discussion 994

Table 57-4 Key Criteria for Abstracting Medical and Surgical-Related Sections ( exert from your book and or PowerPoint on this chapter )

Using table 57.4, review the questions On how do identify a route operation for sections 1–9. Then answering those questions, provide an example of a procedure that would be under each of these sections. You will have nine answers in total for this discussion. No response post necessary for this week., although discussion is always encouraged especially when assisting fellow classmates and either identifying a proper procedure for the section, or any questions regarding a procedure or section

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

communication styles 1

There are different communication styles. In your paper, address the following:

  1. Describe three styles of communication.
  2. How are communication styles used and applied in the workplace?
  3. Reflect on a work experience/issue where communication impacted the team.
  4. What were the outcomes of the situation?

Your paper should be 2-3 pages plus a title page and reference page. Follow APA format, Include 2 outside academic sources to support your responses. Use outside sources other than the textbook, course materials, or other information provided as part of the course materials.

Sample paper attached

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

i need help with my assignment can you help

2-3 additional pages of screenshots in the Design Document and zipped Java code project files

View objectives for this assignment

In this assignment, you will be asked to demonstrate what you have learned in the Discussion Board in terms of vector, wrapper classes, conversion, and collection data structures by writing and implementing Java code within your application that demonstrates each of these concepts. Hint: These may be utilized in areas of storing items in the customer order so that you can allow the customer to order more than one sub or beverage. Refer to the sample prototype in Unit 1 for the various item lists you will use. Feel free to add more choices to each of these lists.

Deliverable

The following are the Unit 3 Individual Project deliverables:

  • Update the title page for the Design Document with the Project Name (Unit 3 IP) and date.
  • Add the following section header: Phase 3 Revised Application Screenshots.
  • Add screenshots of each distinct screen from your running application.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Can trigonometry be used to prove the Pythagorean theorem math homework help

Can trigonometry be used to prove the Pythagorean theorem? Please provide an explanation and examples for your answer following MLA Guidelines.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

management information systems 42

Read four (4) academically reviewed articles on Net Neutrality and complete the following activities:

1. Summarize all four (4) articles in 300 words or more. Please use your own words. No copy-and-paste

2. Base on your article review and the assigned reading, discuss how net neutrality will affect data networks and the availability of information to businesses. Do you believe net neutrality will lead to IT efficiency? Why or why not?

Note:-

Read and respond to at least two (2) of your classmates’ posts. In your response to your classmates, consider comparing your articles to those of your classmates. Below are additional suggestions on how to respond to your classmates’ discussions:

· Ask a probing question, substantiated with additional background information, evidence or research.

· Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives.

· Offer and support an alternative perspective using readings from the classroom or from your own research.

· Validate an idea with your own experience and additional research.

· Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings.

· Expand on your colleagues’ postings by providing additional insights or contrasting perspectives based on readings and evidence.

Reply to Topic 1:-

In the last couple decades, there has been a surge of distance education course/program offerings. These developments have been possible because both distance learning educators and learners have maintained a relatively equal access to the Internet. Many educators will agree that online learning provides access to flexible opportunities to learners who otherwise would not be able to advance their education (Graham, 2006). The Pew Research Center recently published a report that the findings suggest access to the Internet have positive influence to lifelong learning. They found that American adults who have access to technology tools are more likely to become lifelong learners and those adults rely on the Internet to access educational opportunities (Pew Research Center, 2016). They also found that adults who have both broadband and smartphone connections to the Internet are more likely to engage in personal and job-related learning activities to advance in their career than adults who have one mode of connection to the Internet.

The purpose of this study was to introduce net neutrality and its potential impact to online learning. We believe that if net neutrality is not in place, both distance learning educators and learners may find difficulty in engaging with online materials depending on where they live, personal finances, and what features they are willing to bundle into their cable services. Net neutrality regulatory decisions has significant influence on how US residents can access the Internet (Ganley & Allgrove, 2006). We chose to engage in this research because for the most part distance education scholars have taken net neutrality for granted and have not investigated its implications to online learning. When net neutrality is not maintained, university administrators, staff, and faculty will not be able to ensure that their students will have equitable access to learning experiences in online courses. Instead, student access to online educational opportunities can be differentiated by how much they are able to pay a private cable or phone company and whether they live in a highly-populated city area or in less-populated rural area.

Our research question was: How do the complexities involved in the net neutrality debate in the United States affect public access to online information and services, and what implications does this hold for online learning? To address our question, we approached our research from a collective perspective, relying on Cultural Historical Activity Theory (CHAT) through activity systems analysis. We engaged in a qualitative investigation of US public documents and explored the effects of net neutrality and public digital access. Most documents we examined were from fields outside of education because the ongoing discussions have been taking place in areas such as economics, information science, law, and policy-making (see Choi & Kim, 2010; Krämer, Wiewiorra, & Wenhardt, 2013; Powell & Cooper, 2011; Reinard & Ortz, 2005). The goal of our analysis was to better understand the net neutrality regulatory and public debates and find how it is relevant to the future of distance education.

While there may not be abundant discussions in the current scholarly literature about net neutrality and its relevance to distance education, as researchers and practitioners we believe that net neutrality is a critical topic that need further examination by distance education researchers and practitioners. When we examined the literature to find commonly identified barriers for students taking advantage of distance education opportunities, we found that there were several conversations about learner skills, costs, and retention (e.g., Muilenburg & Berge, 2005; Simpson, 2013; Taplin, Kerr, & Brown, 2013). In one of the few publications we found that discussed net neutrality and its implications to distance education Brumfield (2010) examined factors that brought challenges to students in university environments. She found that online students felt most isolated from their learning community when they did not have access to library materials and they experienced difficulties with their Internet connection. This finding suggests that when online students have differentiated access to the Internet, they are likely to not be able to develop a sense of community and become less engaged with their learning experiences. In another article, McKee (2011) concluded that university educators and students need more information about Internet related policies to better understand their freedom to access information and be better prepared to take action when necessary. As a faculty in English, McKee provided suggestions on how net neutrality can be integrated into the undergraduate curriculum related to rhetoric and primary and secondary research.

Net Neutrality is a timely topic to investigate because at the time of writing this article, media outlets are speculating that with a Republican president and majority in both houses of Congress, the regulations that promote net neutrality and digital equality put into place by the previous administration would be altered.

Reply to 2nd topic:-

Net neutrality is a simple idea, but because it is present at the intersection of highly technical internet architecture and equally complex principles of the laws of administrative, it has become a very notoriously cute principle. Net Neutrality has sociocultural implication as it affects everyone from corporate ecosystem to education sector as well. According to Netflix CEO Reed Hastings, the principles of Net Neutrality will be enforced by powerful market forces than that of regulations. He believes the more the regulation the more things will become worse in recent future.

Major Players in Net Neutrality

FCC along with FTC(Federal Trade Commission) is the main US regulatory body which appoints commission members and Congress and is solely responsible for making decisions. FCC’s 2015 open internet order which gave the internet users strongest protection possible.

Other big players in Net Neutrality are businesses like Google, Netflix, Facebook and other infrastructure providers like engineering groups, ISPs and companies which are the true backbone of the internet.

The social implications of Net Neutrality are quite high as people feel that these big business companies will start charging more from people for using their favourite internet websites and usage. Another set of people thinks that their content will be oppressed by these companies to promote the content of their companies from which they earn money. Like we have seen with the cases of Facebook, Google who are being warned of not promoting a certain content only. The true information that needs to be provided to the information seeker will be altered if these companies are given free hand and are not guided by any regulations from the government.

These regulations are always used in the past as well to protect the rights of the common people, to maintain the perfect competition among the corporates as well on the digital platform as well. Because giving undue advantage to certain companies will be rise to monopoly which is neither helpful to the consumers as well as to the new startups who are always required for the future opportunities.

Net Neutrality is having a bad impact on data networks because of companies like Verizon, AT & T, Comcast can make good profits by charging extra money for certain websites or fast browsing of certain content by using fast lane structures for them.

In case of IT efficiency, Net neutrality is also having a bad impact because an excess of data used by companies like YouTube and Netflix are slowing down the overall efficiency of the Internet and charging the highest bandwidth users will lead to a better connection availability. Also, it will help them to protect piracy and illegal downloading of content media as well

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

2 3 page paper analyzing news article

I want you to give an insightful writeup on UChicago donation scandal with the Pearsons

https://www.chicagomaroon.com/article/2018/3/5/pea…

Use MLA citation, use relevant, short quotes that illustrate the situation.

The best grades will demonstrate the most complete understanding of the relationship between the Pearsons, the donors, and the University and explain whether or not the dissatisfaction of the Pearsons is reasonable or not.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

discussion social work evaluation

Review the many examples of process evaluation results described in Chapter 8 of Dudley, J. R. (2014). Social work evaluation: Enhancing what we do. (2nd ed.) Chicago, IL: Lyceum Books, or in the optional resources. Select an example of a process evaluation that produced valuable information. Compare the description of those results with the Social Work Research Qualitative Groups case study located in this week’s resources: I will upload the case study

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

it need to be at least 300 words

  • It will be helpful for you to review Chapter 4 pages for this week’s discussion question.Something to consider: Think about the video here and this week’s reading.
    Our text tells us, “Self-regulation refers to the self’s capacity to alter its own responses. It is quite similar to the everyday term “self-control” (pg. 131). Self-regulation enables people to be flexible, to adapt themselves to many different circumstances, rules, and demands. It enables people to “live together and get along much better” (pg. 132).
    Baumeister points out that there are three important “components” to remember in order to successfully self-regulate: 1) standards, 2) monitoring, and 3) strength or capacity to change.

    Your discussion post:
    Based on this week’s reading, think of an example from your own life in which you have had success in meeting a goal. What methods did you use to achieve success? Did it involve willpower? Baumeister says that we can build willpower much like a muscle (136). Do you agree or disagree?
    Read the section in your text titled: “Habits, Self-Defeating Acts: Being Your Own Worst Enemy” and Delay of Gratification (Pages 138-141). Can you relate to any of these actions that you had to overcome in order meet your goals? If so, how did you handle these self-defeating behaviors?
    *Only share what you are comfortable sharing about your own behavior. This is not meant to be too personal.(It is not the idea here to share personal information, but rather to show understanding and validate each other’s experience). Discuss these questions in your initial post. *Remember to cite your resources with in your post, using the parenthetical citations within the post, and references at the end of your post. Then remember to respond to two of your classmates

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Custom vs.Standard Threat Mitigation

Custom vs.Standard Threat Mitigation

(Custom vs.Standard Threat Mitigation)

Discussion and writing assignment 1

Discussion:

Q) Make an argument for or against custom threat mitigation approaches versus standard threat mitigation approaches.

NOTE: This discussion should be at least 350 words.

Writing Assignment:

Q) Relative to STRIDE, which aspect (i.e. Spoofing, Tampering, Repudiation, etc) can be effectively addressed using the “wait and see” approach and yet still not expose a system to more risk.

NOTE: Should be at least 350 words | Must follow APA guidelines | Citations and References | Plagiarism free

Discussion: Custom Threat Mitigation vs. Standard Threat Mitigation Approaches

Argument for Custom Threat Mitigation Approaches

Custom threat mitigation approaches are increasingly critical in today’s complex and dynamic cybersecurity landscape. These approaches allow organizations to tailor their security strategies to their specific risks, needs, and resources. Custom threat mitigation is especially beneficial when dealing with unique or emerging threats that may not be effectively mitigated by standard approaches.

One of the primary advantages of custom approaches is that they provide a more precise defense against specific vulnerabilities. For example, if an organization deals with a particular type of data that is highly targeted by adversaries (e.g., intellectual property or sensitive financial data), a custom approach can integrate specialized encryption, multi-factor authentication, and continuous monitoring tailored to protect that data. This level of specificity allows organizations to stay ahead of adversaries who might exploit unknown or less commonly targeted attack vectors.

Moreover, custom mitigation strategies consider the unique operational environment and technology stack of an organization. For instance, a large enterprise with a vast network of interconnected devices may need a more granular approach to threat detection and response than a small business with limited digital infrastructure. A custom solution can incorporate context-specific threat intelligence and adapt over time based on ongoing risk assessments.

However, while custom mitigation approaches can be highly effective, they come with challenges. They typically require more resources in terms of time, expertise, and budget. Custom solutions also have a higher risk of becoming outdated if not regularly updated to adapt to the constantly changing threat landscape. Despite these challenges, the flexibility and adaptability of custom approaches are crucial in maintaining a robust defense against sophisticated and targeted cyber threats.

Argument Against Custom Threat Mitigation Approaches

On the other hand, standard threat mitigation approaches, such as firewall configuration, intrusion detection systems, and standard encryption protocols, have their advantages. They are generally more cost-effective and easier to implement across a broad range of organizations. Standard approaches often come with established best practices and can be updated regularly by vendors, reducing the burden on internal teams. For many organizations, especially small to mid-sized businesses, these solutions provide a solid defense without the need for expensive customization.

In conclusion, while custom approaches offer more precise protection tailored to an organization’s needs, standard mitigation strategies should not be overlooked. For most organizations, a hybrid approach that combines the benefits of both standard and custom mitigation strategies can strike the best balance between comprehensive coverage and resource efficiency.


(Custom vs.Standard Threat Mitigation)

Writing Assignment: STRIDE and the “Wait and See” Approach

The STRIDE model is a widely used framework for identifying potential security threats in software systems. STRIDE stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service (DoS), and Elevation of Privilege. Each of these categories highlights a different type of threat that can compromise the security of a system. While many of these threats require immediate action, there are certain aspects of STRIDE that may be addressed with a “wait and see” approach without significantly exposing the system to further risk.

One of the aspects of STRIDE that can often be mitigated using a “wait and see” approach is Repudiation. Repudiation refers to situations where a user denies performing an action or transaction, even though evidence exists to the contrary. In some cases, organizations might choose to wait and gather more evidence or perform a deeper analysis of system logs before implementing specific repudiation defenses.

In systems that already have logging mechanisms in place, a “wait and see” approach allows administrators to review logs to detect irregularities or inconsistencies that could indicate repudiation attempts. Rather than implementing an immediate response (e.g., locking down access or alerting all stakeholders), waiting for a more detailed understanding can avoid unnecessary actions that might disrupt system functionality or cause false alarms. For example, an initial review of logs might not reveal conclusive evidence of repudiation, so further investigation may be warranted.

This approach works particularly well when combined with a robust logging and auditing system, as it ensures that there is sufficient evidence available to either confirm or dismiss repudiation claims. Furthermore, this strategy allows for the identification of patterns that could signal the likelihood of a repudiation attack, such as repeated failed login attempts or suspicious activities by privileged users.

However, while the “wait and see” approach can be effective for repudiation, it’s essential to apply caution and continually monitor the system. A delay in response could potentially lead to loss of evidence or increased risk of further malicious actions if the attacker modifies or deletes logs. Therefore, this approach is most effective when the system has secure logging mechanisms, and when any potential signs of repudiation are still within an acceptable window for investigation and response.

In conclusion, the “wait and see” approach can be used effectively for addressing repudiation threats in systems with strong logging and auditing practices. It allows organizations to avoid hasty decisions and to take measured actions based on thorough analysis, thus reducing the risk of exposing the system to more harm.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!