This document discusses physical security measures at buildings and workplaces. It asks the reader to observe access controls, security guard training, and visitor policies. It also prompts considering how easy it would be to dig through trash for private information. The document then questions the differences between authentication and authorization, and anomaly-based and misuse-based detection models for network security. It asks the reader to write at least a page and a half on each question with 0% plagiarism.