Packet Analyzers – This is a discussion needed with APA Citations and it has to be in 400 words.Attach a screen shot showing and discussing an analyzer’s use.

Need help with my Computer Science question – I’m studying for my class.

This week you will examine WireShark, a well-used network-packet analyzer. For this discussion:

  • Define a packet analyzer and describe its use
  • List commonly used packet analyzers (beyond WireShark)
  • List best practices for analyzing packets
  • Describe uses (good and bad, ie. hacker) of a packetanalyzer.
  • Discuss ways you would protect your own network data from being analyzed

Ideally, attach a screen shot showing and discussing an analyzer’s use.

Read more

PJM380 (MOD5 Critical Thinking 10-15 Slide Presentation)

I’m working on a Management exercise and need support.

Required

Recommended

Option #1: Agile Project Management – Justification

Create an instructional primer as a guide to adopting Agile PM as the sanctioned practice for project management in your organization (or an organization of your choice). Using a screencasting tool such as Screencast-O-Matic (Links to an external site.), Knovio (Links to an external site.), or Loom (Links to an external site.), combine the computer display with a webcam video.

Prepare a presentation containing 10-15 slides and include:

  • A description of the Agile PM
  • Rationale for adoption by your organization or the organization of your choice (organization benefits and competitive advantage)
  • Organizational consideration success
  • Strategy for successful deployment
  • Required information technologies.

Be sure to organize your presentation file properly and include the following:

  • Cover page
  • Introduction
  • Body of your work with proper headings and subheadings matching the bullet items listed above
  • Conclusion
  • List of references.

Support your assignment with a minimum of three scholarly references. The CSU-Global library is a good place to locate these sources. The written section should follow the CSU-Global Guide to Writing and APA (Links to an external site.).

Option #2: Agile Project Management – Methodology

Create an instructional primer as a guide to adopting Agile PM as the sanctioned practice for project management in your organization (or an organization of your choice). Using a screencasting tool such as Screencast-O-Matic (Links to an external site.), Knovio (Links to an external site.), or Loom (Links to an external site.), combine the computer display with a webcam video.

Prepare a presentation containing 10-15 slides and include:

  • A description of the Agile PM
  • Rationale for adoption by your organization or the organization of your choice (organization benefits and competitive advantage)
  • A detailed description of how the scrum methodology can be adopted in the organization and the tools and techniques needed to be used
  • Example projects and applicable sprints.

Be sure to organize your presentation file properly and include the following:

  • Cover page
  • Introduction
  • Body of your work with proper headings and subheadings matching the bullet items listed above
  • Conclusion
  • List of references.

Support your assignment with a minimum of three scholarly references. The CSU-Global library is a good place to locate these sources. The written section should follow the CSU-Global Guide to Writing and APA (Links to an external site.).

Read more

Small Group Discussion: Presenting Policy Proposals Response

I don’t know how to handle this Social Science question and need guidance.

Directions:

Respond to your colleagues’ responses within the small group discussion. Offer alternative strategies for presenting policy proposals to two colleagues separately

Be sure to support your post with specific references to this week’s resources. If you are using additional articles, be sure to provide full APA-formatted citations for your references.

Resource:

Jansson, B. S. (2018). Becoming an effective policy advocate: From policy practice to social justice (8th ed.). Pacific Grove, CA: Brooks/Cole Cengage Learning Series.

  • Chapter 9, “Presenting and Defending Policy Proposals in Step 5 and Step 6 of Policy Analysis” (pp. 284-326)

.

Read more

Senior Leadership Practicum

I need an explanation for this Nursing question to help me study.

NSG/498: Senior Leadership Practicum

Wk 1 – Define the Problem

Assignment Content

#1

This week’s assignment is to identify the focus of your project and anticipate the ethical, legal, and regulatory concerns that can or will arise. You may want to consider the work you did in the research course (PICO question) and/or the leadership course (topic and literature review) to guide your thinking on this assignment.

Define the problem.

-Identify the patient-centered problem/issue/topic and the setting it will impact.

-Broadly outline your proposal to address the problem/issue/topic.

-Summarize ethical, legal, and regulatory concerns.

-Explain why you chose the topic.

-Format your assignment as one of the following:

18- to 20-slide presentation

or

875-word paper

#2

Respond to the following in a minimum of 175 words:

What ethical, legal, and regulatory considerations do you face or expect to face in practice? Be sure not to post any identifying information.

Please cite 1 source in APA format

Read more

PJM380 (MOD5 Discussion Post 250 words APA cited reference)

Need help with my Management question – I’m studying for my class.

Please respond to the below discussion post in at least 250 words and APA cited reference.

Required

Recommended

References

Hill, G. M. (2013). The complete project management office handbook. Boca Raton, FL: CRC Press.

Martinelli, R. J., & Milosevich, D. Z. (2016). Project management toolbox: Tools and techniques for the practicing project manager (2nd ed.). Hoboken, NJ: John Wiley and Sons.

Project Management Institute (2016a). Benefits realization management framework. Retrieved from https://www.pmi.org/-/media/pmi/documents/public/p…

Project Management Institute (2016b). Connecting business strategy and project management. Retrieved from https://www.pmi.org/learning/thought-leadership/se…

POST:

Recent advancements in project management have emerged, transcending the traditional model for project development.

Compare and contrast the advantages and disadvantages of the waterfall planning model with the Agile PM approach. How are the duties of the Scrum Master similar to or different from a project manager?

Reference at least one credible source among the required or recommended readings and an outside, credible reference (a reference other than the textbook or readings), cited according to proper CSU-Global Guide to Writing and APA (Links to an external site.) standards.

Read more

2 page critical response

I’m stuck on a Writing question and need an explanation.

Read Instructions here, Follow Rubric

Critical Response #1 MLA Format

In Daniel Defoe’s Robinson Crusoe, why does Robinson Crusoe spend almost no time trying to actually get off of the island until about 24 years into his residency on that island?

Please write a critical response based on this question. Your paper should be 2-3 pages long (meaning at least 2 full pages), double-spaced, with 1” margins using Times New Roman 12 point font, and it should conform to the Critical Response Papers Rubric handed out in class and also available on Blackboard. You must also use at least 4 direct quotations from the novel to support the claims that you make in your paper, cited with parenthetical references in correct MLA format “like this” (Defoe 17).

Read more

Complete assignment, “Evaluate Your Note-Taking Skills” worksheet.

I’m studying and need help with a English question to help me learn.

The following exercise will help you to practice the process of beginning successful new habits.Choose one of these simple 10 day projects:

  • Monitor how many minutes you study each day.
  • Monitor how many minutes you exercise each day.
  • Make a goal of eating breakfast.Write down what you eat for breakfast each day.
  • Keep a list of the fruits and vegetables you eat each day.
  • Count how many sodas you drink each day.
  • Keep a log of time you sleep each night and make a note of how rested you feel the next day.
  • Make a goal of making your bed or picking up your clothes.Record your progress each day.
  • You can choose another behavior as long as it is realistic and achievable.You must be able to count it or describe the outcome.
Read more

HI135-1: Discuss legal terminology and the role and responsibilities of the health information management professional within the health care delivery system.

I don’t know how to handle this Health & Medical question and need guidance.

Instructions:

Career and Student Center. (2018). AHIMA. Retrieved from www.ahima.org/careers.

Use the “Career Map” located on the right side of this page (under “Quick Links”) and research three (3) positions of interest to you. Complete the following steps for each of the three (3) positions in an APA formatted summary.

  1. Review the full job description provided for each position.
  2. After review, for each of the three (3) positions answer the following questions thoroughly:
    • Is the position level a mid level, advanced level, or master’s level position?
    • List the category of professional practice the position maps to.
    • What other HIM professionals are directly linked to the positions you’ve selected for review?
    • What education and training is required for each position you’ve selected for review?
    • What elements of the professions are most interesting to you as you begin this course?
    • What would you like to learn more about throughout the next 10 weeks?

Requirements:

  • Your paper should be no more than 1-2 pages.
  • Follow the requirements of Standard English.
  • Formatted in current APA guidelines
  • Include a reference page as appropriate.
Read more

Security Audits

I’m studying for my Computer Science class and need an explanation.

COMPETENCIES


427.3.3 : Security Audits

The student evaluates the practice of defining and implementing a security audit and conducts an information security audit using industry best practices.

INTRODUCTION


An Information Security Management System (ISMS) represents a systematic approach for designing, implementing, maintaining, and auditing an organization’s information system security objectives. As with any process, if an ISMS is not continually monitored, its effectiveness will tend to deteriorate.

SCENARIO


For this task, you will use the attached “Task 2 Healthy Body Wellness Center Risk Assessment” case study to write a paper defining the scope of an ISMS plan for the Healthy Body Wellness Center and an evaluation of the previously conducted risk assessment.

The first step in initiating an ISMS is to form a committee of upper-level management to create organizational support for the ISMS. Assume you are part of that team. Initiating an ISMS involves developing a plan that includes the scope of the ISMS and identifying and assessing risk. The risk assessment for the Health Body Wellness Center has already been conducted. Your task is to define the ISMS scope for the Healthy Body Wellness Center and make recommendations for implementing the resulting ISMS plan.

REQUIREMENTS


Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

A. Create the scope for the ISMS plan being developed in the case study by doing the following:
1. Describe the business objectives being developed in the case study for the organization.
2. Describe the guiding security principles based on the case study.
3. Justify the processes that should be included in the scope. Include the following points for each process:

• what the process is

• how you would apply the process to the scenario

• why the process is needed or should be included in the scope of the ISMS

4. Justify the information systems that should be included in the scope. Include the following points for each information system:

• what the information system that should be included is

• what the duties of the information system are, according to the scenario

• why this information system is needed should be included in the scope of the ISMS plan

5. Justify the IT infrastructure that should be included in the scope, including a description of the data flow.

B. Recommend additional steps to address all of the identified risks in the case study that the organization would need to take to implement the ISMS plan.
1. Discuss what each recommended step entails based on your evaluation of the conducted risk assessment.
2. Justify each recommended step based on your evaluation of the conducted risk assessment.

C. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

D. Demonstrate professional communication in the content and presentation of your submission.

File Restrictions

File name may contain only letters, numbers, spaces, and these symbols: ! – _ . * ‘ ( )
File size limit: 200 MB
File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z

RUBRIC



A1
:
BUSINESS OBJECTIVES

NOT EVIDENT

Information about business objectives is not provided, or the information about the business objectives is not taken from the case study for the organization.

APPROACHING COMPETENCE

The information about the business objectives being developed is based on the case study, but the information is inaccurate or incomplete.

COMPETENT

The information about the business objectives being developed is clearly and logically based on the case study for the organization, and the information is accurate and complete.

A2:GUIDING SECURITY PRINCIPLES

NOT EVIDENT

A description of the guiding security principles is not provided, or the described guiding security principles are not relevant to the case study.

APPROACHING COMPETENCE

The described guiding security principles are not clearly relevant to the case study or are incomplete.

COMPETENT

The described guiding security principles are relevant to the case study and are complete.

A3:PROCESSES

NOT EVIDENT

A justification is not provided, or the submission does not include a justification for the processes that should be included in the scope. The justification for each process does not include the given points.

APPROACHING COMPETENCE

The justification demonstrates a limited understanding of the processes that should be included in the scope but does not clearly justify why the processes should be included. The submission does not appropriately include the given points for each process.

COMPETENT

The justification demonstrates a clear understanding of the processes and why they should be included in the scope. The submission appropriately includes the given points for each process.

A4:INFORMATION SYSTEMS

NOT EVIDENT

A justification is not provided, or the submission does not include a justification for the information systems that should be included in the scope. The justification for each information system does not include the given points.

APPROACHING COMPETENCE

The justification demonstrates a limited understanding of the information systems that should be included in the scope but does not clearly justify why the information systems should be included. The submission does not accurately include the given points for each information system.

COMPETENT

The justification demonstrates a clear understanding of the information systems and why they should be included in the scope. The submission accurately includes the given points for each information system.

A5:IT INFRASTRUCTURE

NOT EVIDENT

A justification is not provided, or the submission does not include a justification for the IT infrastructure that should be included in the scope. The submission does not include a description of the data flow.

APPROACHING COMPETENCE

The justification demonstrates a limited understanding of the IT infrastructure that should be included in the scope but does not clearly justify why the IT infrastructure should be included. The description of the data flow is inaccurate or incomplete.

COMPETENT

The justification demonstrates a clear understanding of the IT infrastructure and why it should be included in the scope. The description of the data flow is accurate and complete.

B:ADDITIONAL STEPS

NOT EVIDENT

A recommendation is not provided, or the recommendation does not include additional steps to address the identified risks in the case study that the organization would need to take to implement the ISMS plan.

APPROACHING COMPETENCE

The submission recommends additional steps to address all of the identified risks in the case study that the organization would need to take to implement the ISMS plan, but not all of the recommended steps are clearly relevant to the conducted risk assessment in the case study.

COMPETENT

The submission recommends additional steps to address all of the identified risks in the case study that the organization would need to take to implement the ISMS plan, and the recommended steps are relevant to the conducted risk assessment in the case study.

B1:DISCUSSION

NOT EVIDENT

A discussion is not provided, the response does not discuss what each recommended step entails, or the discussion of each step is not based on the evaluation of the conducted risk assessment.

APPROACHING COMPETENCE

The discussion includes what each recommended step entails, but it is not clearly based on the evaluation of the conducted risk assessment in the case study.

COMPETENT

The discussion includes what each recommended step entails, and it is clearly based on the evaluation of the conducted risk assessment in the case study.

B2:JUSTIFICATION

NOT EVIDENT

A justification is not provided, the submission does not include a justification for each recommended step, or the justifications for each step are not based on the evaluation of the conducted risk assessment.

APPROACHING COMPETENCE

The submission demonstrates a limited understanding of the reasons for each recommended step, but the reasons do not clearly justify each recommended step based on the evaluation of the conducted risk assessment in the case study.

COMPETENT

The submission demonstrates a clear understanding of the reasons for each recommended step, and the reasons justify each recommended step based on the evaluation of the conducted risk assessment in the case study.

C:SOURCES

NOT EVIDENT

The submission does not include both in-text citations and a reference list for sources that are quoted, paraphrased, or summarized.

APPROACHING COMPETENCE

The submission includes in-text citations for sources that are quoted, paraphrased, or summarized, and a reference list; however, the citations and/or reference list is incomplete or inaccurate.

COMPETENT

The submission includes in-text citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available.

D:PROFESSIONAL COMMUNICATION

NOT EVIDENT

Content is unstructured, is disjointed, or contains pervasive errors in mechanics, usage, or grammar. Vocabulary or tone is unprofessional or distracts from the topic.

APPROACHING COMPETENCE

Content is poorly organized, is difficult to follow, or contains errors in mechanics, usage, or grammar that cause confusion. Terminology is misused or ineffective.

COMPETENT

Content reflects attention to detail, is organized, and focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics, usage, and grammar promote accurate interpretation and understanding.

Read more

Discussion Question and Paper

I’m trying to study for my Psychology course and I need some help to understand this question.

Please note this is a discussion question and a paper

Potential Resolutions

For those identified problems/issues with many causes and effects, there are potentially many solutions, each with its own set of advantages and disadvantages. The solutions may impact just one of the effects or may impact several effects. The goal this week is to generate as many solutions as possible based on the critical analysis of the problem created earlier. At this stage, don’t worry about whether the solution is effective. Simply generate as many potential solutions as you can. Once you have generated a list, select two potential resolutions and identify the advantages and disadvantages of each solution. You will share these with your peers; pay particular attention to their responses about which solution might work best in alleviating the problem/issue you selected.

To prepare:

Review the “Problem Solving Template,” located in the Resources area on the left navigation bar. Attached

Review the causes and effects that you generated in Week 6. Attached

Review the critical analysis narrative that you prepared in Week 7. Attached

Think about some potential resolutions to your identified problem and the advantages and disadvantages of each.

With these thoughts in mind answer the following question in 3 or more paragraphs.

Discuss two potential resolutions to the identified problem/issue and explain their advantages and disadvantages. Provide specific examples.

Application: Proposed Resolution _2 page paper

The last component of the Capstone Project involves the identification and critical analysis of a potential resolution to the identified problem. In this Application Assignment you will critically analyze one of the potential resolutions you proposed in Week 8. What would be the challenges and barriers to implementing the resolution?

To prepare:

Review the list of potential resolutions generated in Week 8 and identify the resolution you deem most likely to address the identified problem.

Consider the following questions for the resolution you have selected:

Is the resolution realistic

What are the consequences of the resolution, and who would be impacted?

What would be the challenges and barriers to implementing the resolution?

The assignment:

Submit a 1- to 2-page description of the selected resolution with its advantages and disadvantages. Also explain challenges and barriers to its implementation.

Scholarly Resoruces only in APA format

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information