Enjoy the best grades that will raise your GPA.

Category: Applied Sciences homework help (Page 1 of 20)

Topic: Fill in the blanks, back to the future Scholz’s article is a short histor

Topic: Fill in the blanks, back to the future
Scholz’s article is a short history of the social web. You will find many interesting facts, and names and links of many services that emerged on the web for digital communication. Various aspects of communication are listed under subtitles and relevant developments in the area are given. However, the article is, as you may have noticed, is from 2008, which is about a hundred years old in internet years. We need to bring this to the future.
Select one or more subtitles(fields) from the manuscript and write an e$$ay listing four or more milestone developments after 2008 in that area. Be sure to discuss each of the following, making sure all are relevant to the “social” aspect of the web:
What has changed since 2008?
What mega-services have launched?
What infrastructural changes experienced? 
Add one more 
Clearly indicate your four areas (plus additional ones if you discuss beyond four) with a header for each area
Discuss in each paragraph how it is a milestone event
Length: there are no minimum words required but each milestone event should be a minimum of a paragraph or more + works cited page
*See File for additional instruction* 

  Budget analysts provide financial analysis to legislators, evaluate how health

 
Budget analysts provide financial analysis to legislators, evaluate how healthy a program is, assess policy, and draft budget-related legislation.
Imagine you are a budget analyst for a state or local (municipal or county) criminal justice or security agency. Review the most recent budget for that agency. Provide an analysis for your agency director of revenue sources used to support agency operations and financial tools that will be helpful to the agency.
Identify the criminal justice or security agency you have chosen.
Search the state, county, or municipality website and find the most recent budget. Your chosen agency will be one of those listed in the respective budget. For example, if the chosen agency is the Cook County sheriff in Illinois, search online for “Cook County sheriff budget” or “Cook County budget.” Then search for “Cook County sheriff” in the master budget.
Not all local governments post their budgets online. If you cannot find the budget for your chosen criminal justice or security agency, ask your instructor for some assistance, or select your state budget.
Write a 525- to 700-word analysis in which you:
Identify and describe the fund sources or revenues (e.g., general fund revenue from shared sales taxes and property taxes).
Provide a table of the revenue amounts used in the last budget and describe any limitations of those revenue sources (e.g., drug prevention grant funds can only be spent on programs that reduce drug use).
Describe at least one strength and one weakness of each revenue source (e.g., a strength of general fund revenue is that it is a reliable source, and a weakness is that if there is a recession, less general fund revenue will be collected).
Identify any financial tools that may be helpful to the agency and discuss how they would be effective.

  Now, pick up from where you left off last week. Last week, you identified rapi

 
Now, pick up from where you left off last week. Last week, you identified rapid assessment instruments that could be utilized for screening/assessing a client that has the behavioral health issue that is related to your focus topic. You will now create a biopsychosocial (spiritual) assessment template that could be used for this special client population. Your submission will be in the form of a brochure. 
Pretend you have been asked to create this assessment for a program that specializes in working with this client population. When creating your assessment, ask yourself: What standard information should be in their biopsychosocial (spiritual) assessment? What unique or specialized information should also be included? How much information should be gathered to be thorough, yet not overwhelm the client at the first session? (Keep in mind that sessions/appointments are typically one hour.) Your brochure should include the assessment plus important information based on these questions that would assist others in completing the assessment, then interpreting the results.
You may choose to incorporate the spiritual component if you believe it is beneficial/necessary, or you may omit it. For this assignment, be sure to include the following:
The biopsychosocial (spiritual) assessment template.
A brief explanation of how to use this template and justification for why you asked for particular information or chose certain elements or questions in your template.
Support your assignment with at least three scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including seminal articles, may be included.
Total Length: 4-6 pages, not including title and reference pages

Part I: Review the “7 Steps to Solving a Problem” attachment below. Part II:

Part I:
Review the “7 Steps to Solving a Problem” attachment below.
Part II:
Read the story below: 
You are currently working at a small company of about 100 employees. Your company just lost a very large client and therefore they need to let go of five employees in your department.

The workload of the five employees has been divided up between you and a fellow employee. Your fellow employee is very upset about this because now they must take on more work and not get a pay raise. This employee wants you to join them and fight your boss together for more money. You don’t feel comfortable doing this because you love your job. You would like to make more money, but you do not want to upset anyone and lose your position. On top of this situation, there is a big project that needs to be completed in three days!
How would you solve the above problem?

Review the “7 Steps to Solving a Problem” attachment. Reflect on, and discuss, how the problem described above can be resolved using the steps.
Analyze and explain your application of each of the 7 steps in the “7 Steps to Solving a Problem” attachment to solving the problem described in the above story
Your submission should be a minimum of one page of content in length. Please type the question as well as your answer. Properly cite any source utilized in APA format.

   REPLY 1 Question A What are three common encryption ciphers used to protect n

  
REPLY 1
Question A
What are three common encryption ciphers used to protect network communications, and what are the capabilities that they offer?
Question B
How does public key cryptography provide protection for network data? What are the major elements that enable it to provide this capability?
REFLECT AND REPLY TO CLASSMATE DISCUSSION TO BOTH OF THE ABOVE QUESTIONS EXPLAINING WHY YOU AGREE (MINIMUM OF 125 WORDS)
                                                  CLASSMATE’S DISCUSSION
Question A
The three common encryption ciphers used to protect network communications are monoalphabetic, polyalphabetic, and transposition cipher. A monoalphabetic substitution-based cipher replaces a character or group of characters with a different character or group of characters, (White, 2016). This type of cipher is simple. However, there is a disadvantage of the frequency of the substituting. The polyalphabetic substitution-based cipher is similar to the mono alphabetic cipher, but it uses multiple alphabetic strings to encode the plaintext, rather than one alphabetic string, (White, 2016). This type of cipher is better because it prevents a frequency analysis or algorithms from decoding easily. A transposition-based cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved, (White, 2016). With the transposition cipher the character is moved but not changed.
Reference:
White, C. (2016). Data Communications and Computer Networks: A Business User’s Approach
(Independence, KY: Cengage Learnings ISBN: 9781305729902 8th ed.). 
Question B
Data encrypted with the public key can be decoded only with the public key, and data encrypted with the private key can be decoded only with the public key, (White, C. 2016). Public key cryptography provides protection to network data when one person or organization has either a key to code or decode. One end will have the public key that encrypts, and the other private key will decode the ciphertext.
Reply 2
Question A
What are three common encryption ciphers used to protect network communications, and what are the capabilities that they offer?
Question B
How does public key cryptography provide protection for network data? What are the major elements that enable it to provide this capability?
REFLECT AND REPLY TO CLASSMATE DISCUSSION TO BOTH OF THE ABOVE QUESTIONS EXPLAINING WHY YOU AGREE (MINIMUM OF 125 WORDS)
                                                   CLASSMATE’S DISCUSSION
Question A
Question A – Triple DES, AES ad RSA are the most common encryption ciphers.
Triple DES was a recommended encryption standard and at one point, used to be one of the most used symmetric algorithm in the industry. Triple DES uses three keys that are 56 bits each. Although total key length is supposed to be 168 bits, some argue they are 112 bits in strength. 
AES is the algorithm standard used by the US government and a good number of companies and organizations. AES comes in 128, 192, and 256 ciphers. AES is one of the most resilient encryption ciphers in the market today.
RSA is a public key encryption algorithm and the standard encryption for data sent over the internet. Those familiar with PGP will know that RSA is one of the encryption methods used in the program. This encryption algorithm is asymmetric, requiring a public key to encrypt the message and a private key to decrypt it.
Question B
Public cryptography works on the principle of using two keys, a public key and a private key to protect the data. The user of the technology receives a public/private key pair from a certified authority. When data is sent to other users, they have access to the public key from the sender, which has been used to encrypt the data. When the message arrives at its destination, the recipient can then use its private key to decrypt the message.
The major elements that support this system are the public/private key pairs, the certifying authority and the principle of public keys, which eliminates the need for users to exchange their private keys. 
Reference:
– Lord, N. (2018). A definition of public cryptography. Retrieved Jun 22, 2022 from  https://digitalguardian.com/blog/what-public-key-cryptography

   1. at least 2~3 pages of study report (cover page is not countable). 2. Requi

  
1. at least 2~3 pages of study report (cover page is not countable).
2. Required (if you cannot do the simulation, at least have article review, but please do not have any plagiarize issue)
(1) Use Microsoft Access, MySQL, SQLite, or any available one, no matter commercial/freeware/online to create database, tables, and configuration of the management system.
(2) demonstrate the creation, processes, and configuration info in your report by using screenshot or substitute method to display your process/result.
(3) please also have a short introduction of the used tool and a short concluding in your report.
free tool reference website: https://www.w3resource.com/index.php
If you use Mac, you may install some freeware from https://business.tutsplus.com/articles/best-free-open-source-mac-database-software-2018–cms-31480.
If you can not get any available software for installing and have simulation, you can have some related article review for substitution. It is acceptable, too.

  First, read the following poems: “Introduction to Poetry” by Billy Collins (

 
First, read the following poems: “Introduction to Poetry” by Billy Collins (767), “This Be the Verse” by Phillip Larkin (849), “Ballad of the Landlord” by Langston Hughes (779), and “Daystar” by Rita Dove (796).
Choose one of the poems and answer the following questions in your initial post:

What is your initial reaction to the poem?
How would you describe the tone of the poem, and how is the tone established for you – through word choices and structure (diction and syntax), rhythm or rhyme, the sounds of the words, figurative language or symbols? Give three specific details from the poem to demonstrate your point.
What, ultimately, do you take away from the poem – either in terms of its content or in terms of how it achieves its content (that is, its artistry or craft)?  

« Older posts

© 2022 assignmetshive

Theme by Anders NorenUp ↑