Contingency planning

I don’t know how to handle this Computer Science question and need guidance.

1. Assume that you have been hired by a small veterinary practice to help them prepare a contingency planning document. The practice has a small LAN with four computers and Internet access. Prepare a list of threat categories and the associated business impact for each. Identify preventive measures for each type of threat category. Include at least one major disaster in the plan. (Requirement: 200-to-300 words).

2. Provide cons and pros ( 100-to-150 words ).

* All posts must contain a properly formatted in-text citation and scholarly reference.

Reference:

Wallace, M., & Webber, L. (2018). The disaster recovery handbook: a step-by-step plan to ensure business

continuity and protect vital operations, facilities, and assets. New York, NY: AMACOM.

ISBN-13: 978-0814438763

Read more

Assignment – Business Intelligence

I don’t understand this Computer Science question and need help to study.

Paper Section 1: Reflection and Literature Review

Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 3 and 4. This section of the paper should be a minimum of two pages.

Paper Section 2: Applied Learning Exercises

In this section of the professional paper, apply what you have learned from chapters 3 and 4 to descriptively address and answer the problems below. Important Note: Dot not type the actual written problems within the paper itself.

  1. Research some data warehouse vendors and obtain information about their products. Give special attention to vendors that provide tools for multiple purposes, such as Cognos, Software A&G, SAS Institute, and Oracle. Free online demos are available from some of these vendors. Download a demo or two and try them and describe your learning experience and review of this products.
  2. Download an information visualization tool, such as Tableau, QlikView, or Spotfire. If your school does not have an educational agreement with these companies, then a trial version would be sufficient for this exercise. Use your own data (if you have any) or use one of the data sets that comes with the tool (they usually have one or more data sets for demonstration purposes). Study the data, come up with a couple of business problems, and use data and visualization to analyze, visualize, and potentially solve those problems.
  3. Important Note: With limited time for a college class, perfection is not expected but effort to be exposed to various tools with attempts to learn about them is critical when considering a career in information technology associated disciplines.

Important Note: There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.

Paper Section 3: Conclusions

After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward. This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.

Paper Section 4: APA Reference Page

The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.

Paper Review and Preparation to submit for Grading

Please make sure to proof read your post prior to submission. This professional paper should be well written and free of grammatical or typographical errors. Also remember not to plagiarize!!!!!!!!!!!

Read more

an essay about cybersecurity

Can you help me understand this Computer Science question?

The essay should be around 1000 words with answers of following 6 questions

a.Knowledge of the techniques of the cybersecurity discipline, including encryption, access control, physical
security, training, threat analysis, and authentication.
b. Knowledge of the human factors in cybersecurity, including human computer interaction, design, training,
sabotage, human error prevention and identification, personal use policies, and monitoring.
c.Ability to identify and analyze problems, distinguish between relevant and irrelevant information to make
logical decisions, and provide solutions to individual and organizational problems.
d. Ability to consider and respond appropriately to the needs, feelings, and capabilities of different people in
different situations; is tactful, compassionate and sensitive, and treats others with respect.
e.Ability to make clear and convincing oral presentations to individuals or groups; listens effectively and
clarifies information as needed; facilitates an open exchange of ideas and fosters an atmosphere of open
communication.
f.Ability to express facts and ideas in writing in clear, convincing and organized manners appropriate to the
audience and occasion.

Read more

UDL/CAST Instructional Plan Analysis

I don’t understand this Writing question and need help to study.

Use the template in the attachment for this assignment

This assignment provides the opportunity for you to apply the principles of universal design for learning (UDL) in the design of instruction and assessment. Recall that UDL provides access to the curriculum for students with a wide variety of abilities and background. Therefore, UDL aligns with inclusionary practices found in today’s schools. Furthermore, assistive technology supports the UDL framework to provide a means of learning for students with disabilities. To prepare for this assignment, review the CAST (2010) video,
UDL at a Glance (Links to an external site.)and review the
Explore model UDL lesson plans (Links to an external site.) (2011) web page, both of which are listed in the Week Three Required Resources. Be sure to also review the Week Three Instructor Guidance page for additional intellectual elaboration on UDL and assistance with this assignment.Begin preparing for this assignment by selecting a specific model lesson from the Explore Model UDL Lesson Plans (2011) page of the CAST.org website. Analyze the lesson for the points described in the Content Instructions included with this assignment, below. Click on the “UDL Connections” buttons located at various points in the lesson to analyze how UDL principles have been integrated. Next, create your assignment to meet the content and written communication instructions below.

Content Instructions

  • Lesson Description (1 point): Include the title of the model lesson, the subject, and grade levels, and a one-paragraph introduction of the lesson.
  • Principle 1 (1 point): In one to three paragraphs, describe ways that multiple means of representation are included in the model lesson.
  • Principle 2 (1 point): In one-to-three paragraphs, describe ways that multiple means of action and expression are included in the model lesson.
  • Principle 3 (1 point): In one to three paragraphs, describe ways that multiple means of engagement are included in the model lesson.
  • Reflection (2 points): Close your essay with a personal reflection that addresses the following four areas:
    • A description of at least two concepts or strategies from the lesson that serve as a means to motivate learners
    • A description of how, overall, the lesson models differentiated instruction
    • A discussion of how your understanding of and appreciation for instructional planning has changed as a result of your analysis,
    • At least one specific concept or strategy from the lesson that you would consider applying to your own practice and the potential impact it may have on the population you serve.

Written Communication Instructions

  • Length Requirement (0.5 point): five to seven pages including the title and references pages.
  • Syntax and Mechanics (0.5 point): Display meticulous comprehension and organization of syntax and mechanics, such as spelling and grammar.
  • Source Requirement (0.5 point): Utilize at least two sources in addition the model lesson plan and the Edyburn (2013) textbook. All sources on the references page need to be used and cited correctly within the body of the assignment.
Read more

Have to write APA style essay 500 words or more details below

I don’t understand this Computer Science question and need help to study.

Effective research is critical for success in the Cybersecurity field.

  1. Perform a data search of yourself or a family member. Use the PeekYou website located within the required readings or a similar free site.
  2. Become familiar with the current Cyber Security vocabulary utilized by Federal Agencies such as the NSA, CISA, NIST, NCSD, etc.

In 500?7500 words, describe:

  1. The findings of your personal data search.
  2. The common security threats that affect your digital footprint.
  3. The following terms: cyber threats, risk analysis, cyber-attack/breach, threat mitigation, and disaster recovery. Provide a brief definition.
  4. The legal or ethical issues concerning “Cyber Stalking.”
  5. How an attacker can use this information in an attack.
  6. How to use the “defense against attacks” theory to protect your digital identity.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.

Read more

project description

I’m studying for my Computer Science class and don’t understand how to answer this. Can you help me study?

WHAT IS A PROBLEM DESCRIPTION?

The problem description defines the issue you are trying to address with your project.

  • gives the overall description of the client’s business context
  • identifies the assets that need to be protected

It should clear and sufficiently precise:

attachment is an example

due by January 17th, 2020 8pm est

________________________________________________________________________________________________

Details of the project that involves securing TVs:

Our firm is named Newfound and the company that we are working with is a retail store named Texto. Texto has hired us to find and secure bug, that has allowed hackers to remotely shutdown or display unwanted things, other than what the store wants to display on televisions used for surveillance cameras

We have to find the vulnerabilities of the software ( Which has to be found ) that manages the TVs.

I really need all of you to start researching this software connecting to multimedia devices and send me your notes ( max 1 page ).

Read more

HIST-170 Wrtiting problem

I’m studying for my History class and need an explanation.

Analyze this excerpt of a Civil Rights speech in one-two paragraphs, remembering to describe the document, explain its significance, and expand its context to explain how it relates to course themes.

Extract from Rep. John Lewis’s speech on 50th anniversary of the March on Washington

Rep. John Lewis (D-Ga.), who spoke at the March on Washington in 1963, delivered the following remarks at the “Let Freedom Ring” ceremony to commemorate the event’s 50th anniversary on Aug. 28, 2013, at the Lincoln Memorial.

“Fifty years later we can ride anywhere we want to ride, we can stay where we want to stay. Those signs that said “white” and “colored” are gone. And you won’t see them anymore — except in a museum, in a book, on a video.

But there are still invisible signs buried in the hearts in humankind that form a gulf between us. Too many of us still believe our differences define us instead of the divine spark that runs through all of human creation.

The scars and stains of racism still remain deeply embedded in American society, whether it is stop and frisk in New York or injustice in Trayvon Martin case in Florida, the mass incarceration of millions of Americans, immigrants hiding in fear in the shadow of our society, unemployment, homelessness, poverty, hunger or the renewed struggle for voting rights.

So I say to each of us today, we must never, ever give up. We must, ever give in. We must keep the faith and keep our eyes on the prize.

We did go to jail, but we got the Civil Rights Act. We got the Voting Rights Act. We got the Fair Housing Act. But we must continue to push. We must continue to work, as the late A. Philip Randolph said to organizers for the march in 1963.”

Read more

Policy Analysis—Section 1: Social Welfare Issue/Policy Selection

I’m trying to study for my Writing course and I need some help to understand this question.

During this course, you will conduct a policy analysis related to social welfare. The policy analysis will have five sections. You will create your project incrementally throughout the course in Workshops Two through Seven. Each week, you will complete one section of the analysis and submit a piece of the whole so you can receive feedback from your instructor and improve your work before your final submission in Workshop Seven.

As a social worker, you will be expected to demonstrate character, leadership, and scholarship in the arena of policy and its use in clinical practice.

  • Character is the product of constant action, striving daily to make the right choices. Through your work of advocacy toward policy reform, you are demonstrating such qualities as responsibility, fairness, and caring, and proving by example that you value character.
  • Scholarship means a commitment to learning. Applying diligence and effort toward learning about policy and advocacy as a social worker can impact your practice positively as a professional.
  • Leadership at your agency means having a positive influence on your colleagues. In taking the initiative to learn about and advocate for policy reform, you can encourage others to attain the same objective, thus positively affecting your clients and your work toward social justice.

In this assignment, you will identify a social welfare issue of interest and locate a specific current policy related to the issue.

Upon successful completion of this assignment, you will be able to:

  • Identify social policies at the local, state, and federal levels that impact well-being, service delivery, and access to social services. (PO 5)
  • Assess how social welfare and economic policies impact the delivery of and access to social services. (PO 5)
  • Analyze policies with regard to the advancement of human rights and social, economic, and environmental justice. (PO 5, ILO 5)
  • Demonstrate character, scholarship, and leadership in becoming a world changer through application to personal life and professional social work practice.
  • Demonstrate Christ-like attitudes, values, worldviews, and ethical and professional behavior within advanced clinical practice. (ILO 1)

Resources

  • Textbook: Social Welfare Policy: Responding to a Changing World
  • File: Final Project.pdf (in Shared Documents)
  • Website: GovTrack: Social Welfare
  • File: APA 6e Guide.pdf
  • File: APA Template for Assignments.docx
  • Academic Writer (in IWU Resources)

Background Information

In this assignment, you will write:

  • Policy Analysis—Section 1: Social Welfare Issue/Policy Selection

It is important to understand the scope of the problem you are going to be researching and analyzing. Homelessness is major issue in our society. It is also a very broad subject. Many causes and many populations are impacted. By deciding on a narrow, specific social problem to analyze, you make it more feasible to influence or develop policy. For example, instead of researching homelessness in general, think about what gender, age, and geographic area you could focus on. For instance, you may be interested in the homelessness rate of young male adults aging out of foster care in San Diego, CA. This could lead you to look at that particular region and its rate of homelessness for this group. You then could explore what support services are available for youth exiting the foster care system and what specific local or national policy is in place related to this issue on which you could focus your research.


Instructions

  1. Review the rubric to make sure you understand the criteria for earning your grade.
  2. In your textbook Social Welfare Policy: Responding to a Changing World, read Chapter 6, “Policy Analysis: Tools for Building Evidence-Based Social Policy,” pages 114–120.
  3. Read the Final Project file to see the “big picture” for your project in this course and descriptions of the sections that you will be writing.
  4. Review IWU’s APA 6e Guide on how to cite sources properly.
  5. In a two-page APA-formatted document, write Section 1 of your Policy Analysis, clearly labeling each part. Use the APA Template for Assignments.docx to complete your assignment.
    1. Part 1: Identify a social welfare issue of interest, using the guidelines above to narrow your search.
      1. Why did you choose this issue? If you feel comfortable responding, what personal stories can you share about it?
      2. Research facts and statistics about the issue—what do we know about it?
      3. What are current perceptions of the issue?
    2. Part 2: Research various social welfare policies associated with the issue.
      1. Browse bills in the U.S. Congress at the GovTrack: Social Welfare website. You can narrow your focus by drilling down into five subcategories (disability assistance, national and community service, poverty and welfare assistance, social security and elderly assistance, and social work/volunteer service/charitable organizations).
      2. What past and current policies address the issue? (An option is to create a timeline to show that policies are incremental.)
    3. Part 3: Identify a specific current social welfare policy associated with the issue that you will research throughout the course. Explain how knowing more about this specific social welfare policy relates directly to the NASW Code of Ethics.
  6. Before finalizing your work, ensure that you:
    1. Read the assignment instructions carefully.
    2. Use the spelling and grammar check.
    3. Review APA formatting and citation.
    4. Use APA format for organization, style, and source credits, including:
      1. 12-point, double-spaced Times New Roman font
      2. One-inch margins on all sides
      3. Normal character spacing
      4. In-text citations
      5. Title page and reference page
      6. Properly formatted headings (Part 1, Part 2, Part 3)
Read more

Consulting email for Human Resource Management

I need support with this Writing question so I can learn better.

Consulting Email on Training and Development

Assume you are external consultant working with a company during a merger. You’ve noticed the lack of formal training and development in both organizations. In at least 3 full pages, create an email to both Vice Presidents of Human Resources addressing the following topics, in order, using the prescribed section headers in bold.

  • Section 1- Training and Development Leader Skills. In this section, identify and define the skills needed for an effective training and development manager or leader.
  • Section 2- Aligning Training and Development with Organizational Goals. In this section, describe how a human resources or training and development professional can align training and development to the needs of the organization.
  • Section 3- Characteristics of Successful Training and Development Programs. In this section, describe the qualities of successful training and development programs.
  • Section 4- Measuring the Impact of Training and Development Programs. In this section, identify and provide examples of different methods to measure the success or impact of training and development programs in organizations.
  • Section 5- References. In this section, provide the full citations for 2 credible sources according to the CSU-Global Guide to Writing & APA (Links to an external site.). You also incorporated these 2 references internally appropriately.

Additional requirements:

  • This assignment is not a traditional APA-styled paper. Therefore, an introduction and conclusion are not required for this assignment.
  • Use one-inch margins, size 12 font, double-spaced line spacing, and page numbers.
  • A minimum of two scholarly/peer-reviewed references must be included. Do not use blogs, Wikis, or anonymous sources. Visit the CSU-Global Online Research and Writing Lab (Links to an external site.) to learn more about appropriate references.
  • Use Microsoft Word format to submit your document.
Read more

Diversity Techniques

I’m studying for my Sociology class and don’t understand how to answer this. Can you help me study?

In the course text, Fifty Strategies for Communicating and Working with Diverse Families, the end of each chapter includes a section titled “What Teachers Can Do.” The journal activities throughout this course will allow you to reflect upon and note strategies for family-centered care and education.

From this week’s reading (Section 3), identify at least two techniques you can use to honor and work with diversity in the childcare or academic setting. Describe how you will use each technique in the child-care or classroom setting. Lastly, identify how you feel the technique helps to develop an understanding and appreciation for cultural differences.

WHAT TEACHERS CAN DO • The first step in working toward consensus around an area of conflict is to suspend judgment and try to understand the other person’s perspective. Barbara Rogoff (2003) writes: “We must separate understanding of patterns from judgments of their value. If judgments of value are necessary, as they often are, they will thereby be much better informed if they are suspended long enough to gain some understanding of the patterns involved in one’s own familiar ways as well as in the sometimes surprising ways of other communities” (p. 14). (See Strategies 15 and 17 about patterns.) • To suspend judgment, take the advice of Rumi, a 13th century poet from what is now Afganistan, who wrote: “Out beyond ideas of wrongdoing and rightdoing there lies a field. I will meet you there.” If you go out to that field with a parent to talk about your views, you may be able to see a reality that is bigger than both of you. • Appreciate the energy of paired truths, and remember that according to Parker Palmer (1997), only adhering to one of them is like breathing in without breathing out. Instead of trying to solve the problem right away, go out to Rumi’s field, which changes the arena in which you can have a dialogue and gives you a chance to engage in holistic thinking. • Seek an optimal response to the situation, and at the same time, increase the depth and strength of the relationship. This approach makes it easier to figure out what to do about your differences in this situation with this child and family in this classroom or program. In his foreword to Crucial Conversations, Steven Covey (2012) uses the term synergy to label third space. He says it is imperative that we nourish our relationships and develop tools, skills, and enhanced capacity to find new and better solutions to our problems. These newer, better solutions will not represent “my way” or “your way”—they will represent “our way.” • Recognize that to reach a third-space or synergistic solution you need to: • Believe it possible • Accept that there are multiple realities and paired truths • Change from arguing and persuading to dialoguing • Practice dialoguing instead of arguing, because according to Steven Covey genuine dialogue “transforms people and relationships … and creates an entirely new level of bonding producing what Buddhism calls ‘the middle way’—not a compromise between two opposites on a straight-line continuum, but a higher middle way, like the apex of a triangle” (p. xii). • Recognize that, though finding a solution to the conflict is the ultimate goal, you may not reach that point, in which case you have to practice conflict management because you can’t reach conflict resolution. Perhaps the best you can do is agree to disagree. Once, in a workshop, the issue of differences in ideas about toilet training came up. I said, “You don’t have to do what the parent wants. It’s hard in a center, and I’m just telling you to be respectful of the difference.” As I finished the sentence, a hand shot up from the audience. A participant was obviously very eager to speak. She stood up and said, “Here’s what happened to me. A mother brought her one-year-old daughter to the center for the first time, and she told me that she was already toilet trained. I didn’t believe her, but instead of responding negatively, I asked her to show me what she did. She showed me and it worked! The baby was trained and didn’t need to wear diapers. It didn’t take any more time and energy than changing diapers would have.” What surprised me about this story was that the participant, though willing to try something new, really didn’t have faith that it would work. She was wrong. It did work. This story illustrates a win-win solution. The caregiver kept on with what she believed in for the other children, but was also able to satisfy the mother. In other words, the caregiver expanded her ideas about what was possible and didn’t give up anything.

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information