Total entropy change of the system physics homework help

helpp neededdd

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Assignment 3 Staffing Your Entrepreneurship Plan business and finance homework help

Assignment 3: Staffing Your Intrapreneurship Plan


 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Preparing a formal policy memo for the President writing homework help

Introduction-This project is an opportunity to discuss what you think should be the highest priority (aka: national interest) in the future of American foreign policy regarding one specific country. Step 1 – Identifying the Issue- Identify a critical issue in the US foreign policy relationship with one other nation.. Identify strategies that could be used to improve the policy (a thesis statement). Step 2 – Gathering Sources-Conduct research to locate three peer-reviewed academic journal articles (aka: scholarly sources) that specifically address issues within the foreign policy relationship you selected and meet the following criteria: The article must be no more than ten (10) years old and more than five (5) pages of actual content (without graphs, charts, footnotes, citations, etc.). Carefully choose those sources that provide a variety of perspectives on your selected topic. In addition to the (3) minimum research requirements, you may offer “supplemental sources” for essential current events information relevant to your topic. These may include academic sources that are not peer-reviewed (position papers), newspaper articles, magazine articles, and other legitimate sources. Textbooks, Dictionaries, Encyclopedias (including Wikipedia), Almanacs, or an Atlas are reference materials and are not to be listed as sources on the collegiate level. Provide the formal MLA or APA citation for each source.

Step 3– The Memo- Prepare a formal policy memo for the President of the United States (POTUS). Your document should quickly explain how the President can take your advice and put it into action. He is a busy man, so you must convey information quickly and on point. This document should quickly articulate (in 2-3 paragraphs) the relevance of the issue, the current policy position (citing the supporting evidence) and conclude with suggested reforms. The memo is to be 1.5 pages(single space) in your own words and a maximum of 2 full pages in length with citations. No more and no less is necessary for this activity. Keep citations to an absolute minimum.The formatting is to be single spaced; this is the protocol for a memo. Finally, add a cover page to the front of the document and include the works cited page at the end. This assignment should not be more than 4 pages total.

Topic: My POTUS Memo will focus on the relationship between the United States and Syria, specifically humanitarian assistance the U.S. provides in response to the Syrian crisis.

Sources that could help:

1. Achiume, E. Tendayi. “Syria, Cost-Sharing, And The Responsibility to Protect Refugees.” Minnesota Law Revie w 100.2 (2015): 687-762. Academic Search Complete. Web. 24 Oct. 2016.

2. Crook, J. R. (2012). United states pursue multitrack strategy to address conflict in Syria. The American Journal of International Law, 106(3), 652-655. Web. 24 Oct. 2016

3. Margesson, R., & Chesser, S. G. (2015). Syria: OVERVIEW OF THE HUMANITARIAN RESP ONSE.Current Politics and Economics of the Middle East, 6(2), 347-381. Web. 24 Oct. 2016

4. Rugh, W. A. (2013). Obama’s policy towards Syria.The Fletcher Forum of World Affairs, 37(3), 147-150.Web. 24 Oct. 2016

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Enhancing Network Security computer science homework help

write 400–600 words that respond to the following questions with your thoughts, ideas, and comments.and muake sure that all references must be in APA format This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Before you start this assignment, please read the story below

As Clive started his typical Wednesday morning routine, he was checking his e-mail. He saw a familiar name in his inbox. It was Jane, an information technology (IT) security manager at a competitive company. Clive and Jane have a good working professional (and ethical) relationship in which they often share information relating to security breaches and issues. Clive opens the e-mail, eager to see what new attack Jane has found. But in this case, Jane is pointing Clive to a pastebin link that contains the customer database content from Clive’s company.

 Clive is now in a panicked but controlled state. His mind starts to race. How did these data get from the company database to this Web site? Who did it? What systems were compromised to generate this list of data? Clive takes a moment and composes himself, and then he begins to analyze the situation. 

The first task Clive does after he settles down is to inform the appropriate people. He calls his manager and tells her of the situation, and assures her that he and his team are analyzing the situation and will keep her informed of progress. Clive’s next calls are to the team leaders of the network, database, and system administration organizations. The incident response plan is initiated.

Initial assessments from the three team leaders report the following:

 • Network: After review of the intrusion detection system and firewall logs, there appears to be no abnormal activity; no alerts were generated. 

• Database: After a review of database accounts, user and data definition (DDL) and data manipulation (DML) audit logs and database integrity checks, the database appears to show no abnormal activity. 

• System administration: The system integrity checks and system audit logs show no abnormal activity.

After reviewing the reports, Clive is skeptical of the results, and he asks the teams to verify and confirm that log cleanup and deletion did not take place, and all leaders confirm that to be the case. Clive reports these findings to the management team. They are not pleased. They ask, “If no sign of break-in can be detected, then how did the list get generated and leave company premises?” 

The incident response team heads back for more investigations. They next decide to review the application that the company uses. The application is an off-the-shelf application with a full and rich feature list. The various organizations use the features and insist that all of them are needed. Upon Data Breach an All-Too-Often Occurrence 2 review and investigation, they find that there are several pieces to the application that are not actively used by any team, yet certain people in the company have access to them. When reviewing these applications, a little hidden feature is found that allows users to write and run raw structured query language (SQL) statements in the database using the database application accounts. 

The incident response team is curious about this feature and starts to investigate this path as the possible source of the data breach. Unfortunately, the application does not have auditing enabled for this area in the application. But the database administrator declares that there might be something that he can investigate. 

The database auditing is only for DDL and DML, so SELECT statement access is not monitored, but the database does store all executed SQL statements in the Data Dictionary. A review of this information shows 1 query:

SELECT * 

FROM app.customers;

All other statements accessing the app.customer table utilize a WHERE clause to limit the data to specific customers. The incident response team reviews this information and agrees this is how the data were extracted. Clive takes this information and reports back to the management team. They are pleased to know that progress is being made, but demand to know who did it and what can be done to prevent it from happening again in the future. The team now faces a new set of questions that need to be addressed:

 • How was this access given?

 • Who performed the SQL? 

• How did it leave the company and make it to the paste bin site? 

The incident response team added a new member to assist. The application support team was brought in and briefed on the situation and was asked to find out who performed the SQL statement and how he or she did it. Unfortunately, the company has all employees log into a shared application account. The application does not offer detailed connection logging. It was determined that there are 2 departments with about 25 people who have the access to perform the task in question.

The human resources (HR) organization was engaged and conducted interviews with all 25 employees, but in the end, no one was found to have Data Breach an All-Too-Often Occurrence 3 conducted the data breach, and the incident was closed with no employee blamed for the incident. In the meantime, while accountability was being reviewed, the incident response team had the obligation to resolve the incident. Two major resolutions were implemented: 

• The application in question was modified, and direct SQL access was revoked.

 • Generic accounts were no longer permitted; all users were now given named user accounts.

 Moral of the Story 

The use of software products without a full review of the application features and functionality led to the breach described in the story. In addition, the implemented access control model created accountability. A full review of any implemented software package needs to take place, and an understanding of all features and functionality is critical. Those features that pose a security risk should be disabled.

 The use of the generic account with no additional auditing provided no accountability to the users for their actions. In this case, no one was ultimately held to blame for the incident except for the infrastructure and application support team for the lack of controls. The use of granular access controls is fundamental to any implementation.

 In the end, the addition of a data loss prevention (DLP) network appliance could have alerted the company about the event. DLP devices monitor the network and look for data in motion and if sensitive data is detected alerts are raised. In this event, the large amounts of customer data being transmitted from the database to a client computer—and then potentially from the client computer out to the Internet—might have been detected. 

Finally, security personnel must remember that not all security breaches are conducted from the Internet by expert hackers. The majority of incidents result from employees of the company performing malicious or, in most cases, accidental activities.

After reviewing the story, conduct research online into the various possibilities for analyzing and approaching the system documentation problems presented, and propose possible solutions. Address the following:

  • Discuss the specific recommendations that you would make based on your personal experience and research.
  • Discuss the impact (from the perspective of various stakeholders) of the lack of access controls and auditing.
  • How can technology be used as an enabler and facilitator of effective access controls and auditing?
  • How can you apply the lessons that you learned from the story to your own company problem?

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

storage systems computer science assignment help

Many types of back-up technologies exist including disk to disk and disk to tape libraries. Given that tape has been around for many decades, why have companies slowly continued to move away from it? Should they? Explain your answer.

i want 300 to 400 words and cited refernce

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Mark Zuckerberg on team dynamics located on you tube business and finance assignment help

Watch the video titled “Mark Zuckerberg on team dynamics located on you tube . Then express whether or not you agree with Mark Zuckerberg’s opinion on managing team dynamics. Half a page to one page

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Diagnostic writing sample writing homework help

For this assignment, write a summary paragraph about your chosen article. The summary should include:

  • An introductory sentence that identifies the title of the article, who wrote it, and the main idea of the article.
  • At least 3-5 body sentences that identify supporting details and any questions the article left unanswered.
  • A sentence that comments on the effectiveness of the article’s conclusion.
  • A concluding sentence that restates the main idea and provides closure for the paragraph.
  • An APA style reference citation for the article.
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

S P or E Systems computer science homework help

  • Identify at least two methods by which we can determine if a legacy system should remain as legacy or it should be upgraded into a new software system. Explain these two methods and how they are applied.
  • Describe at least two ways software engineers can measure the impact of a proposed change to a software system
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

organization through managerial groups management homework help

Answer the following in 1-2 sentences each.

  • Take a position on whether or not managerial groups within a large organization are more likely to make better decisions than individual managers within the same organization. Provide support for your position.
  • Suggest a scenario that illustrates when a manager should approach a decision from a group perspective, as opposed to taking his or her individualized approach to the decision in question. Provide support for your rationale.
  • Suggest one (1) key influence that managers within a flat organizational structure may exert on an organization, as opposed to the impact of managers with specialized skills in a hierarchical structure. Provide support for your rationale.
  • Imagine that you are a manager responsible for implementing a significant technology change within an organization. Suggest how most employees are likely to react to the change. Indicate one (1) way in which you would minimize the impact of this reaction to the change management process. Provide support for your suggestion
  • Use the Internet to research articles related to multi-generational talent management in today’s workplace, recommend one (1) talent management strategy that both addresses the needs of a multi-generational workforce and supports an organization’s recruitment and maintenance of quality employees. Provide support for your recommendation.
  • Determine one (1) significant challenge for management related to diversity, and suggest one (1) strategy that management may use either to minimize or overcome this challenge. Provide one (1) example to illustrate the challenge.
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

world cultureweek 8 assignment 2 submission

Assignment 2: Project Paper 

The Project Paper focuses on a suggested topic related to art, architecture, history, music, or literature. The project will reflect your views and interpretation of the topic. This project is designed to help you stretch your mind and your abilities to be the creative, innovative, and critical thinker you already are! 

Choose one (1) of the topics from the list of topic choices below. Read the topic carefully. Write a four (4) page paper (850-1,000 words) that responds to each of the items described in the topic.


For the topic you choose:

  1. Support your ideas with specific, illustrative examples. If there are questions or points associated with your chosen topic, be sure to answer all of the listed questions and address all of the items in that topic. If your topic requires you to do several things related to the topic, be sure to do each of the things listed.
  2. While some of the topics tend to lend themselves toward particular writing genres, you are not restricted to the specific format suggested for the individual topic. For example, you may do an “interview,” a “proposal,” a “letter,” a “short story,” a “blog,” an “essay,” an “article,” or any other written genre for almost any of the topics. The project is intended to be fun as well as informative, so feel free to be creative with the delivery of your information.
  3. Use at least three (3) good quality academic sources with one (1) source being the class text. Note: Wikipedia and other similar Websites do not quality as academic resources. You are highly encouraged to use the Resource Center tab at the top of your Blackboard page.

Topic choices (pick 1):

  • Self-Portraits. Journal. The Renaissance artists Titian, Rembrandt, and Durer have each painted self-portraits. Imagine yourself as one of these artists (or another artist of your choice that has painted a self-portrait) and write a journal expressing your thoughts on “your” art (in other words, the journal entries the artist would probably write.) (1) Explain “your” primary reason for painting a self-portrait. (2) Describe “your” artistic choices in composition: use of color, space, etc. (3) Explain what the portrait represents about “you” (as the artist.) (4) Explain “your” choices of subject with regard to at least three other specific pieces “you” have painted.
  • Ladies & Gentlemen. Survey & Report. Some may believe that being “gentleman” or a “lady” in today’s society is an outdated notion, but others may disagree. (1) Briefly summarize the main characteristics of a well-rounded person, “l’uomo universal,” referring to specific sections within the excerpt fromThe Courtier which identifies these characteristics. (2) Create a “survey” based on the identified characteristics and “poll” at least ten people to find out whether or not the characteristics are relevant for a “gentleman” or “lady” of today. (3) Tabulate and discuss the responses in terms of gender, age, vocation, etc. of your survey participants, making note of any interesting or surprising results which show up in your poll answers. (4) Finally, explain whether or not you agree with the characteristics expressed by Castiglione in The Courtier.
  • BayeuxTapestry Experience. Letter. Imagine yourself as one of the figures in the battle depicted in the Bayeux Tapestry; in a letter home, you describe your experience to your family. (1) Write a first-person account of this historical event from the perspective of one of the figures in tapestry. (2) Use your senses to describe your impression of the event. (3) Describe specific elements of the scene such as uniforms, weaponry, fighting styles, etc. (4) Explain why you believe your side was justified in participating in the battle and how you would like the battle to be remembered.
  • Ancient Emperors. Deathbed MemoirPretend you are one of the emperors we have studied, such as Shihuangdi, Constantine, Ashoka, or Charlemagne. You are on your deathbed and want to write a brief account of your life. As you look back over your life, what do you consider your greatest accomplishments in 1) politics, 2) art / architecture, and 3) religion, philosophy or intellectual life? Finally (4), describe and explain anything you have done for which you fear history will judge you harshly, or present the proudest aspects of your legacy.
  • Other topic choice recommended and approved by the professor and supported by the grading rubric.

The Project Paper will be graded on:

  1. The level to which the instructions were followed.
  2. The extent to which all four (4) parts in the topic were addressed.
  3. The adequacy of information, examples, and details which support the general claim or main idea.
  4. The relevance of the explanations and descriptions.
  5. The inclusion of three (3) required references (two additional sources besides your textbook) documented using APA style.
  6. Adherence to standard rules of grammar, punctuation, and mechanics.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA Style format. Check with your professor for any additional instructions specific to the selected topic. (Note: Students can find APA style materials located in the course shell for reference)
  • Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
    Use Discount Code "Newclient" for a 15% Discount!

    NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.