Har chitra ek kahani kehta hai jo us samay ke itihaas ko darshata hai.

    Pratishtha: Mughal chitra sirf manoranjan nahi, balki badshah ki pratishtha ka prateek the.

    Kalam ka prayog: Bahut patli ‘sami’ (squirrel hair) brush ka istemal hota tha.

    Prakritik drishya: Pahadi aur jharno ka Persian prabhav wala chitran.

    Vatavaran: Chitron mein aksar thandi chhaya aur hariyali ka prayog hota tha.

    Jeev-jantu: Hathi, ghode aur shikar ke kutte bahut bariki se banaye jate the.

    Sangeet aur Nritya: Mahfilon mein sangeet aur dance ke drishya aam the.

    Dharmik Sahishnuta: Ramayan aur Mahabharat ka Farsi anuvad (Razmnama) bhi Mughal shaili mein chitrit hua.

    Requirements:

  • Part 2 Assignment: Written Portion Requirements

    lab details

    Unit 6 Lab: Forensic Analysis of a Windows 10 Client

    Outcomes addressed in this activity:

    Unit Outcomes:

    • Examine Windows files for evidence of a compromise.
    • Use Windows commands to easily examine a system.
    • Use EFS forensic analysis to perform an analysis.

    Course Outcomes:

    IT411-3: Apply various types of forensic analysis tools for data recovery to forensic scenarios.

    GEL-1.02: Demonstrate college-level communication through the composition of original materials in Standard English.

    PC-3.5: Engage in career development and advancement strategies, including effective networking, mentoring, and creating a personal brand.

    In many forensic investigations, the goal is to determine if any information was exfiltrated or to be able to confidently determine it was not. Many different tools are available that aid in this process, and in this unit, you explore two major approaches. One is examining logs that could be months old for evidence, and the other is real-time detections.

    Part 1 Lab: Forensic Analysis of a Windows 10 Client

    Complete the lab Forensic Analysis of a Windows 10 Client” in the InfoSec Learning (ISL) environment located in Unit 6. Completion is automatically graded and posted to the Gradebook entry for the lab.

    Part 2 Assignment: Written Portion Requirements

    Data integrity is one of the three pillars of the CIA triad (confidentiality, integrity, and availability). The encrypted file system first came into use on NTFS volumes starting with Windows 2000, and has since been a reliable way to keep files and folders secure on Windows server and client systems. If the user changes their password, they may need to use a recovery key to access the file. In this lab, you will see how it is possible to provide access to other users to the files or folders that were encrypted using EFS.

    In 300 words or more, answer the following:

    • What are the benefits of using encryption?
    • What are some of the drawbacks of using encryption?
    • How secure is the use of encryption?
    • Could current forms of AI break this type of encryption?

    Respond to the question by comparing and contrasting your position using both pros and cons.

    Your compare and contrast paper must:

    1. Include a title page.
    2. Use a font size of 10 or 12.
    3. Be at least two full double-spaced pages in length, not counting the title page or reference page.
    4. Include a highly developed viewpoint, purpose, and exceptional content.
    5. Demonstrate superior organization and be well-ordered, logical, and unified.
    6. Be free of grammar and spelling errors.
    7. Contain no evidence of plagiarism.
    8. Include at least two references.

    The written portion must contain sufficient information to adequately address the questions and be free from grammar and spelling errors. The paper should be provided in APA format. You may use AI as part of your research but ensure you cross-reference your research to prevent misinformation. Refining your prompts can help you generate precise and relevant responses. Refer to your syllabus for more information on Purdue University Global’s artificial intelligence (AI) policy and resources.

    For assistance with APA requirements, please use the resources provided in the Academic Tools section of the course. Points deducted from grade for each writing, spelling, or grammar error are at your instructors discretion.

    Review the policy on plagiarism. This policy will be strictly enforced on all applicable labs and discussion posts. If you have any questions, please contact your professor.

    Directions for Submitting Your Lab

    The lab you take on InfoSec Learning will be graded automatically and reported to your instructor, but you must submit the written portion of the lab to assignment Dropbox. Compose the written portion of your lab in one Microsoft Word document, save it as a file entitled IT411_Unit6Lab_yourname.docx, and submit it to the designated assignment Dropbox for this activity.

    Attached Files (PDF/DOCX): Unit 6 Lab assignment.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Part 2 Assignment: Written Portion Requirements

    Unit 5 Lab: Using Hash Functions to Validate Data Integrity

    Outcomes addressed in this activity:

    Unit Outcomes:

    • Collect volatile data in a text file.
    • Practice commands helpful to the forensic examiner.
    • Capture running RAM.
    • Conduct a memory dump using Volatility.

    Course Outcome:

    IT411-3: Apply various types of forensic analysis tools for data recovery to forensic scenarios.

    Data integrity is one of the three pillars of the CIA triad (confidentiality, integrity, and availability). There are many different types of hashing functions. For example, MD5, SHA-1, SHA-256, SHA-384, and SHA-512. Different mathematical calculations result in stronger hash values. The strongest of these hash values listed is SHA-512, and the weakest is MD5. Although weaker than the others, the MD5 hash is still accepted in court for testimony. As the number of files continues to increase, larger hash values ensure even more reliability than older ones that were used.

    Part 1 Lab: Using Hash Functions to Validate Data Integrity

    Complete the lab “Using Hash Functions to Validate Data Integrity” in the InfoSec Learning (ISL) environment located in Unit 5. Completion is automatically graded and posted to the Gradebook entry for the lab.

    Part 2 Assignment: Written Portion Requirements

    There are five types of hashing algorithms. Write a 300-word explanation of each type of hashing algorithm.

    The written portion must contain sufficient information to adequately address the questions and be free from grammar and spelling errors. The paper should be provided in APA format. You may use AI as part of your research but ensure you cross-reference your research to prevent misinformation. Refining your prompts can help you generate precise and relevant responses. Refer to your syllabus for more information on Purdue University Global’s artificial intelligence (AI) policy and resources.

    For assistance with APA requirements, please use the resources provided in the Academic Tools section of the course. Points deducted from grade for each writing, spelling, or grammar error are at your instructors discretion.

    Review the policy on plagiarism. This policy will be strictly enforced on all applicable labs and discussion posts. If you have any questions, please contact your professor.

    Directions for Submitting Your Lab

    The lab you take on InfoSec Learning will be graded automatically and reported to your instructor, but you must submit the written portion of the lab to assignment Dropbox. Compose the written portion of your lab in a Microsoft Word document, save it as a file entitled IT411_Unit5Lab_yourname.docx, and submit it to the designated assignment Dropbox for this activity.

    Attached Files (PDF/DOCX): Unit 5 Lab assignment.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • inter. med. surg. nurs.

    make up assignment need help with all questions answered please

    Requirements: all questions answered