Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts which manage user information.
You are to prepare a simple shell script which reads a text file called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/SM/I/outline.html#contentPanel
You work for the Information Technology Department in your University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS volume.
All volumes including the operating system should be engineered in such a way to ensure the
best data protection is afforded in the event of local disk failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 200G.
3. uni2 with mount point /users/deleted& reservation of 100G.
4. uni3 with mount point /users/staff& reservation of 100G.
5. uni4 with mount point /users/guest & reservation of 250G.
Given the above your task is as follows define a strategy for how you will ensure the volumes
outlined above are provisioned whilst ensuring there data protection. Document this accordingly
along with a suitable rationale for your design.
Part 3: Implementing the Filesystem (4 marks)
Given the strategy defined in part two, your job is to implement the storage system.
1. To do this install the latest version of Ubuntu Server on a virtual machine. You will need to
ensure the networking is bridged and the root portioning is managed appropriately. You will
need to add additional virtual disks to meet the storage needs above.
2. Install the ZFS package and configure it such that pools of storage are created to meet the above
requirements including redundan.
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxSANSKAR20
Evaluate a Health Website
Name Click here to enter text. Course Click here to enter text.Date Click here to enter text.
Pick one disease disorder or condition. Find two medicine-based websites that discuss it, such as WebMD, MedicineNet, the American Heart Association website, the American Diabetes Association website, and so on. Compare how the two websites you pick treat the subject. Then answer the following questions.
Question 1: What disease or condition did you pick?
Click here to enter text.
Question 2: What are the two websites you looked at?
1.
2.
Question 3: What differences did you find in how the two websites described the disease or condition?
Click here to enter text.
Question 4: Did one of the websites seem to be more reliable? If so, which, and why? If not, why not?
Click here to enter text.
Question 5: After reading the article, what three questions might a patient have about the condition that weren’t addressed?
1.
2.
3.
Page 1
Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts which manage user information.
You are to prepare a simple shell script which reads a text file called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/SM/I/outline.html#contentPanel
You work for the Information Technology Department in your University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS volume.
All volumes including the operating system should be engineered in such a way to ensure the
best data protection is afforded in the event of local disk failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 20 ...
csc3412 Assignment 1Semester 1, 2014Due Date Midnight.docxfaithxdunce63732
csc3412 Assignment 1
Semester 1, 2014
Due Date: Midnight 31 March 2014, AEST
This assignment consists of 3 questions each of equal value. They
consist of common tasks required of a system administrator—tasks
I have had to do at some time in the past.
Clear Layout
It is vitally important that your assignment is clearly laid out with
questions and parts of questions clearly defined. It must be a
straight forward matter for the examiner to determine that you
have completed each exercise satisfactorily. We want quality not
quantity. Poorly organised submissions will be rejected or receive
a poor mark.
A text file or PDF/A document typeset using vanilla LATEX are
preferred over a document produced by a word-processor. If you
must use Microsoft Word please export your document as PDF/A1
not PDF.
Command Output
When answering these questions you will have to run commands
under Linux—whenever a command is run you will need to:
a. explain in your own words the purpose of the command in the
context of the assignment question. (Please do not just copy
the “Description” section from the man page!) Also, you
need to explain in your own words all terminology used—as
if you were explaining to an average user! (Please show you
understand what you are doing!)
b. show that the command worked—either from its output or
the output from another command. For example
prompt> dd if=/dev/zero of=Crypt.fs bs=1M count=32
32+0 records in
1 PDF/A is an archival format of PDF that embeds all fonts used in the doc-
ument within the PDF file. To ensure PDF/A format in Word check “ISO-
19005-compliant (PDF/A)” under “Options” when saving a file as PDF.
LATEX produces PDF/A by default.
32+0 records out
33554432 bytes (34 MB) copied, 0.109063 s, 308 MB/s
prompt> ls -l Crypt.fs
-rw-r--r-- 1 user user 33554432 2014-02-25 10:18 Crypt.fs
c. To capture text output from programs you will have to redi-
rect the output to a file or use the command script. If you
are using the command script turn off the tty escape se-
quences that change the colour of console text—the escape
sequences will appear in output file and make it impossible
to read.
2
Question 1 (marks 20)
On modern networked computers, maintaining the correct time on
each machine is important. Computers on a LAN or WAN with
different times can cause problems.
In about a page and in your own words explain why it is im-
portant for computers to maintaining the correct time and more
importantly explain how do they do it.
In your explanation make certain to include discussions on the
following linked topics:
• The computer’s hardware clock (also called the Real Time
Clock or RTC)
• The computer’s software clock (also called the kernel or sys-
tem clock)
• In Linux, how they are syncronised and why do they need to
be syncronised? (See Exercise 2.35 from the Study Book)
• What is UTC and why is it used? (UTC: Coordinated Uni-
versal Time, or Temps Universel Coordonné, and if you want—
you can expla.
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxSANSKAR20
Evaluate a Health Website
Name Click here to enter text. Course Click here to enter text.Date Click here to enter text.
Pick one disease disorder or condition. Find two medicine-based websites that discuss it, such as WebMD, MedicineNet, the American Heart Association website, the American Diabetes Association website, and so on. Compare how the two websites you pick treat the subject. Then answer the following questions.
Question 1: What disease or condition did you pick?
Click here to enter text.
Question 2: What are the two websites you looked at?
1.
2.
Question 3: What differences did you find in how the two websites described the disease or condition?
Click here to enter text.
Question 4: Did one of the websites seem to be more reliable? If so, which, and why? If not, why not?
Click here to enter text.
Question 5: After reading the article, what three questions might a patient have about the condition that weren’t addressed?
1.
2.
3.
Page 1
Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts which manage user information.
You are to prepare a simple shell script which reads a text file called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/SM/I/outline.html#contentPanel
You work for the Information Technology Department in your University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS volume.
All volumes including the operating system should be engineered in such a way to ensure the
best data protection is afforded in the event of local disk failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 20 ...
csc3412 Assignment 1Semester 1, 2014Due Date Midnight.docxfaithxdunce63732
csc3412 Assignment 1
Semester 1, 2014
Due Date: Midnight 31 March 2014, AEST
This assignment consists of 3 questions each of equal value. They
consist of common tasks required of a system administrator—tasks
I have had to do at some time in the past.
Clear Layout
It is vitally important that your assignment is clearly laid out with
questions and parts of questions clearly defined. It must be a
straight forward matter for the examiner to determine that you
have completed each exercise satisfactorily. We want quality not
quantity. Poorly organised submissions will be rejected or receive
a poor mark.
A text file or PDF/A document typeset using vanilla LATEX are
preferred over a document produced by a word-processor. If you
must use Microsoft Word please export your document as PDF/A1
not PDF.
Command Output
When answering these questions you will have to run commands
under Linux—whenever a command is run you will need to:
a. explain in your own words the purpose of the command in the
context of the assignment question. (Please do not just copy
the “Description” section from the man page!) Also, you
need to explain in your own words all terminology used—as
if you were explaining to an average user! (Please show you
understand what you are doing!)
b. show that the command worked—either from its output or
the output from another command. For example
prompt> dd if=/dev/zero of=Crypt.fs bs=1M count=32
32+0 records in
1 PDF/A is an archival format of PDF that embeds all fonts used in the doc-
ument within the PDF file. To ensure PDF/A format in Word check “ISO-
19005-compliant (PDF/A)” under “Options” when saving a file as PDF.
LATEX produces PDF/A by default.
32+0 records out
33554432 bytes (34 MB) copied, 0.109063 s, 308 MB/s
prompt> ls -l Crypt.fs
-rw-r--r-- 1 user user 33554432 2014-02-25 10:18 Crypt.fs
c. To capture text output from programs you will have to redi-
rect the output to a file or use the command script. If you
are using the command script turn off the tty escape se-
quences that change the colour of console text—the escape
sequences will appear in output file and make it impossible
to read.
2
Question 1 (marks 20)
On modern networked computers, maintaining the correct time on
each machine is important. Computers on a LAN or WAN with
different times can cause problems.
In about a page and in your own words explain why it is im-
portant for computers to maintaining the correct time and more
importantly explain how do they do it.
In your explanation make certain to include discussions on the
following linked topics:
• The computer’s hardware clock (also called the Real Time
Clock or RTC)
• The computer’s software clock (also called the kernel or sys-
tem clock)
• In Linux, how they are syncronised and why do they need to
be syncronised? (See Exercise 2.35 from the Study Book)
• What is UTC and why is it used? (UTC: Coordinated Uni-
versal Time, or Temps Universel Coordonné, and if you want—
you can expla.
Automating Desktop Management with Windows Powershell V2.0 and Group Policy M...Microsoft TechNet
This session will explore the new Windows Powershell v2.0 features and how to automate administrative tasks in Windows 7. We will examine the new Windows Powershell cmdlets and show you how to remotely manage desktop systems throughout the organization. Then we will use Windows Powershell with WMI to monitor and retrieve system status and execute changes. Finally, we will use Windows Powershell Group Policy Object cmdlets to automate management of Group Policy Objects and the configuration of registry-based settings.
Prepared by Dr Jahan Hassan Moderated by Dr Fariza Sabrin.docxharrisonhoward80223
Prepared by: Dr Jahan Hassan Moderated by: Dr Fariza Sabrina July, 2017
Assessment Details and Submission Guidelines
Trimester T2 2017
Unit Code MN506
Unit Title System Management
Assessment
Type
Individual Report of group based implementation, and demonstration within
group testing individual understanding.
Assessment
Title
Enterprise Network system management by the installation, configuration and
management of Domain Controllers (DC).
Purpose of the
assessment (with
ULO Mapping)
The purpose of this assignment is to provide students with system
management experiences to address the need of modern organisations. After
successful completion of this assignment, students should be able to:
a. Apply standard and emerging tools and techniques for system management.
b. Develop and configure server architecture within the context of constantly
changing modern industry requirements.
c. Manage servers and resources to support enterprise information systems
d. Install, configure, monitor, test, troubleshoot and manage various servers for
an organisation.
Weight 20%
Total Marks 50
Word limit 2000
Due Date Report: Week-11, on the day of your lecture, 11:55 PM. Demo: Week-12 lab.
Submission
Guidelines
All work must be submitted on Moodle by the due date along with a
title Page.
The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri
(Body) font and 2.54 cm margins on all four sides of your page with
appropriate section headings.
Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Your submission must be your own work, and will be checked for
originality using Turnitin originality checking system.
Extension If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly to the School's Administration Officer,
in Melbourne on Level 6 or in Sydney on Level 7. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct
Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
familiar with the full policy and procedure available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-
Procedure. For further information, please refer to the Academic Integrity
Section in your Unit Description.
http://www.mit.edu.au/about
http://www.mit.edu.au/about
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/speci.
BP101 - 10 Things to Consider when Developing & Deploying Applications in Lar...Martijn de Jong
Many common development techniques can cause dramatic effects when your application is rolled out over hundreds of servers. As a developer, you need a good understanding of certain parts of the infrastructure to build an application designed for wide-scale deployment. System administrators who review applications before deployment should know what to look for in the code to prevent problems when rolled out to production. This session takes a look at the area where Application Development and System Administration come together. You will hear about real-life problems, view examples of bad code as well as good code, and learn what you should consider when you have to develop or deploy an application which will be rolled out in a large-scale deployment, or how to "harden" your code to support large quantities of documents.
Faster Computing was impressed with your presentation. The company.pdframizmemonahmedabado1
Faster Computing was impressed with your presentation. The company is interested in moving
forward with the project, but the senior management team has responded to the presentation with
the following questions and concerns:
IMPORTANT: follow these instructions
your claims need credibility, The NIST docs will get you there.
they need assurance, what apps can they expect
They had an old way of doing business, is the new way you are suggesting manageable?
is your company a solution ? if youre telling them they will have to figure out, then your offering
is zero value.
Style: write in third person, no "I" or "we"; "...a study was performed...."
Use the bullet separators in your formatting
Use IEEE reference style
Security: use NIST SP800-53
Think Open Office or Libre for Windows apps
Log files, look at NIST SP800-92
Different types of linux, "keyword linux distros"
Note: you are writing to Faster Computing's management and not an audience of engineers and
administrators.
(12.3.2: Describe the implementation of controls.)
How will security be implemented in the Linux systemsboth workstations and servers?
(10.1.2: Gather project requirements to meet stakeholder needs.)
End users have expressed some concern about completing their day-to-day tasks on Linux. How
would activities such as web browsing work? How would they work with their previous
Microsoft Office files?
(12.4.1: Document how IT controls are monitored.)
The current Windows administrators are unsure about administering Linux systems. How are
common tasks, such as process monitoring and management, handled in Linux? How does
logging work? Do we have event logs like we do in Windows?
(2.3.2: Incorporate relevant evidence to support the position.)
Some folks in IT raised questions about the Linux flavor that was recommended. They would
like to see comparisons between your recommendation and a couple of other popular options.
What makes your recommendation the best option?
(10.1.3: Define the specifications of the required technologies.)
How does software installation work on Linux? Can we use existing Windows software?
How can Linux work together with the systems that will continue to run Windows? How will we
share files between the different system types?
The deliverable for this phase of the project is a memo. There is no minimum or maximum page
requirement, but all of the questions must be fully answered with sufficient detail. The
recommended format is to respond to the questions in a bulleted format. Provide sufficient detail
to fully address the questions. You must cite at least two quality sources.
(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)
Create a memorandum template with a header of your own design or choosing, brief
introduction, addresses Faster Computing, Inc's questions, and summarizes your position on
adopting the specific version of Linux.
(1.4.3: Write concise and logical sentences in standard academic English that clarify
relations.
Google File System was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as Google File System that is GFS. Google File system is one of the largest file system in operation. Generally Google File System is a scalable distributed file system of large distributed data intensive apps. In the design phase of Google file system, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. Google File System also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, Google file system is highly available, replicas of chunk servers and master exists.
Google File System was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as Google File System that is GFS. Google File system is one of the largest file system in operation. Generally Google File System is a scalable distributed file system of large distributed data intensive apps. In the design phase of Google file system, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. Google File System also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, Google file system is highly available, replicas of chunk servers and master exists.
Creating a Scheduled Backup and Replicating System Folders Introduct.docxwilliejgrant41084
Creating a Scheduled Backup and Replicating System Folders Introduction
Disaster recovery (DR) and business continuity (BC) are key elements in any security program. While not the responsibility of a security practitioner, DR and BC plans should exist for all information systems in an organization, and system backups are traditionally the cornerstone of every disaster recovery plan. With the advent of virtualization, many organizations are moving away from traditional server backups and instead relying on cloning and redundancy for their backup and recovery needs. Regardless, traditional file and folder backups still play an important role.
If traditional server backups are used, they should be configured to meet the needs of defined organizational policies and data classification standards. In common practice, incremental data backups occur daily for data stored that day, while complete system backups may be scheduled weekly. In addition, the backup strategy for many organizations includes a process for moving data that has been backed up to an offsite vault for safe keeping. One popular backup strategy is nicknamed the “son- father-grandfather” backup strategy, where the “son” is the daily/nightly backup, the “father” is a weekly backup, and the “grandfather” is a monthly backup of the system. Often, the father backup is graduated to grandfather status and is kept off-site for safekeeping in case of a disaster at the main site.
The Windows Distributed File System (DFS) can be used to replicate files, folders, and data across many servers automatically. There are two main types of full server backups: bare metal and cloning. Bare metal backups allow a server to be restored on new hardware (or virtual hardware). Clones are copies of virtual servers that can be kept offline until they are needed.
There are four kinds of data backups:
· Full: Full backups backup all data, even if it has not changed.
· Incremental: Incremental backups backup only changed files.
· Differential: Differential backups backup all files that have changed since the last full backup.
· Mirror: Mirror backups copy all data from one location to another redundant location.
In this lab, you will install the Windows Distributed File System and Windows Server Backup features from the PowerShell command line. You will schedule a daily backup of the C:\ERPdocuments folder on the TargetWindows01 server and replicate this backup to the TargetWindows02 server using the DFS Replication feature.
Lab Overview
Each section of this lab is assigned at your instructor’s discretion. Please consult your instructor to confirm which sections you are required to complete for your lab assignment.
SECTION 1 of this lab has three parts, which should be completed in the order specified.
1. In the first part of the lab, you will install the Distributed File System (DFS) and configure the network shares required for data replication.
2. In the second part of the lab, you will use the .
you must read two articles which are from the field of Human Resou.docxdavezstarr61655
you must read two articles which are from the
field of Human Resources
and complete a one page annotated bibliography for each article (scholarly/peer-reviewed journal articles).
Annotated bibliographies must be written in manner, in which, they are understandable. You must describe all-important data such as:
• The participants
• The reason the study was conducted
• What research design was used (surveys, interviews, case study, etc.)
• Which research analysis was used (MANOVA, ANOVA, Kruskal Wallace, etc.) • The results of the study along with any conclusions of the author(s)
.
You must produce a minimum of a 5 pages paper. You must use a minimu.docxdavezstarr61655
You must produce a minimum of a 5 pages paper. You must use a minimum of 5 references, citing the references where you used the material within the paper itself.
- Assure you are citing in APA format
-You must use a minimum of one graphic or image (may use a table)
- Double space the paper
- You must use APA formatting (6th Edition)
.
You must provide a references for entire posting. Please use APA for.docxdavezstarr61655
You must provide a references for entire posting. Please use APA for your reference citation. You will also have citations in the text of your responses as well as references at the end of your responses. References for other readings need to be current, within the last three to five years.
1. Theories seem to be such esoteric notions for a profession that seemed to function well for decades, without highlighting them. Can our practice history guide our practice future with theories? Why/not? 2. Define both rationalism and empiricism. Differentiate between these two scientific approaches.
.
you must present your findings to the IT supervisor before the s.docxdavezstarr61655
you must present your findings to the IT supervisor before the supervisor’s meeting with senior leadership. Prepare meeting notes for the IT supervisor that include the following:
Select one major incident to research regarding technological breaches. Identify the company that was affected and then describe this incident and why you selected it.
Explain the implications associated with this breach, specifically in terms of privacy laws and violations of the law.
Analyze the impact that these technological breaches have on consumer safety and well-being.
Recommend further actions to protect the privacy of clients.
.
You must produce a minimum of a 10 pages paper. You must use a m.docxdavezstarr61655
You must produce a minimum of a 10 pages paper. You must use a minimum of 5 references, citing the references where you used the material within the paper itself.
- Assure you are citing in APA format
-You must use a minimum of one graphic or image (may use a table)
- Double space the paper
- You must use APA formatting (6th Edition)
.
You must produce a minimum of a 10 pages paper. You must use a minim.docxdavezstarr61655
You must produce a minimum of a 10 pages paper. You must use a minimum of 5 references, citing the references where you used the material within the paper itself.
- Assure you are citing in APA format
-You must use a minimum of one graphic or image (may use a table)
- Double space the paper
- You must use APA formatting (6th Edition)
.
You must include the resources you used if any.. THese papers are op.docxdavezstarr61655
You must include the resources you used if any.. THese papers are opinion papers on the subjects posted and not just research papers that you are digging up on previous material... If references are used they most be accessible if not the assignement will be considered to not have been followed and be sent back for revision or dispute if you do not respond.
Paper #1 SCHOOL DROPOUTS
Some statistics about student dropouts follow. The task is to decide what you would do to keep students in schools. In other words, what can be done to improve these statistics?
The national dropout rate is between 25 and 30 percent of students. The typical high school graduation includes only 70 percent of its ninth-grade class members. One result is that approximately one-third of the adult population is functionally illiterate.
States with the lowest dropout rates:
North Dakota
Minnesota
Delaware
Iowa
South Dakota
States with the highest dropout rates:
Louisiana
Florida
Nevada
Mississippi
Tennessee
Georgia
It is possible to spot regional differences in dropout rates, but even more noticeable is the effect of family economics on dropout statistics.
Are there differences by ethnic groups within these statistics?
Analyze the Area of Coos County Oregon
Paper #2
Based on the work of Marcia, there are four general areas in which a person needs to make commitments in order to achieve an identity. These include career identity, sexual beliefs and values, religious beliefs and values, and political beliefs.
Interview a young teenager about his or her plans and commitments in these four areas: 1) career; 2) religion; 3) sexual behavior; and, 4) politics. You do not have to ask about specific behaviors, but ask generally what the person believes. After you interview the child... Write a paper on that interview and the correaltion of Marcia's four Identity Commitments and how it translates to that of the child. 2.5 pages double spaced. you may reference material used from MARCIA
Paper # 3
CHILDERN AND ANXIETY
CHILDREN AND ANXIETY
The prevalence of anxiety disorders among children seems to be on the rise. Children are being treated for obsessive-compulsive disorder, for post-traumatic stress syndrome, and generalized anxiety disorders. Some authors have suggested that the world is a far more frightening and stressful place for children now than in previous generations. Recent historical events, such as the terrorist attack on the World Trade Center, the war in Iraq, and similar events that receive heavy media coverage, may present children with things to think about that previous generations did not experience. In addition, children are exposed to many more graphic images of violence and victimization in their media. These factors, plus the fact that their parents, teachers, and caregivers are also experiencing stressors, might contribute to children’s anxiety.
What did you fear as a child? What things might children fear? Consider the definition of .
More Related Content
Similar to Assessment item 1 File Systems and Advanced Scripting .docx
Automating Desktop Management with Windows Powershell V2.0 and Group Policy M...Microsoft TechNet
This session will explore the new Windows Powershell v2.0 features and how to automate administrative tasks in Windows 7. We will examine the new Windows Powershell cmdlets and show you how to remotely manage desktop systems throughout the organization. Then we will use Windows Powershell with WMI to monitor and retrieve system status and execute changes. Finally, we will use Windows Powershell Group Policy Object cmdlets to automate management of Group Policy Objects and the configuration of registry-based settings.
Prepared by Dr Jahan Hassan Moderated by Dr Fariza Sabrin.docxharrisonhoward80223
Prepared by: Dr Jahan Hassan Moderated by: Dr Fariza Sabrina July, 2017
Assessment Details and Submission Guidelines
Trimester T2 2017
Unit Code MN506
Unit Title System Management
Assessment
Type
Individual Report of group based implementation, and demonstration within
group testing individual understanding.
Assessment
Title
Enterprise Network system management by the installation, configuration and
management of Domain Controllers (DC).
Purpose of the
assessment (with
ULO Mapping)
The purpose of this assignment is to provide students with system
management experiences to address the need of modern organisations. After
successful completion of this assignment, students should be able to:
a. Apply standard and emerging tools and techniques for system management.
b. Develop and configure server architecture within the context of constantly
changing modern industry requirements.
c. Manage servers and resources to support enterprise information systems
d. Install, configure, monitor, test, troubleshoot and manage various servers for
an organisation.
Weight 20%
Total Marks 50
Word limit 2000
Due Date Report: Week-11, on the day of your lecture, 11:55 PM. Demo: Week-12 lab.
Submission
Guidelines
All work must be submitted on Moodle by the due date along with a
title Page.
The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri
(Body) font and 2.54 cm margins on all four sides of your page with
appropriate section headings.
Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Your submission must be your own work, and will be checked for
originality using Turnitin originality checking system.
Extension If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly to the School's Administration Officer,
in Melbourne on Level 6 or in Sydney on Level 7. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct
Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
familiar with the full policy and procedure available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-
Procedure. For further information, please refer to the Academic Integrity
Section in your Unit Description.
http://www.mit.edu.au/about
http://www.mit.edu.au/about
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/speci.
BP101 - 10 Things to Consider when Developing & Deploying Applications in Lar...Martijn de Jong
Many common development techniques can cause dramatic effects when your application is rolled out over hundreds of servers. As a developer, you need a good understanding of certain parts of the infrastructure to build an application designed for wide-scale deployment. System administrators who review applications before deployment should know what to look for in the code to prevent problems when rolled out to production. This session takes a look at the area where Application Development and System Administration come together. You will hear about real-life problems, view examples of bad code as well as good code, and learn what you should consider when you have to develop or deploy an application which will be rolled out in a large-scale deployment, or how to "harden" your code to support large quantities of documents.
Faster Computing was impressed with your presentation. The company.pdframizmemonahmedabado1
Faster Computing was impressed with your presentation. The company is interested in moving
forward with the project, but the senior management team has responded to the presentation with
the following questions and concerns:
IMPORTANT: follow these instructions
your claims need credibility, The NIST docs will get you there.
they need assurance, what apps can they expect
They had an old way of doing business, is the new way you are suggesting manageable?
is your company a solution ? if youre telling them they will have to figure out, then your offering
is zero value.
Style: write in third person, no "I" or "we"; "...a study was performed...."
Use the bullet separators in your formatting
Use IEEE reference style
Security: use NIST SP800-53
Think Open Office or Libre for Windows apps
Log files, look at NIST SP800-92
Different types of linux, "keyword linux distros"
Note: you are writing to Faster Computing's management and not an audience of engineers and
administrators.
(12.3.2: Describe the implementation of controls.)
How will security be implemented in the Linux systemsboth workstations and servers?
(10.1.2: Gather project requirements to meet stakeholder needs.)
End users have expressed some concern about completing their day-to-day tasks on Linux. How
would activities such as web browsing work? How would they work with their previous
Microsoft Office files?
(12.4.1: Document how IT controls are monitored.)
The current Windows administrators are unsure about administering Linux systems. How are
common tasks, such as process monitoring and management, handled in Linux? How does
logging work? Do we have event logs like we do in Windows?
(2.3.2: Incorporate relevant evidence to support the position.)
Some folks in IT raised questions about the Linux flavor that was recommended. They would
like to see comparisons between your recommendation and a couple of other popular options.
What makes your recommendation the best option?
(10.1.3: Define the specifications of the required technologies.)
How does software installation work on Linux? Can we use existing Windows software?
How can Linux work together with the systems that will continue to run Windows? How will we
share files between the different system types?
The deliverable for this phase of the project is a memo. There is no minimum or maximum page
requirement, but all of the questions must be fully answered with sufficient detail. The
recommended format is to respond to the questions in a bulleted format. Provide sufficient detail
to fully address the questions. You must cite at least two quality sources.
(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)
Create a memorandum template with a header of your own design or choosing, brief
introduction, addresses Faster Computing, Inc's questions, and summarizes your position on
adopting the specific version of Linux.
(1.4.3: Write concise and logical sentences in standard academic English that clarify
relations.
Google File System was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as Google File System that is GFS. Google File system is one of the largest file system in operation. Generally Google File System is a scalable distributed file system of large distributed data intensive apps. In the design phase of Google file system, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. Google File System also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, Google file system is highly available, replicas of chunk servers and master exists.
Google File System was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as Google File System that is GFS. Google File system is one of the largest file system in operation. Generally Google File System is a scalable distributed file system of large distributed data intensive apps. In the design phase of Google file system, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. Google File System also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, Google file system is highly available, replicas of chunk servers and master exists.
Creating a Scheduled Backup and Replicating System Folders Introduct.docxwilliejgrant41084
Creating a Scheduled Backup and Replicating System Folders Introduction
Disaster recovery (DR) and business continuity (BC) are key elements in any security program. While not the responsibility of a security practitioner, DR and BC plans should exist for all information systems in an organization, and system backups are traditionally the cornerstone of every disaster recovery plan. With the advent of virtualization, many organizations are moving away from traditional server backups and instead relying on cloning and redundancy for their backup and recovery needs. Regardless, traditional file and folder backups still play an important role.
If traditional server backups are used, they should be configured to meet the needs of defined organizational policies and data classification standards. In common practice, incremental data backups occur daily for data stored that day, while complete system backups may be scheduled weekly. In addition, the backup strategy for many organizations includes a process for moving data that has been backed up to an offsite vault for safe keeping. One popular backup strategy is nicknamed the “son- father-grandfather” backup strategy, where the “son” is the daily/nightly backup, the “father” is a weekly backup, and the “grandfather” is a monthly backup of the system. Often, the father backup is graduated to grandfather status and is kept off-site for safekeeping in case of a disaster at the main site.
The Windows Distributed File System (DFS) can be used to replicate files, folders, and data across many servers automatically. There are two main types of full server backups: bare metal and cloning. Bare metal backups allow a server to be restored on new hardware (or virtual hardware). Clones are copies of virtual servers that can be kept offline until they are needed.
There are four kinds of data backups:
· Full: Full backups backup all data, even if it has not changed.
· Incremental: Incremental backups backup only changed files.
· Differential: Differential backups backup all files that have changed since the last full backup.
· Mirror: Mirror backups copy all data from one location to another redundant location.
In this lab, you will install the Windows Distributed File System and Windows Server Backup features from the PowerShell command line. You will schedule a daily backup of the C:\ERPdocuments folder on the TargetWindows01 server and replicate this backup to the TargetWindows02 server using the DFS Replication feature.
Lab Overview
Each section of this lab is assigned at your instructor’s discretion. Please consult your instructor to confirm which sections you are required to complete for your lab assignment.
SECTION 1 of this lab has three parts, which should be completed in the order specified.
1. In the first part of the lab, you will install the Distributed File System (DFS) and configure the network shares required for data replication.
2. In the second part of the lab, you will use the .
Similar to Assessment item 1 File Systems and Advanced Scripting .docx (15)
you must read two articles which are from the field of Human Resou.docxdavezstarr61655
you must read two articles which are from the
field of Human Resources
and complete a one page annotated bibliography for each article (scholarly/peer-reviewed journal articles).
Annotated bibliographies must be written in manner, in which, they are understandable. You must describe all-important data such as:
• The participants
• The reason the study was conducted
• What research design was used (surveys, interviews, case study, etc.)
• Which research analysis was used (MANOVA, ANOVA, Kruskal Wallace, etc.) • The results of the study along with any conclusions of the author(s)
.
You must produce a minimum of a 5 pages paper. You must use a minimu.docxdavezstarr61655
You must produce a minimum of a 5 pages paper. You must use a minimum of 5 references, citing the references where you used the material within the paper itself.
- Assure you are citing in APA format
-You must use a minimum of one graphic or image (may use a table)
- Double space the paper
- You must use APA formatting (6th Edition)
.
You must provide a references for entire posting. Please use APA for.docxdavezstarr61655
You must provide a references for entire posting. Please use APA for your reference citation. You will also have citations in the text of your responses as well as references at the end of your responses. References for other readings need to be current, within the last three to five years.
1. Theories seem to be such esoteric notions for a profession that seemed to function well for decades, without highlighting them. Can our practice history guide our practice future with theories? Why/not? 2. Define both rationalism and empiricism. Differentiate between these two scientific approaches.
.
you must present your findings to the IT supervisor before the s.docxdavezstarr61655
you must present your findings to the IT supervisor before the supervisor’s meeting with senior leadership. Prepare meeting notes for the IT supervisor that include the following:
Select one major incident to research regarding technological breaches. Identify the company that was affected and then describe this incident and why you selected it.
Explain the implications associated with this breach, specifically in terms of privacy laws and violations of the law.
Analyze the impact that these technological breaches have on consumer safety and well-being.
Recommend further actions to protect the privacy of clients.
.
You must produce a minimum of a 10 pages paper. You must use a m.docxdavezstarr61655
You must produce a minimum of a 10 pages paper. You must use a minimum of 5 references, citing the references where you used the material within the paper itself.
- Assure you are citing in APA format
-You must use a minimum of one graphic or image (may use a table)
- Double space the paper
- You must use APA formatting (6th Edition)
.
You must produce a minimum of a 10 pages paper. You must use a minim.docxdavezstarr61655
You must produce a minimum of a 10 pages paper. You must use a minimum of 5 references, citing the references where you used the material within the paper itself.
- Assure you are citing in APA format
-You must use a minimum of one graphic or image (may use a table)
- Double space the paper
- You must use APA formatting (6th Edition)
.
You must include the resources you used if any.. THese papers are op.docxdavezstarr61655
You must include the resources you used if any.. THese papers are opinion papers on the subjects posted and not just research papers that you are digging up on previous material... If references are used they most be accessible if not the assignement will be considered to not have been followed and be sent back for revision or dispute if you do not respond.
Paper #1 SCHOOL DROPOUTS
Some statistics about student dropouts follow. The task is to decide what you would do to keep students in schools. In other words, what can be done to improve these statistics?
The national dropout rate is between 25 and 30 percent of students. The typical high school graduation includes only 70 percent of its ninth-grade class members. One result is that approximately one-third of the adult population is functionally illiterate.
States with the lowest dropout rates:
North Dakota
Minnesota
Delaware
Iowa
South Dakota
States with the highest dropout rates:
Louisiana
Florida
Nevada
Mississippi
Tennessee
Georgia
It is possible to spot regional differences in dropout rates, but even more noticeable is the effect of family economics on dropout statistics.
Are there differences by ethnic groups within these statistics?
Analyze the Area of Coos County Oregon
Paper #2
Based on the work of Marcia, there are four general areas in which a person needs to make commitments in order to achieve an identity. These include career identity, sexual beliefs and values, religious beliefs and values, and political beliefs.
Interview a young teenager about his or her plans and commitments in these four areas: 1) career; 2) religion; 3) sexual behavior; and, 4) politics. You do not have to ask about specific behaviors, but ask generally what the person believes. After you interview the child... Write a paper on that interview and the correaltion of Marcia's four Identity Commitments and how it translates to that of the child. 2.5 pages double spaced. you may reference material used from MARCIA
Paper # 3
CHILDERN AND ANXIETY
CHILDREN AND ANXIETY
The prevalence of anxiety disorders among children seems to be on the rise. Children are being treated for obsessive-compulsive disorder, for post-traumatic stress syndrome, and generalized anxiety disorders. Some authors have suggested that the world is a far more frightening and stressful place for children now than in previous generations. Recent historical events, such as the terrorist attack on the World Trade Center, the war in Iraq, and similar events that receive heavy media coverage, may present children with things to think about that previous generations did not experience. In addition, children are exposed to many more graphic images of violence and victimization in their media. These factors, plus the fact that their parents, teachers, and caregivers are also experiencing stressors, might contribute to children’s anxiety.
What did you fear as a child? What things might children fear? Consider the definition of .
You must include the Textbook definition and a picture f.docxdavezstarr61655
You must include the
Textbook definition
and a
picture
for EACH term below.
Terms:
1. rotation
2. day
3. revolution
4. year
5. season
6. equinox
7. solstice
8. satellite
the textbook - HMH Georgia Science
.
You must include 6 references, two that must come peer-reviewed .docxdavezstarr61655
You must include 6 references, two that must come peer-reviewed journals. Include an Abstract, introduction, and conclusion, as well as the body of content. The paper must follow APA.
TOPIC:
Emerging enterprise network applications
Research paper basics:
• 10-12 pages in length
• APA formatted
• Minimum six (6) sources – at least two (2) from peer reviewed journals.
1. Context and Background Information: Clearly developed Paper with the appropriate details
2. Content: Paper is interesting and relevant
3.APA Format: Used APA format correctly throughout paper
4. Used Compelling Chart, Table, or Map to Illustrate Something in the Paper: A compelling chart, table, or map was used correctly to illustrate a point in the paper
5. Excellent closing
6. Excellent body of paper detailing the Topic
7. Excellent closing
8. Included a list of all references used and all references were cited correctly
9. Format is appropriate and enhances the understanding of the Topic in a creative and dramatic manner throughout the paper.
10. Zero plagiarism
.
You must have the Project Libre to create this! Develop a chart .docxdavezstarr61655
You must have the Project Libre to create this!
Develop a chart showing the inputs required from other project documents required to develop the scope of a project and the outputs of a project scope document. Don’t copy another author’s work for any reason, you may use it for input with citations/references.
Suggestion: create columns with input on the left, document description in the middle, and scope output on the far right, then fill it in using the textual information.
Post the Project Libre file (“xxxxx”.pod)
.
You must have experience doing PhD proposal , so the topic of th.docxdavezstarr61655
You must have experience doing PhD proposal , so the topic of the proposal is ( the impact of value -added tax on the locally economy in the developing countries , advantage ,disadvantage. Saudi Arabia as case study
Introduction of value -added tax
Local economy
The impact of the developing countries such as countries close of the Saudi araba
advantage
disadvantage.
Saudi Arabia with value added tax
.
You must have at least 3 sources. Sources should be cited within you.docxdavezstarr61655
You must have at least 3 sources. Sources should be cited within your writing and you should have a bibliography page. Do not use wikipedia, or any .com websites.
The paper should be at least 750 words. Use APA or MLA format. (Artist Name : Leonardo da Vinci)
In Essay:
1) Begin with some biographical information about the artist.
2) Describe their artwork, write about their process, the media they use, the meaning of their art include name of that art, any inspiration or influences, and body of artwork.
3) Explain why you chose this artist and why their art appeals to you.
.
You must have access to the book needed for the Case Study part. I w.docxdavezstarr61655
You must have access to the book needed for the Case Study part. I will not be able to supply it. Again you must have the book yourself. Follow word count! APA format required.
This is a very important assignment and my price is FIRM.
Newton,Englehardt, Prichard (2012). Taking Sides: Clashing Views in Business Ethics and Society,
12th/E
. McGraw-Hill ISBN: 9780073527352
.
You must give the Source(s) of your answers (textbook - WITH SPECIFI.docxdavezstarr61655
You must give the Source(s) of your answers (textbook - WITH SPECIFIC PAGE REFERENCES; websites etc.)
Please give your Sources WITH SPECIFICITY to avoid receiving a failing grade.
WHY? Because you are not an authority on the Law and you are not the Source of the Law, therefore you have to refer to resources. I had to learn this too when I was starting out!
These are the Essay Topics:(Min. 100 words EACH Essay, just write a paragraph for each and all questions below)
What is meant by the phrase “crimes are statutory offenses”?
Explain Criminal Intent.
Choose one of the Constitutional Safeguards and explain how it works.
Can a person be prosecuted twice for the same act? Explain fully all issues.
What is RICO?
.
You must create a court system for the newly created state of Puerto.docxdavezstarr61655
You must create a court system for the newly created state of Puerto Rico. You are to work under the assumption that Puerto Rico has just been admitted as the 51st state and build your court system from the bottom up. To be certain you understand how courts are organized in other states, you must research at least three current state court systems, within the United States, and use those systems to create Puerto Rico’s system. Do not use Puerto Rico’s current system as one of your examples. You must describe your proposal for creating Puerto Rico’s municipal courts, major trial courts, appellate courts, and the state’s highest court. Include geographic jurisdictions.
You must also describe how judges will be chosen for each court and must discuss how judicial and attorney ethical standards will be structured and enforced. You should conduct basic research on Puerto Rico (size, geography, population, existing counties or municipios, etc.) to be certain your proposed system will actually work.
Remember to provide citations when you borrow some idea or structure from another state.
The body (not including cover page, works cited/bibliography, etc.) of the paper must be 10-12 pages in length, double spaced, using Times New Roman 12-point font. A works cited page or bibliography (depending on the citation system used) must be included. Submitting too many pages will have the same result as submitting too few pages. Any images, charts, etc., used in the paper should be submitted as exhibits and are not included in the page count requirement.
.
You must conduct an informational interview as part of this course. .docxdavezstarr61655
You must conduct an informational interview as part of this course. Use Pioneer Connect or LinkedIn to
reach out to a DU alum or other business professional and conduct an informational interview. You may
also utilize professionals you meet through faculty, staff, extracurriculars, athletics, volunteer work,
family, friends, etc. Submit a 1-page reflection on the experience to the Canvas page by Friday of week
7. Attend class and see Canvas for further details on how to conduct an informational interview
.
You must complete an Electronic Presentation on Black Culture.docxdavezstarr61655
You must complete an
Electronic Presentation on Black Culture
. You will select and present on the significances of two works of black culture. The first work you select must be a work of African-American literature, poetry, music, fashion, dance, or some other cultural art form that was created and/or popularized by an
African American
during the time periods of the Harlem and Chicago Renaissances (1917-1949). Your second work of black culture must have been created and/or popularized by a black person (but not necessarily an African American) within YOUR lifetime. For example, if you were born in 1999, your second cultural selection needs to have been created by a black person between 1999 and the present. The two works you select to present do not have to share a cultural form (i.e. one work can be a poem and the other can be a song; one work can be a painting and the other can be a fashion trend). Nor do the two works have to share a particular theme. You may choose to do a compare-and-contrast type presentation. But, you do not have to. In presenting the works, you will need to provide background information on your chosen works (i.e. when where the works created; who created them or made them famous; and, what impact did the works have on the cultural landscape when and since they first appeared?). You will also have to briefly explain why you made those particular selections, and explain what you think each work tells people about the ways in which African-American/Black culture and experiences remained congruent and/or changed from the eras of the Harlem and Chicago Renaissances to the modern era. Moreover, your Electronic Presentation on Black Culture must be creative in both style and substance.
Your Electronic Presentation should have a run time of 7-10 minutes.
And, it must contain both audio and visual components.
When delivering your Electronic Presentation, you will serve as the professor for the class. So, give a Presentation that your temporary students (i.e. your classmates and Dr. Brown) will find to be both impressive and informative. The more creative, interesting, organized, and informative your Presentation is, the higher your grade will be. If your Presentation is disorganized, bland, lacks imagination, or does little more than echo information and ideas that have already been presented through the course texts, media, and PowerPoint lectures, you should not expect to earn a stellar grade on it.
Your presentation should add information, details, and/or perspectives that we did not cover in class. As such, I strongly recommend that you research and select cultural works that we did not discuss in class. In other words, avoid selecting a poem by Langston Hughes or a song we covered in class. Be more creative. Do more research. And, you should use and cite outside sources for the Electronic Presentation.
(See page 15 for the Electronic Presentation on Black Culture Grading Rubric.) You wil.
You must complete an Electronic Presentation on Black Cu.docxdavezstarr61655
You must complete an Electronic Presentation on Black Culture. You will select and present on the significances of two works of black culture. The first work you select must be a work of African-American literature, poetry, music, fashion, dance, or some other cultural art form that was created and/or popularized by an
African American
during the time periods of the Harlem and Chicago Renaissances (1917-1949). Your second work of black culture must have been created and/or popularized by a black person (but not necessarily an African American) within YOUR lifetime. For example, if you were born in 1999, your second cultural selection needs to have been created by a black person between 1999 and the present. The two works you select to present do not have to share a cultural form (i.e. one work can be a poem and the other can be a song; one work can be a painting and the other can be a fashion trend). Nor do the two works have to share a particular theme. You may choose to do a compare-and-contrast type presentation. But, you do not have to. In presenting the works, you will need to provide background information on your chosen works (i.e. when where the works created; who created them or made them famous; and, what impact did the works have on the cultural landscape when and since they first appeared?). You will also have to briefly explain why you made those particular selections, and explain what you think each work tells people about the ways in which African-American/Black culture and experiences remained congruent and/or changed from the eras of the Harlem and Chicago Renaissances to the modern era. Moreover, your Electronic Presentation on Black Culture must be creative in both style and substance.
.
You must choose from the approved list below1. Angels .docxdavezstarr61655
You must choose from the approved list below:
1. Angels
2. Adoption
3. Christ
4. Conscience
5. Conversion
6. Covenants (Adam, Noah, Abraham, Moses, David, New)
7. Creation
8. Election
9. Eternal Life
10. Faith
11. Fall of Man
12. Forgiveness
13. Glory of God
14. Gospel
15. Gospels of Matthew, Mark, Luke John
16. Grace
17. Heart
18. Holiness
19. Holy Spirit
20. Hope
21. Image of God
22. Immanence
23. Judgment of God
24. Justice
25. Justification
26. Law
27. Love
28. Mercy
29. Millennium
30. Miracles
31. Names of God
32. Nature of God
33. Peace of God
34. Power of God
35. Prayer
36. Predestination
37. Preservation of Scripture
38. Prophecy
39. Reconciliation
40. Redemption
41. Reliability of Scripture
42. Repentance
43. Revelation
44. Righteousness
45. Sabbath
46. Salvation
47. Sanctification
48. Satan
49. Savior
50. Sin nature
51. Substitution
52. Temptation
53. Transcendence
54. Tribulation
55. Trinity
56. Union with Christ
57. Unity of God
58. Will/Plan of God
59. Wisdom
60. Works of the Holy Spirit
61. Worship
The paper must thoroughly address your chosen social problem, investigate possible solutions for the problem, incorporate five peer-reviewed resources and journal articles, and have a properly formatted reference page.
Papers will be between 6 to 8 pages in length. It is important to convey your subject and topic content concisely for your final assignment. Longer assignments have a tendency to veer off subject. It is important to clearly write about your topic. (An example of a research paper outline is included below which might be of interest to you).
Remember that you must discuss the roles that the church, the family, and the community should play in the solutions to the problem. Additionally, be sure to incorporate biblical support for the positions and opinions that you express.
Review the grading rubric to improve the quality of your paper. Your paper will be submitted through SafeAssign, a tool used to detect plagiarism.
An example of a research paper which you might use to guide you, using APA guidelines which can be reviewed through the Writing Center:
Title Page
The title page for a research paper can be reviewed through the Writing Center and if you have an APA Manual 6th ed. p. 41 includes an example.
Abstract
Double-spaced, flush left margin. An abstract is a brief, comprehensive summary of the contents of the article. An abstract reports rather than evaluates. Be brief, and make each sentence informative, especially the lead sentence. An abstract will be viewed alone on the page. An abstract will not include citations per APA guidelines.
Introduction
The body of a manuscript opens with an introduction that presents the specific problem being studied, and describes the research strategy. Although not mandatory, APA citations can be included in an introduction.
Headings will e.
You must be proficient in all MS office. I am looking for someon.docxdavezstarr61655
You must be proficient in all MS office.
I am looking for someone who can help with putting presentations together, also someone who knows and understands: spreadsheets, Pivot Tables, VLookups, etc.
If you are interested you can send me your interests to
(monroe simpson bpo at g mail dot com)
.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Assessment item 1 File Systems and Advanced Scripting .docx
1. Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage
the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts
which manage user information.
2. You are to prepare a simple shell script which reads a text file
called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive
input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to
randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and
GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated
password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/S
M/I/outline.html#contentPanel
3. You work for the Information Technology Department in your
University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the
ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS
volume.
All volumes including the operating system should be
engineered in such a way to ensure the
best data protection is afforded in the event of local disk
failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 200G.
3. uni2 with mount point /users/deleted& reservation of 100G.
4. uni3 with mount point /users/staff& reservation of 100G.
5. uni4 with mount point /users/guest & reservation of 250G.
Given the above your task is as follows define a strategy for
how you will ensure the volumes
outlined above are provisioned whilst ensuring there data
protection. Document this accordingly
4. along with a suitable rationale for your design.
Part 3: Implementing the Filesystem (4 marks)
Given the strategy defined in part two, your job is to implement
the storage system.
1. To do this install the latest version of Ubuntu Server on a
virtual machine. You will need to
ensure the networking is bridged and the root portioning is
managed appropriately. You will
need to add additional virtual disks to meet the storage needs
above.
2. Install the ZFS package and configure it such that pools of
storage are created to meet the above
requirements including redundancy and backups. To achieve
this use the mirroring and
snapshot features of ZFS.
Demonstrates your filesystem working and provide any insights
gained along the way.
Part 4: File System Management with Scripts (4 marks)
Now that you have a plan for the storage there are a few house
keeping matters to take care of
because users tend to be somewhat liberal with their storage.
1. Write a script to make sure that user home directories are
owned and only accessible by the
5. owner. The script can assume home directories are descendants
of /users.
2. Finally write a script which takes as an argument the
filesystem name e.g. /home and looks for
objects which do not belong i.e. end with the extension
a.mp3
b.aac
c.mp4
d..mov
e..avi
f..vid
When these files are found a summary should be produced
including where they are and
the size. The script should also remove the files.
Demonstrate each script working in your submission and
document the source code and any
insights gained along the way.
Rationale
back to top
6. This assessment task will assess the following learning
outcome/s:
management tasks.
rotecting data and services
accessed via the internet.
In this assignment you will develop simple scripts to manage
the user and file system whilst
developing some expertise in managing a complex file system.
Marking criteria and standards
back to top
Question Criteria HD DI CR PS FL
Part 1: Automated
Account
Management
Ability to learn
and use systems
administration
techniques.
8. Demonstrated working
automated account
management script
which meets all
functional requirements.
Reflect on your own
learning experience
providing evidence of
insight, drawing on
multiple sources to
develop understanding.
Demonstrated working
automated account
management script
which partially meets
functional
requirements.
Consider and reflect on
9. your own experience,
drawing on multiple
sources to develop
understanding.
Demonstrated
working automated
account management
script which meets
basic functional
requirements.
Consider and reflect
on your own
experience.
Major errors and
omissions.
Limited detail and
understanding
demonstrated.
10. Part 2: Design of
File System
Ability to learn
and use systems
administration
Documented file system
design which exceeds all
functional requirements.
Documented file system
design which meets all
functional requirements.
Documented file system
design which partially
meets all functional
Documented file system
design which meets
basic functional
12. knowledge drawing from
multiple sources.
Reflect on your own
learning experience
providing evidence of
insight, drawing on
multiple sources to
develop understanding.
requirements.
Consider and reflect on
your own experience,
drawing on multiple
sources to develop
understanding.
requirements.
Consider and reflect on
13. your own experience.
Limited detail and
understanding
demonstrated.
Part 3:
Implementation of
File System
Ability to learn
and use systems
administration
techniques.
Application of
technical
knowledge.
Explanation,
Evidence and
Referencing.
Implemented file system
14. which exceeds all functional
requirements.
Reflecting on your learning
experience, providing
evidence of insight and
commenting on the
acquisitions of new
knowledge drawing from
multiple sources.
Implemented file system
which meets all functional
requirements.
Reflect on your own
learning experience
providing evidence of
insight, drawing on
multiple sources to
15. develop understanding.
Implemented file system
which partially meets all
functional requirements.
Consider and reflect on
your own experience,
drawing on multiple
sources to develop
understanding.
Implemented file
system which meets
basic functional
requirements.
Consider and reflect on
your own experience.
Major errors and
omissions.
16. Limited detail and
understanding
demonstrated.
Part 4: File System
Management and
Scripts
Ability to learn
and use systems
administration
techniques.
Application of
technical
knowledge.
Explanation,
Evidence and
Referencing.
Demonstrated working file
17. system management scripts
which exceeds all functional
requirements.
Reflecting on your learning
experience, providing
evidence of insight and
commenting on the
acquisitions of new
knowledge drawing from
multiple sources.
Demonstrated working file
system management
scripts which meets all
functional requirements.
Reflect on your own
learning experience
providing evidence of
18. insight, drawing on
multiple sources to
develop understanding.
Demonstrated working
file system management
scripts which partially
meets all functional
requirements.
Consider and reflect on
your own experience,
drawing on multiple
sources to develop
understanding.
Demonstrated working
file systems
management scripts
which meets basic
functional
19. requirements.
Consider and reflect on
your own experience,
drawing on multiple
sources to develop
understanding.
Major errors and
omissions.
Limited detail and
understanding
demonstrated.
Limited detail and
understanding
demonstrated.
20. Presentation
back to top
You should submit your assessment in a single word document
which contains all components of
your assignment. Use screenshots to provide evidence and
details of the work you have done to
compliment your written answers. You should reference where
appropriate using an approve
referencing style to support your work.
https://outlines.csu.edu.au/delivery/published/ITC333/201860/S
M/I/outline.html#contentPanel