Essay Help on Literature

Essay Help on Literature

Literature in a broad context is any single meaning representation of written work. It was writing considered to have an artistic or intellectual benefit and deploys words in a way that is different from ordinary usage. Literature has life giving power that readers enjoy in the way of trying to gain a sense of them. It tries to bring peoples thoughts together since they read the same texts. Any form of literature work has the power to nourish any form of mediation anyone one has ever found and a mode of assimilation and tries to make us up. Different forms of literature try to bring and create the same environment using different words and styles. Same themes are explored in various writing materials using different representations of events. In appreciation for literature, a person can transcend what surrounds them through literacy, drawing personal strength and looking upon those who surround them. The power of words is used demonizing and criticizing the world and brings out the noblest and strong responses after role humanity never started on a brick age but with words, bitter and hateful words, words are the actual life and can separate the essence of life and death. In this paper, how different styles and wording have been used to bring out the same meaning and the representation of various themes will be depicted. (Essay Help on Literature)

Essay Help on Literature

Theme representation of different literature work

In a comparison of two essay works that draw their referencing from various novels, the use of the different representation of the same themes is portrayed. They all talk about humanity, injustices, death, religion, sacrifice and self-identity. Considering the book, thief in the essay about dreams, it talks about a young who goes to stay with the foster parents after her mother is reprimanded and her father drawn to the army during the world war in Nazi German rule. Liesel in her life fights with the inability to find herself but with the help of the wife of the town’s mayor, Ilsa, who realizes her power for books helps her towards self-identity. Leisel steals several books from Ilsa’s house that seems not to care and afterward presents an empty book to Liesel that he writes her story on.

The young girl is taught how to read and write by her foster father and in appreciation for literature to depict the injustice, brutality, and inhumanity. It reflects the realities of the Nazi German rule that lead to the death, quote, “six million Jews millions others in gas chambers showing the immense of inhumanity and brutality. It is her dream to be able to call out to the world and try to change the prevailing situation using her word and creativity. Everyone around her dies while sleep with the bombing in the Himmel Street and this makes her desperate enough to drop her book which is picked up by death but finds refuge in Ilsa’s house and later her father. In this book, discrimination over the Jews is clearly shown, and any attempt to help a Jew was the bravest thing to do as seen by her foster father, Han. Han’s life was saved by a Jewish soldier during World War 1 who sacrificed his life and in a way to pay back Han gives refuge to the Jewish son, Max and is later punished. Although Liesel steals book to read she can realize the value of life and show it to the world which was her long term dream

For a person to achieve their dreams, a lot of effort and sacrifice is essential, insisting on the vision, overcoming the temptations and following your instincts. The essay on dream also talks about a book The Ocean at the end of the lane of a man who is in search of self-identity caused by the disconnection between adulthood and childhood. He uses flashback to recall events that took place when he was a boy; he faced fights with the supernatural being that gained access into the world after an Opal Miner steals his father’s car and later committing suicide at the backseat for gambling away with friends’ money. A coin became lodged in the writer’s throat which from a neighbor it was a spirit and needed to be bounded but on the travel necessary to bind it he lets go of Lettie’s hand and a warm lodges in his foot and in an effort to pull it a piece remains which later he realizes it was the spiritual being. The spiritual being finds its way into the boy’s home as the maid where it gains control over her sister and father.

Ursula the spirit, after seducing his father, causes the boy to be alienated from his family and is nearly killed by his father in a bath tab. The narrator remains locked up in his bedroom and somehow manages to escape to the Hempstock farm. The Hempstock negotiates with the spirit that does not believe that any harm can come to her but later by “hunger birds.” Since the narrator has a piece of warm in him, the Hunger birds insist on eating the narrator’s heart, and he is kept in the safety of the property, Ocean. The inhumanity arises when the hunger birds begin to eat his world to force him to come out the property. The narrator tries to sacrifice himself for others, but Lettie intervenes by jumping in between him and the Hunger birds which injure her and transform her into a different world. She is placed in the ocean behind their house where she is to rest until she returns to this world. The narrator has a fading memory of the past and doesn’t recall his visits to the house. The memories are caused his heart slowly growing back which was indeed eaten by the hunger birds. The theme of inhumanity, death, and sacrifices towards the realization of the value of life are represented differently from the book Thief but are meant to achieve similar goals of exploring the value of life.

In a comparison with the essay about Small Gods, the same are also seen but in a different perspective. The book involves a great god Om and his prophet Brutha who together they work to fight zealotry where humans are attached to strong religious, cultural or political beliefs and cannot tolerate other conflicting ideas. The god Om wants to be restored to his former glory and power, and they have to discuss the nature of these beliefs. The narrator is a humanist and the themes of the relationship between man and God, fate, the universe and death. The discussion with the unbelievers is somehow difficult but how can you question God’s existence when every he keeps smiting you when you deny and I quote “Gods don’t like that sort of thing,’ said the barman.’ We get that in here some nights when someones has had a few. Cosmic speculations about whether gods exist. Next thing there is a bolt of lightning through the roof with a note wrapped on saying “yes, we do.”

In this text, death falls in love with humanity, and at some points, the god Om quits his job and becomes preoccupied with the fate of lack of power and believers; he seems to be in a fight for self-identity. However, the journey of the God proceeds with humanity becoming a great concern to him, and at some point, he asks questions of justice and fairness. In one scenario he begs the Sea Queen not to drown a ship full of people, and she tries to understand the concept and I quote,’ Sounds like a human idea to me, they are inventive, I will grant you. But what I meant is they have done nothing to deserve it. “Deserve? They are human, what does deserve got to do with it?’ Om has to concede that since he was not thinking like a god.

From a distant Om hears a whisper which is terrible and deity from the wind, a man slowly goes to his knees as death approaches in the desert of the afterlife. It is prophet Brutha who has seen the ugly side of humanity. He has gone through cruelty and brutality in the hands of humans he looked upon and the holy text he had dedicated his all life too. Besides all these, Brutha has the heart to forgive and still believe by letting the cycle of events breakdown violence and find his life instead of turning harsh and bitter. Actually, he realizes his strength in his weaknesses. Back in the desert of the afterlife, Brutha finds his enemies broken, defeated on the sand but instead Brutha takes the hand of his former torture and lifts him up and I quote,’ he was a terrible person. He died a hard death. So maybe. A queen can forgive her vanquished foe. It is not easy; it does not count if it is easy, it is the hardest thing. Forgiveness. Which is where love and justice finally meet? Peace, at last’.

All contexts in this paper also portray the religion or spirituality, Max the Jewish in the book Thief talks about the life of every creature. Max says that every living creature stays a life because it has a secret behind the life I quote,” in my religion we are taught that every living thing, every leaf, every bird is only alive because it contains the secret word for life. That is the only difference between and a lump of clay. A word, Words are life.” In the book Ocean at the End of the Lane, spiritually comes in a broader way, the people in supernatural beings that can find their way into the human world and gain control over them. The book on Small Gods also portrays religion in a different perspective; the narrator says that everything we encounter in life represents a small God. The Om God is reduced inside the body of a tortoise, and it is hard to convince people of his existence and power due to the belief that a God is mighty. Every book tries to bring out the same theme, but in a different perspective, this shows how words are used differently in literature from the standard meaning to achieve the same goal and create the same atmosphere and mediation in the minds of readers. You think the same with the same attitude and mood with the writer. (Essay Help on Literature)

Use of different situations and styles to achieve the same goal

Different circumstances and techniques have been used to achieve the same purpose every writer has his level of creativity and preference of the style to use. In the Book Thief, the narrator is the character in the story is told in a first person perspective to bring out her experience of inhumanity, Death, colonialism, self-identity. The book, The Ocean at the End of the Lane applies the use flashback to reconnect the narrator’s adulthood and childhood. The memories reflect life experience at childhood depicts the themes of brutality, sacrifice, self-identity and religion. The book Small Gods uses symbolism, where God Om is represented in the body of a tortoise to bring the authors message that everything we meet in life is a small god and there is need to practice humanity, justice, and fairness. (Essay Help on Literature)

Work Cited

Tuckman, Bruce W., and Brian E. Harper. Conducting educational research. Rowman & Littlefield Publishers, 2012.

https://rb.gy/7nvx36

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Applied Behavioral Analysis 2

Applied Behavioral Analysis 2

Resource: How to Make a Graph Using Microsoft Excel

The Unit 6 Assignment requires you to apply the theories, concepts, and research that you have covered so far this term to a hypothetical case study. Your answers to the questions and completed graph should consist of information from the text and supplemental readings.You also may use sources from the Kaplan library or other credible Internet sources, but your primary sources should be the readings assigned for the course.

Read each Case Study and answer the questions below. You will need to write 2–3 typed pages for each case in order to address all required parts of the project.Answers to the questions should be typed in an APA formatted Word document, double-spaced in 12-point font and submitted to the Dropbox.

Your final paper must be your original work; plagiarism will not be tolerated. Be sure to review the Syllabus in terms of what constitutes plagiarism.Please make sure to provide proper credit for those sources used in your case study analysis in proper APA format. Please see the APA Quick Reference for any questions related to APA citations. You must credit authors when you:

Summarize a concept, theory or research
Use direct quotes from the text or articles
Read Case Study 1: Martin

Martin, a behavior analyst, is working with Sara, a 14-year-old girl with severe developmental delays who exhibits self-injurious behavior (SIB). Sara’s target behavior is defined as pulling her hair, biting her arm and banging her head against the wall. After conducting a functional analysis, Martin decided to employ an intervention program consisting of differential reinforcement of other (DRO) desired behavior. Martin collected data on Sara’s SIB before and during the intervention. Below is a depiction of the data that Martin collected:

Sara’s Frequency of SIB

BASELINE Occurrences DRO Occurrences
22 5
25 5
27 3
26 2

 

Address the following questions, and complete the following requirements:

Create a basic line graph using Microsoft Excel, to be included in your Word document. The graph should depict the data provided in this case study. You should only need to create one graph, with SIB depicted, both in baseline and in intervention.
What type of research design did Martin employ when working with Sara? What is an advantage and a disadvantage of using this research design?
According to the data in the graph, was the intervention that Martin selected effective in modifying Sara’s self-injurious behavior?
Martin had considered using an ABAB reversal design when working with Sara. What are some ethical implications of selecting a reversal design when working with the type of behavior problems that Sara was exhibiting?
Martin’s supervisor requested a graph of the data he collected when working with Sara. Why are graphs useful in evaluating behavior change?
Discuss how a graph demonstrates a functional relationship. Identify whether the graph that you created using the data provided in this section depicts a functional relationship.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Write A Program That Asks The User For An Angle, Entered In Radians. The Program Should Then Display The Sine, Cosine, And Tangent Of The Angle. (Use The Sin, Cos, And Tan Library Functions To Determine These Values .) All Numeric Values In The Output

Write a program  that asks the user for an angle, entered in radians. The program  should then display the sine, cosine, and tangent of the angle. (Use the sin, cos, and tan library functions to determine these values .) All numeric values  in the output  should be displayed in fixed-point notation, rounded to four decimal places of precision.

Here is one sample run:

Enter angle: 1.07078
sin(1.07078)=0.8776
cos(1.07078)=0.4794
tan(1.07078)=1.8304

 

I got this so far

 

 

#include <iostream>
#include <iomanip>
#include <cmath>

using namespace std;
int main ()

{
double radians;

cout << “Enter angle:”;
cin >> radians;

cout << ” sin(3.1415)=” <<
fixed << setprecision(4) << sin(radians) << endl;
cout << “cos(3.1415)=”
<< fixed << setprecision(4) << cos(radians) << endl;
cout << “tan(3.1415)=” <<
fixed << setprecision(4) << tan(radians) << endl;

cin.ignore();
cin.get();
return 0;
}

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Visual Basic .Net 2012 Programming

Card Shuffling and Dealing Simulation

Use Visual Basic .Net 2012 to program, debug, and test the following programming project.

 

Modify the Card Shuffling and Dealing Simulation  (reference chapter 9 – Case Study 9.5 Attached) to present the user with a video poker hand (5 card).

  • Change the main screen graphic to something of your own design.
  • For the cards, each card can be any available from a standard deck of cards.
  • Once a card is used, it cannot be used again in that hand (example: you draw the Jack of Hearts; you cannot draw that same card again).
  • When all 5 cards are shown on screen, allow the user to discard and draw new cards once (up to all 5 cards at a time, but only allow them to change the cards once).
  • Inform the user of their result in a dialog box (example: 3 of a kind or 2 pairs, etc.). After the user clears the result, allow the user to draw a hand again or exit the program.
  • All programs should have basic menu options that allow the user to exit the program and perform tasks you deem necessary for the program to function correctly. After creating the program, be sure to debug and test your code.
  • Submit a screenshot of the executed program and the code of the program.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Artificial Intelligence 2

1.Read chapter 5 from the PDF file and do Games Homework 1.

2. Read chapter 6 from the PDF file and do exercises 6-1 and 6-5.

For reference watch the 2 video’s at:
Video 1: http://csis.pace.edu/~benjamin/teaching/cs627online/webfiles/ConstraintSat isfaction1.mp4
Video 2: http://csis.pace.edu/~benjamin/teaching/cs627online/webfiles/ConstraintSat isfaction2.mp4

3. Read chapters 7 and 8 from the PDF file and do Logic Homework 1.

For reference watch only the first two videos at,

4. Read chapter 13 and sections 14.1 and 14.2 from the PDF file and do exercises 13-8 and 14-4.

For reference watch the 3 video’s at:
Video 1: http://csis.pace.edu/~benjamin/teaching/cs627online/webfiles/Probability1. mp4
Video 2: http://csis.pace.edu/~benjamin/teaching/cs627online/webfiles/Probability2. mp4

Video 3:

http://csis.pace.edu/~benjamin/teaching/cs627online/webfiles/Probability3. mp4

5. Read sections 18.1 through 18.3 from the PDF file and do Learning Homework 1.

For reference watch these videos:
I. http://videolectures.net/bootcamp07_guyon_itml/

II. https://www.youtube.com/watch?v=pLzE2Oh9QDI

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Use The Polarbear-GBI Answer Sheet To Submit Your Answers. The Two Excel File Provide Are Called For As You Go Through The Exercise.

Exercises in Supply Chain Optimization and Simulation using anyLogistix

 

Prof. Dr. Dmitry Ivanov

Berlin School of Economics and Law

Professor of Supply Chain and Operations Management

Modified by Dr. Ed Lindoo, Campbellsville University, 2020.

 

To be cited as: Ivanov D. (2019). Exercises in Supply Chain Optimization and Simulation using anyLogistix, Berlin School of Economics and Law, 2nd, updated edition

© Prof. Dr. Dmitry Ivanov, 2019. All rights reserved.

1. Introduction

Supply chain network design and operational planning decisions can have a drastic impact on the profitability and success of a company. Whether to have one warehouse or two, close a factory or rent a new one, or to choose one network path over another are all consequential decisions a supply chain (SC) manager must make. However, these decisions must be the result of more than experience or intuition, and, as a result, research in SC management (SCM) is geared towards providing the data, tools, and models necessary for supporting SC managers’ analytical decisions. One of these decision-supporting tools is anyLogistix, a software which facilitates Greenfield Analysis, Network Optimization, and Simulation.

anyLogistix has become more and more popular with the provision of the free PLE version, and because it is an easy-to-use software, includes simulation and optimization, and covers all standard teaching topics (center-of-gravity, efficient vs responsive SC design, SC design through network optimization, inventory control simulation with safety stock computations, sourcing (single vs. multiple) and shipment (LTL vs FTL) policy simulation, and milk-run optimization).

The ALX exercise book addresses the application of quantitative analysis methods and software to decision-making in global supply chains and operations. Understanding of optimization and simulation methods in SCM is the core of the course. Technical skills for using simulation and optimization software in praxis can be acquired with the help of anyLogistix software. This case study is designed to stimulate and enhance conceptual and analytical decision-making skills in actual operating situations. The case method requires you to prepare a decision based on careful evaluation of case facts and numbers to the extent possible. As with all business situations, there may be insufficient facts, ambiguous goals, and dynamic environments.

This case seeks to convey the following skills:

Analytical Skills: Students will possess the analytical and critical thinking skills to evaluate issues faced in business and professional careers.

Technical Skills: Students will possess the necessary technological skills to analyze problems, develop solutions, and convey information using optimization and simulation software.

Along these lines, throughout the course we will examine two scenarios:

 Building a new SC from scratch -a case study of the Polarbear Bicycle company, which

must create and optimize its SC in order to maintain profitability and keep its competitive

edge in an increasingly global market where sales prices are driven down while costs re

main stable and seeks to analyze the performance of their existing SC and optimize its distribution network, while considering the risks and ripple effect.

Using the models available in anyLogistix, we will conduct analyses to (1) determine an optimal location using Greenfield Analysis (GFA) for a new warehouse, given the location of their current customers and those customers relative demands, (2) compare alternative network designs using Network Optimization (NO).

2. Case study

2.1 Description of Case Study

Customer Bicycle Type Demand per day
Cologne x-cross 2
Cologne urban 50
Cologne all terrain 15
Cologne tour 10
Bremen x-cross 7
Bremen urban 30
Bremen all terrain 20
Bremen tour 20
Frankfurt am Main x-cross 6
Frankfurt am Main urban 5
Frankfurt am Main all terrain 4
Frankfurt am Main tour 5
Stuttgart x-cross 15
Stuttgart urban 15
Stuttgart all terrain 1
Stuttgart tour 40
 

Costs

Value in USD
Factory Nuremberg: fixed (other) costs, per day 15,000
Factory Poland: fixed (other) costs, per day 5,000
DC Germany: fixed (other) costs, per day 15,000
DC Germany: carrying costs (per bicycle) 3.00
DC Czech Republic: fixed (other) costs, per day 5,000
DC Czech Republic: carrying costs 2.00
DC Germany: processing costs (inbound and outbound shipping per pcs) 2.00
DC Czech Republic: processing costs (inbound and outbound shipping per pcs) 1.00
Factory Nuremberg: production costs (per bicycle) 250
Factory Poland: production (per bicycle) 150
All bicycles: product purchasing costs 30
Transportation costs; Paths: from factory -to DCs 0.01 * product(pcs) * distance
Transportation costs; Paths: from DCs -to customers 0.01 * product(pcs) * distance
Unit revenue 499
Table 1  

We consider a company called Polarbear Bicycle. Polarbear Bicycle was founded as an e-commerce start-up selling bicycles, however they were just purchased by the company you work for as an analyst……Global Bikes (GBI). With this new purchase, the board of directors of GBI is asking a number of questions that you as an analyst for GBI need to answer. Polarbear’s portfolio includes four different types of bicycles: x-cross, urban, all terrain, and tour bicycles. You have been assigned the task to find the best location for one or two new distribution centers (DC). First, you estimate customer demand based on Table 1 above. Polarbear distributes their bicycles to four locations throughout Germany: Cologne, Bremen, Frankfurt am Main, and Stuttgart. Table 1 shows customer demand, which is equal to 245 bicycles per day.

GBI now needs you to analyze supply and distribution network alternatives and to develop a best-case scenario for Polarbear-GBI Bicycle. You are charged with conducting a GFA to determine the possible location of a new DC or DC’s in Germany, as well as a network optimization to compare several options for network paths.

2.2 Greenfield Analysis (GFA) for Facility Location Planning: Selecting the Best

Warehouse Location for Polarbear-GBI Bicycle

Now we conduct a GFA for the outbound network of Polarbear-GBI Bicycle considering the four customers located in Cologne, Bremen, Frankfurt am Main, and Stuttgart. The aim of this GFA is to determine the optimal location of one (or two) new DC’s in Germany subject to total minimum transportation costs. Note: for the purposes of this analysis we are not considering current GBI customers or DC’s within Europe. Polarbear-GBI makes and sells very unique bicycles that currently are not a good fit within the GBI network, therefore we consider a completely separate distribution network.

Creating an ALX model.

Step 1. Open Anylogistix. Click on New Scenario, click OK. Next click on import scenario then select the file you downloaded, PB GFA Level 2 with Solutions.xlsx. Change the scenario name to your name

Note: You may receive a warning about old data file. You should be able to say OK and just ignore it.

Performing experiments. Data from Table 1 has already been entered for Customers, Demand, and Products.

 

Step 2. Go to GFA Experiment and run it for “Number of sites = 1” and the period of two months.

Select custom periods and make sure the default dates 11/1/17 – 12/31/17 are set.

Step 3. Analyze the results using statistics “Flows” and “New Sites”:

Note: Use the Polarbear-GBI case study answer sheet to submit ALL of your answers.

 

1. What are the optimal coordinates of the DC?

2. What is the maximum distance from the optimal DC location to a customer?

3. What is the minimum distance from the optimal DC location to a customer?

4. What are the total costs of the SC? (Note: to compute the sum of costs or flows in GFA Results, just slightly drag the heading of the column “Period” in table “Product flows” in the space over the table.

5. Compare the data in statistics “Flows”and Table“Demand”. Do we satisfy all customer demands from the optimal DC location? If Yes, why? If no, why?

Step 4. Go to GFA Experiment and run it for “Number of sites = 2”.

Step 5. Analyze the results using statistics “Flows” and “New Sites”:

6. What are the total costs of the SC?

7. Compare the results with one and two DCs in terms of costs and responsiveness.

8. What other costs were not considered in selecting the optimal facility location in the GFA?

2.3 Network Optimization (NO) for Facility Location Planning: Comparing Po

larbear’s Supply Chain Design Alternatives

After selling the bicycles from the newly established DC(s) according to the GFA results, Polarbear-GBI decided to produce their own bicycles. Their production facility has now been established in Nuremberg and 250 bikes are produced each day. Recently, they have received an offer from a Polish production factory to rent a DC in the Czech Republic at a reasonable price. The same company also wants to offer them rental of a factory in Warsaw, Poland, even though they already have one factory in Germany. Polarbear-GBI must now decide which SC design is more profitable:

 Option 1: DC in Germany and Factory in Germany

 Option 2: DC in Germany and Factory in Poland

 Option 3: DC in Czech Republic and Factory in Poland

 Option 4: DC in Czech Republic and Factory in Germany

In Fig. 1, the different possibilities for the path networks are shown. The dotted lines show possible alternatives and the solid lines the existing structure of Polarbear’s SC.

Figure 1. Network optimization alternatives

The aim of the NO is to determine which network design is optimal based on Polarbear’s selected KPIs, e.g., profit.

Therefore, the factory in Warsaw, Poland, the DC in the Czech Republic, and the DC in Steimelhagen were added as inputs to the model along with the Nuremburg factory. To enable the model’s calculation, the reality of the case must be simplified: all demand is assumed to be deterministic without any uncertain fluctuations. To define the two-stage NO problem (transport between factories and DCs and between DCs and customers) from a mathematical perspective, several parameters must be input as data. These are shown in Table 2.

 

The costs of the rent for the factory in Poland and the DC in Czech Republic are included in “othercosts”. For transport, it is always assumed that each truckload fits 80 bicycles, and trucks travel at a speed of 80 km/h.

Creating an ALX model

Step 0. Probably best to close and re-open ALX at this point. Now create an new scenario as you did in Step 1 above and import the file PB NO Level 2 Solution.xlsx. Rename it so that it has your name or initials as the scenario name: Note: Data from Table 2 has been entered for you.

Note: You may receive a warning about old data file. You should be able to say OK and just ignore it.

Performing experiments Step 1. Go to NO Experiment and run it with the Demand variation type “95-100%”.

NOTE! In order to run the NO experiment, make sure the units in experiment settings is set from m3 to pcs to align it with product data.

Step 2. Analyze the results using statistics “Optimization Results”, “Flow Details”, “Production Flows”, “Demand”, and “Overall Stats”:

 

b. place a screen shot here clearly showing your new NO results with your name or initials in the scenario name.

 

 

9. What is the most profitable SC design?

10. Is demand for all customers satisfied? Why or Why not?

11. What is the total revenue of the most profitable SC?

12. What is total profit of the most profitable SC?

13. Compare the data in statistics “Production Flows” and Table “Demand”. Does the production quantity correspond to the total demand? Explain.

14. Compare the optimal SC design as computed in the NO and the initial SC design (factory and DC in Germany) in terms of profit.

15. What other costs should be considered when redesigning the SC according to NO results?

16. What other factors, apart from costs, should be considered when re-designing the SC according to the results of the NO?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Job Interview Presentation ( Fundamentals Of Networking)

Job Interview Presentation

Your Name:

The interview will focus on networking fundamentals and consist of 10 questions.

Networking

Devices

Protocols

United States Cyber Command uses state-of-the art technology. However, the fundamentals are as important as any innovative technology. Given that, what are the three basic local area network (LAN) topologies called?

The national mission teams operate on all types of networks. To defend a network, you must first understand the network design on which you are operating. Provide a brief description of each of the following network topologies:

Topology​ Description​
bus​ ​
star​ ​
ring​ ​
mesh​ ​
hybrid​ ​
Our employees must have a theoretical and applicable understanding of how networking works. Name each layer of the OSI model. Provide the layer number and name from top to bottom.

Layer​ OSI Layer Name​
​ ​
​ ​
​ ​
​ ​
​ ​
​ ​
​ ​
Briefly describe each function of the OSI model layer. Provide the layer name and the function in your response.

Layer​ Function​
​ ​
​ ​
​ ​
​ ​
​ ​
​ ​
​ ​
United States Cyber Command requires an internet service provider (ISP) to connect to the internet. What is the point at which the operational control of ownership changes from the ISP to United States Cyber Command?

Our teams operate and encounter all types of devices. Provide a brief description of each of the following common network devices:

Networking Device​ Description​
hub​ ​
router​ ​
NIC​ ​
switch​ ​
The national mission teams require implementation of common protocols. Provide the port that each of the following protocols use:

Protocol​ Port​
HTTP​ ​
SMTP​ ​
SNMP​ ​
DNS​ ​
HTTPS​ ​
DHCP​ ​
TELNET​ ​
Provide the IP range for each network class:

Note: The question is asking for the class range, not the private IP range for each class.

Class A:

Class C:

Class B:

Provide the default subnet mask to the class of network:

Class​ Format​ Default Subnet Mask​
A​ network.host.host.host​ ​
B​ network.network.host.host​ ​
C​ network.network.network.host​ ​
Describe the purpose of an autonomous system.

Thank You!

Upload your PowerPoint and video to the Assignments folder to receive a grade and feedback.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Principles Of Software Engineering – 2Pages

Principles of Software Engineering – 2Pages

Resources:

  • Section 3.4, “Principles of Software Engineering,” in Ch. 3, “Engineering of Software,” of Essentials of Software Engineering
  • The module “The Software Lifecycle” of the Pluralsight course “Software Process Management” by Gregory Knight
  • “SDLC Table” document
  • Grading criteria

The company you work for is a programming services contractor that consults with businesses in the United States requiring assistance in creating software in compliance with the Health Insurance Portability and Accountability Act (HIPAA). Your company advertises a proven track record in providing secure code that meets regulatory and compliance recommendations that include the protection of all Personally Identifiable Information (PII).

Your client is a small hospital and surgery center that requires a program that will calculate the bill for a patient’s hospital stay, including charges for the surgery, daily hospital fees, and pharmacy. The hospital only performs five types of surgeries, limits the patient stay to three days, and has a limited pharmacy offering of ten prescription drugs. The hospital employees who will use the program should be able to enter the patient information, including name, hospital ID number, diagnosis, surgery type, length of stay, and prescriptions. The program will then produce a final billing statement. The client would like the program completed in six months.

Using the file provided and referencing the scenario above, complete the 2- to 3-page System Development Life Cycle Table. The table is designed to help you see how to apply the SDLC to an actual program. Complete the second and third column for each row; optionally feel free to add additional artifacts to the fourth column. Be sure your responses directly address this case study.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Java Assigment

This program will work with file IO and exception handling by building a simple text-based interface for browsing the file system. When the program starts it should ask the user if they would like to dump results to a log file IN ADDITION to standard out. If so, your program should prompt for the name of the log file. If the file already exists, it’s contents should be overwritten. The program will then display (6) options to the user: (1) List the contents of a directory provided by the user (2) List the contents of a directory provided by the user as well as all of its sub directories. (hint: use recursion) (3) Locate a file with a given name. (4) Locate files with a given file extension (5) Concatenate the contents of 2 files whose names are provided by the user and output the result to a third file (name also provided by the user) (6) Exit In addition, provide additional (useful) options in addition to those listed above. For example, locating files based on regular expression matches in the file name or the file content. Be creative. Have fun. Design: Make sure to design the program so that the file system functionality is encapsulated in its own class or classes. Specifically, you should design so that it would be trivial to hook up these features to a GUI rather than the command line. (This means the main function should have almost no code in it, and that all command-line user interaction should be separate of file browsing implementation, etc.)

{"statusCode":404,"error":"Not Found","message":"The specified key does not exist."}
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Wireless Networking Quiz 2

1.         How long is a RIFS?

A.         2 microseconds

B.         10 microseconds

C.         16 microseconds

D.         9 microseconds

 

2.         What guard interval is used with 64-QAM by 802.11n HT devices to reach 600 Mbps data rates?

A.         800 ns

B.         200 ns

C.         100 ns

D.         400 ns

 

3.         When two RF signals on the same frequency arrive at a receiver at the exact same time and their peaks and valleys are in alignment, what is true about these signals? (choose all that apply)

A.         They are 180 degrees out of phase

B.         They are 90 degrees out of phase

C.         They have 0 degrees of separation

D.         They are in phase

 

4.         What is the cause of Free Space Path Loss?

A.         Beam Reflection

B.         Beam Absorption

C.         Beam Diffraction

D.         Beam Divergence

 

5.         Which of the following are units of power?

A.         dBi

B.         Watt

C.         Milliwatt

D.         dBd

E.         dBm

 

6.         A single milliwatt = 0 decibels of change.

A.         True

B.         False

 

7.         Which of the following increase amplitude?

A.         Lightning arrestors

B.         RF Cables

C.         Pig tail adaptors

D.         Antennae

E.         Amplifiers

 

8.         More than 40% blockage in the Fresnel Zone will not impede an RF link.

A.         True

B.         False

 

9.         Which of the following describes a behavior of waves?

A.         Frequency

B.         Phase

C.         Modulation

D.         Amplitude

 

10.        Phase is a standard measurement of RF wave size.

A.         True

B.         False

 

11.        In an ERP 802.11 network, there are two mandated spread spectrum technologies.

A.         True

B.         False

 

12.        ERP-OFDM stations can not connect with OFDM AP’s because the use different __________.

A.         Contention methods

B.         Modulation techniques

C.         Frequencies

D.         Coordination functions

 

13.        Which data rates are supported by PBCC?

A.         6, 12, and 24 Mbps

B.         36, 48 and 54 Mbps

C.         1, 2, 5.5 and 11 Mbps

D.         22 and 33 Mbps

E.         1, 2, 5.5, 11, 22, and 33 Mbps

 

14.        How many adjacent non-overlapping channels may be used in the same physical area using the 2.4 GHz spectrum?

A.         14

B.         11

C.         6

D.         3

 

15.        The area of coverage provided by an AP is called which of the following?

A.         BSS

B.         ESS

C.         BSA

D.         WLAN

 

16.        The function of an AP is most closely related to which wired networking device?

A.         A Switch

B.         A Hub

C.         A router

D.         A firewall

 

17.        What is the largest channel size possible with 802.11ac?

A.         40 MHz

B.         80 MHz

C.         120 MHz

D.         160 MHz

 

18.        What is required for stations to use 256-QAM?

A.         they must have a firmware upgrade

B.         there can be no more then 2 stations

C.         they must be very close to the AP

D.         they must be far from the AP

 

19.        The period of time that exist between wireless frames is called __________.

A.         Duration/ID field

B.         NAV Value

C.         Interframe Space

D.         Carrier Sense

 

20.        What are the two ways carrier sense is performed? (Choose two)

A.         Virtual Carrier Sense

B.         Physical Carrier Sense

C.         Logical Carrier Sense

D.         DCF Carrier Sense

E.         HCF Carrier Sense

 

21.        What are the two frames used in active scanning? (Choose two)

A.         Beacon Management Frame

B.         Probe Response Frame

C.         Clear to Send Frame

D.         Ready to Send Frame

E.         Probe Request Frame

 

22.        Which of the following devices are said to be parts of a Specialty WLAN Infrastructure (Choose all that apply)

A.         Autonomous AP’s

B.         Lightweight AP’s

C.         Wireless Workgroup Bridges

D.         PTMP Bridges

E.         WLAN Controllers

 

23.        Many Law Enforcement agencies use frequency managers.

A.         True

B.         False

 

24.        When designing wireless networks, two concepts often conflict.  What are they? (Choose two)

A.         Capacity

B.         Channel

C.         Antenna type

D.         Transmit Power

E.         Coverage

 

25.        The standard as amended defines which PoE device types?

A.         Legacy

B.         PSE

C.         PD

D.         Proprietary

 

26.        Which if the following is responsible for enrolling client devices?

A.         Mobile Device

B.         AP/WLAN Controller

C.         MDM Server

D.         Push notification server

 

27.        What are the three main components of the 802.1X/EAP Framework?

A.         Authentication, Authorization, Accounting

B.         Authentication Server, Authentication Client, Authentication Accountant

C.         Authenticator, Supplicant, Authentication Server

D.         Authentication Guest, Authentication member, Authentication Server

 

28.        A spectrum analyzer can be used to locate the source of which type of intentional attack?

A.         RF Jamming

B.         Overlapping adjacent channel interference

C.         Bit Flipping

D.         Duration field spoofing

 

29.        What is a primary concern when planning WLAN deployments within the government vertical market?

A.         Cost

B.         Channel Use

C.         Security

D.         Capacity

 

30.        A facilities escort may be required when conducting a site survey.

A.         True

 

B.         False

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!