Hey there I want your help with this assignment
I want you to do me pre note for chapter 11 and 12
I want one page for each total two pages
I will attach a form for chapter one I want you to do like it.
Due within 15 hrs from now
...
What the mass media offers is not popular art, but entertainment wh.docxsorayan5ywschuit
“What the mass media offers is not popular art, but entertainment which is intended to be consumed like food, forgotten, and replaced by a new dish.” - W. H. Auden. Do agree with this idea, or do you give more credence to what you experience through mass media? Use personal examples as necessary.
.
What role does discrimination play in perpetuating the assessment of.docxsorayan5ywschuit
What role does discrimination play in perpetuating the assessment of AOD problems among diverse populations? 300 words
How does the issue of social justice influence the treatment of diverse groups with AOD abuse problems? 300 words
Given the view that Native Americans are engaged in the longest ongoing protest by drinking, what are your thoughts regarding the issue of responsibility? 300 words
.
What sorts of external trends should iRobot pay attention to Why .docxsorayan5ywschuit
What sorts of external trends should iRobot pay attention to? Why? Also, would they have been better off working with an established vacuum cleaner manufacturer? Why or why not? Support your opinions.
example:
iRobot and its product, Roomba, is an interesting case study. A few trends from the article resonate with me as important to iRobot to pay attention to. The article mentions the tolerance for consumer learning curve as needing to be low, or none. As a consumer product that is entirely new, Roomba had a high barrier to enter the market as it had to overcome consumer reaction to first purchasing a robot and also a device that would clean the home. The decision to make the device extremely simple was smart and it allowed people to become familiar to both elements. Thinking back 10 years, this product was initially purchased by baby-boomers and Gen-X who I would not consider technology-natives. Roomba now has a consumer recognition amongst millennials who just “get it” and as iRobot unveils new technology, the learning curve for the millennial consumer will continue to be low, despite it being much more complex than the first product. Another trend that is important to this product is integration with both mobile control and interaction with other home technologies. There are an increasing number of products that can be controlled by mobile phone such as thermostat, security systems, cable TV, etc., and this trend would be important for iRobot to capture in order to stay relevant. Additionally, iRobot and Roomba in specific would also be a stronger product if it interacted with other home technologies (both created by iRobot and otherwise). The article mentioned iRobot releasing home robots of varying kinds but no interaction between them as one portfolio.
As for the decision not work with existing vacuum cleaner manufactures, I agree with iRobot’s decision. The paragraph that mentions iRobot’s desire for consumers to know that a robot company made their vacuum rather than a company like Hoover making their vacuum, seems very important for long-term growth. iRobot would have a hard time attempting to enter the market with subsequent products (especially after Roomba’s success) if Roomba was called Hoover Robot, etc. The classification as a robot is important and this could not have been achieved by selling the patent to Electrolux or Hoover. The only disadvantage I could see is that a partnership with one of these companies would have accelerated their distribution incredibly. While they were able to secure floor demos at Sharper Image and Brookstone, a multi-billion-dollar company like Hoover might have been able to pressure companies like Target to follow suit. This would be much harder to accomplish as iRobot alone. In retrospect, I do not think they made a mistake by manufacturing, marketing, and distributing the product on their own.
.
What makes us unique as a speciesWhat hominid characteristic(s) a.docxsorayan5ywschuit
What makes us unique as a species?
What hominid characteristic(s) are discussed in the film?
According to the film, what is the benefit of bipedalism?
According to the film, how is hominid success explained?
What is the molecular clock?
What is the significance of running?
How is age determined on hominids?
According to the film, how/when did our hominid ancestors lose body hair? How do we know?
Part 1
http://www.pbs.org/wgbh/nova/evolution/becoming-human.html#becoming-human-part-1
Part 2
http://www.pbs.org/wgbh/nova/evolution/becoming-human.html#becoming-human-part-2
.
What role, if any, do you think juveniles play in the current negati.docxsorayan5ywschuit
What role, if any, do you think juveniles play in the current negative attitude towards law enforcement? i.e. Are our children being taught respect for authority? Does our culture promote violence towards authority and are our children adopting that attitude? Etc…
I dont think this needs a title page or anything like that basically like a discussion just maybe a little longer
.
What led to the creation of the Sarbanes-Oxley Act and when was it.docxsorayan5ywschuit
What led to the creation of the Sarbanes-Oxley Act and when was it passed?
2.
There are 11 separate titles. List them and briefly describe each.
3.
What is the Act's primary purpose?
4.
List a few things in the Act that are considered problematic and state what the problem is.
5.
Provide a list of at least three countries that have similar laws and note what their names are.
6.
Do you think the Act is meeting the goals established, e.g., will it be effective in avoiding future fraudulent actions? Provide an explanation for your decision.
.
What role do audiences play in creating popular culture Explain how.docxsorayan5ywschuit
What role do audiences play in creating popular culture? Explain how Hollywood both manipulated and reflected the popular culture of the 1950's and 60's. Analyze a popular film of the time. This paper should be 2-3 pages, in APA style, utilizing the college's library resources. One scholarly article as a minimum should be included in your essay.
due tomorrow at 8pm pacific standard time
.
What role do the gods play in the Illiad First, use passages from t.docxsorayan5ywschuit
What role do the gods play in the Illiad? First, use passages from the text to compare the character of different gods and illustrate their different actions in the story. Then use passages from the text to support answers to the following questions: Do the gods know ahead of time what will happen to the human characters in the story? Can they intervene to change what they have foreseen or what fate has determined will happen? How powerful are the gods? To what extent are the gods responsible for what happens to the human characters?
.
What the mass media offers is not popular art, but entertainment wh.docxsorayan5ywschuit
“What the mass media offers is not popular art, but entertainment which is intended to be consumed like food, forgotten, and replaced by a new dish.” - W. H. Auden. Do agree with this idea, or do you give more credence to what you experience through mass media? Use personal examples as necessary.
.
What role does discrimination play in perpetuating the assessment of.docxsorayan5ywschuit
What role does discrimination play in perpetuating the assessment of AOD problems among diverse populations? 300 words
How does the issue of social justice influence the treatment of diverse groups with AOD abuse problems? 300 words
Given the view that Native Americans are engaged in the longest ongoing protest by drinking, what are your thoughts regarding the issue of responsibility? 300 words
.
What sorts of external trends should iRobot pay attention to Why .docxsorayan5ywschuit
What sorts of external trends should iRobot pay attention to? Why? Also, would they have been better off working with an established vacuum cleaner manufacturer? Why or why not? Support your opinions.
example:
iRobot and its product, Roomba, is an interesting case study. A few trends from the article resonate with me as important to iRobot to pay attention to. The article mentions the tolerance for consumer learning curve as needing to be low, or none. As a consumer product that is entirely new, Roomba had a high barrier to enter the market as it had to overcome consumer reaction to first purchasing a robot and also a device that would clean the home. The decision to make the device extremely simple was smart and it allowed people to become familiar to both elements. Thinking back 10 years, this product was initially purchased by baby-boomers and Gen-X who I would not consider technology-natives. Roomba now has a consumer recognition amongst millennials who just “get it” and as iRobot unveils new technology, the learning curve for the millennial consumer will continue to be low, despite it being much more complex than the first product. Another trend that is important to this product is integration with both mobile control and interaction with other home technologies. There are an increasing number of products that can be controlled by mobile phone such as thermostat, security systems, cable TV, etc., and this trend would be important for iRobot to capture in order to stay relevant. Additionally, iRobot and Roomba in specific would also be a stronger product if it interacted with other home technologies (both created by iRobot and otherwise). The article mentioned iRobot releasing home robots of varying kinds but no interaction between them as one portfolio.
As for the decision not work with existing vacuum cleaner manufactures, I agree with iRobot’s decision. The paragraph that mentions iRobot’s desire for consumers to know that a robot company made their vacuum rather than a company like Hoover making their vacuum, seems very important for long-term growth. iRobot would have a hard time attempting to enter the market with subsequent products (especially after Roomba’s success) if Roomba was called Hoover Robot, etc. The classification as a robot is important and this could not have been achieved by selling the patent to Electrolux or Hoover. The only disadvantage I could see is that a partnership with one of these companies would have accelerated their distribution incredibly. While they were able to secure floor demos at Sharper Image and Brookstone, a multi-billion-dollar company like Hoover might have been able to pressure companies like Target to follow suit. This would be much harder to accomplish as iRobot alone. In retrospect, I do not think they made a mistake by manufacturing, marketing, and distributing the product on their own.
.
What makes us unique as a speciesWhat hominid characteristic(s) a.docxsorayan5ywschuit
What makes us unique as a species?
What hominid characteristic(s) are discussed in the film?
According to the film, what is the benefit of bipedalism?
According to the film, how is hominid success explained?
What is the molecular clock?
What is the significance of running?
How is age determined on hominids?
According to the film, how/when did our hominid ancestors lose body hair? How do we know?
Part 1
http://www.pbs.org/wgbh/nova/evolution/becoming-human.html#becoming-human-part-1
Part 2
http://www.pbs.org/wgbh/nova/evolution/becoming-human.html#becoming-human-part-2
.
What role, if any, do you think juveniles play in the current negati.docxsorayan5ywschuit
What role, if any, do you think juveniles play in the current negative attitude towards law enforcement? i.e. Are our children being taught respect for authority? Does our culture promote violence towards authority and are our children adopting that attitude? Etc…
I dont think this needs a title page or anything like that basically like a discussion just maybe a little longer
.
What led to the creation of the Sarbanes-Oxley Act and when was it.docxsorayan5ywschuit
What led to the creation of the Sarbanes-Oxley Act and when was it passed?
2.
There are 11 separate titles. List them and briefly describe each.
3.
What is the Act's primary purpose?
4.
List a few things in the Act that are considered problematic and state what the problem is.
5.
Provide a list of at least three countries that have similar laws and note what their names are.
6.
Do you think the Act is meeting the goals established, e.g., will it be effective in avoiding future fraudulent actions? Provide an explanation for your decision.
.
What role do audiences play in creating popular culture Explain how.docxsorayan5ywschuit
What role do audiences play in creating popular culture? Explain how Hollywood both manipulated and reflected the popular culture of the 1950's and 60's. Analyze a popular film of the time. This paper should be 2-3 pages, in APA style, utilizing the college's library resources. One scholarly article as a minimum should be included in your essay.
due tomorrow at 8pm pacific standard time
.
What role do the gods play in the Illiad First, use passages from t.docxsorayan5ywschuit
What role do the gods play in the Illiad? First, use passages from the text to compare the character of different gods and illustrate their different actions in the story. Then use passages from the text to support answers to the following questions: Do the gods know ahead of time what will happen to the human characters in the story? Can they intervene to change what they have foreseen or what fate has determined will happen? How powerful are the gods? To what extent are the gods responsible for what happens to the human characters?
.
What is your relationship to writing Discuss something about writin.docxsorayan5ywschuit
What is your relationship to writing? Discuss something about writing that has you confused or that you don't like. It can be how to get started, using commas, complete sentences, spelling...anything that contributes to your struggle or anxiety about writing. What do you hope to achieve in this class?
(one paragraph)
.
What reasons are given for the enduring popularity of Edward Hopper.docxsorayan5ywschuit
What reasons are given for the enduring popularity of Edward Hopper? Do you think that the themes of loneliness, separation and the disillusionment with materialism continue to be prevailing characteristics of modern American life?
How would you describe the relationship between architecture, industry, and technology? How do you think this relationship makes architecture different from other arts, such as painting or sculpture?
.
What methods, specifically, have citizens utilized to influenc.docxsorayan5ywschuit
What methods, specifically, have citizens utilized to influence and become involved in the budgeting and financial management arenas in the public sphere? Which movements or strategies have been most successful from a citizen perspective? To what degree do budgeting professionals and public administrators seek and consider this citizen involvement? What will be the trend for the future with regard to citizen participation in the process?
250 word response. APA format, 2 references
.
What is your position on the debate about national ID cards Autho.docxsorayan5ywschuit
What is your position on the debate about national ID cards? Authors Ehrenhalt and Dority both make compelling cases for and against the use of such cards, and for the most part, their debates are grounded in questions of privacy for American citizens. What is privacy? What does it mean to have privacy? Ehrenhalt writes in 1999, and Dority writes in 2002. How might these two author’s change their arguments based on the kinds of technology that we have today—smart phones, GPS trackers, spyware, and more. Is privacy achievable in our advanced state of technological development? Would national ID cards really make a difference in privacy one way or another? (125 Words)
.
What problems arise when a species is introduced from a foreign ecos.docxsorayan5ywschuit
A species introduced to a new environment from a foreign ecosystem can cause problems if it adapts well and has no natural predators or competition in its new home, allowing it to overpopulate and disrupt the existing ecosystem. Factors like climate similarities, availability of resources and lack of diseases or predators will determine if an introduced species can survive and thrive in its new environment. An introduced species may eventually evolve into a new species through genetic changes over many generations as it adapts to its new environment.
What is your favorite ad that you have ever seen Please describe.docxsorayan5ywschuit
The document asks the reader to describe their favorite advertisement by answering questions about the product advertised, the storyline and plot of the ad, where the ad was shown, and reasons why the ad was effective or entertaining.
What methodologies have been used for data breachesDifferent type.docxsorayan5ywschuit
What methodologies have been used for data breaches?
Different types of attacks ? comparision on attacks how did they happen and how did attackers entered into the system? what are the different companies that have been attacked by these attacks?
how much did they gain or company lost? how did they found out attacks are done?
.
What kinds of cultural changes will hospitals have to make in order .docxsorayan5ywschuit
What kinds of cultural changes will hospitals have to make in order to adapt to the changing health care environment? How can these changes be achieved most efficiently?
What steps are required to change a dysfunctional culture?
Your paper should be in APA format and cite all references used. Submit to the Seminar Dropbox
.
What kind of research might have helped MySpace continue to compete .docxsorayan5ywschuit
What kind of research might have helped MySpace continue to compete after Facebook started taking over? What sorts of external factors might they have looked at? Support your response and be sure to discuss with others.
As a second question to discuss, should DeWolfe and Anderson have given up so much equity (66%) in the beginning to eUniverse? What were the pros and cons of this? Was there an alternative strategy available? If so, what was it? Support your response.
.
What is validating form data and explain the issue with the isset fu.docxsorayan5ywschuit
What is validating form data and explain the issue with the isset function (Chapter 2)?
Give the syntax for: (a) inserting a record in a table (b) updating a record in a table (Chapter 5).
Explain the use of hidden form inputs (Chapter 10).
What information is stored on the user's machine using cookies and how they are set (Chapter 12)?
.
What is your definition of Social JusticeAfter reviewing another .docxsorayan5ywschuit
What is your definition of Social Justice?
After reviewing another discussion/definition of social justice, up to this point, in your collegiate sojourn at Roosevelt, is your point of view regarding Social Justice clearer or more obfuscated?
What does Social Justice mean to you?
In your opinion, can or does any institution of higher learning (university or college) give a (or any) Social Justice paradigm consistent with your definition of social justice?
give a title to your thread
One to two pages
.
What is the watering hole techniqueThe term watering hole” refer.docxsorayan5ywschuit
What is the watering hole technique?
The term “watering hole” refers to initiating an attack against targeted businesses and organizations. In a watering hole attack scenario, threat actors compromise a carefully selected website by inserting an exploit resulting in malware infection.
How does a watering hole technique work?
A watering hole attack typically works this way:
Attackers gather strategic information that they can use to gain entry into their targeted organization. This step can be compared to a military reconnaissance mission. The information gathered may include insights on trusted websites often visited by the employees or members of their targeted entity. The process of selecting websites to compromise was initially dubbed “strategic web compromises.”
Attackers insert an exploit into the selected sites.
Once targeted victims visit the compromised site, the exploit takes advantage of software vulnerabilities, either old or new, to drop malware. The dropped malware may be in the form of a remote access Trojan (RAT), which allows attackers to access sensitive data and take control of the vulnerable system.
Where is this attack technique used?
Watering hole attacks were previously documented in several high-profile cases which include:
VOHO. In mid-2012 RSA identified a campaign known as VOHO, which was aimed at a particular group of organizations, specifically those involved with business and local government agencies in certain geographic areas. The attackers compromised carefully selected sites by inserting malicious JavaScript to deliver a Gh0st RAT variant. Gh0st RATs were previously seen in other attacks that targeted civic organizations and diplomatic entities worldwide.
Attack on high-profile groups. Just before the end of 2012, the Council on Foreign Relations (CFR) website was compromised to host a zero-day exploit in Internet Explorer. Those who visited the site were served with a backdoor malware. Microsoft addressed this vulnerability though the Microsoft Security Bulletin MS13-008.
Why is it effective?
Attackers incorporate strategies to circumvent the targeted organizations’ defenses in order for watering hole attacks to be effective. These may come in the form of outdated systems or simply human error.
In watering hole attacks, the goal is not to serve malware to as many systems possible. Instead, the attackers run exploits on well-known and trusted sites likely to be visited by their targeted victims. This makes the watering hole technique effective in delivering its intended payload.
Aside from carefully choosing sites to compromise, watering hole attacks are known to incorporate zero-day exploits that target unpatched vulnerabilities. Thus, the targeted entities are left with little or no defense against these exploits.
This doesn’t mean that attackers don’t target patched system vulnerabilities. Because of patch management difficulties in an enterprise setting, IT administrators may delay deploying critical upda.
What is the purpose of theory and how does this differ from a conjec.docxsorayan5ywschuit
What is the purpose of theory and how does this differ from a conjecture or opinion? Compare scientific inquiry with naive inquiry (conjecture or opinion) commenting particularly on the differences in the quality of data collection and analysis, the way conclusions are drawn, and the precision of theory. Be sure to draw upon the assigned readings and other authoritative sources in providing support for your response, and to adhere to APA format in your post.
.
what is the major take-away from the Hansz etal paper on green issue.docxsorayan5ywschuit
what is the major take-away from the Hansz etal paper on green issues. Again, do not get caught up in the math.
What is the practice evidence/application?
Is there a difference with commerical properties?
Submission form:
1. Basic outline/purpose of article
2. Findings
3. Limit
4. Application
.
What is the foundation of American Indian ReligionIndigenous Spirit.docxsorayan5ywschuit
What is the foundation of American Indian Religion/Indigenous Spirituality according to your text and video programs. What is consider sacred in Indian Country. Support your answer with example from the text and videos in this week's material.
10 minute vid to watch first:
https://youtu.be/YI3yIjHiPl0
.
What is the cornerstone of the American criminal justice system1..docxsorayan5ywschuit
What is the cornerstone of the American criminal justice system?
1. Constitutional rights – due process
2. The assumption that “one is presumed innocent until proven guilty”
3. The burden of proof rests with the state/government
4. Why so many safeguards for the accused?
5. Are we ignoring the victim?
6. What should we do for the victim?
7. How should the system be re-designed so as to provide fair treatment for all concerned?
Please address 1-7 in a 2-3 page paper incorporating all that you have learned up to this point in CJ.
.
What is Sickle Cell AnemiaRed blood cells with normal hemoglobin .docxsorayan5ywschuit
What is Sickle Cell Anemia?
Red blood cells with normal hemoglobin (HbA) move easily through the bloodstream, delivering oxygen to all of the cells of the body. Normal red blood cells are shaped like jelly- filled doughnuts with a depression in the center and they are soft and flexible. Sickle cell anemia occurs when an abnormal form of hemoglobin (HbS) is produced. HbS molecules tend to clump together, making red blood cells sticky, stiff, and more fragile. Red blood cells containing HbS can clog blood vessels, deprive the body’s tissues and organs of the oxygen they need, and are short-lived. Normal red blood cells last about 4 months in the bloodstream but sickle cells only last 10 to 20 days, which causes anemia (a low number of red blood cells). People who are anemic tire more easily and often feel weak (NIH, 2007).
Sickle cell anemia is not contagious and cannot be passed from one person to another like a cold or other infection. People with sickle cell anemia have inherited two sickle cell alleles, one from each parent. A child who has inherited the sickle cell allele from only one parent will not develop the disease, but they do carry the sickle cell trait. People carrying a single sickle cell allele can pass the trait to their own children.
One would think that there is little reason for sickle cell disease to remain in the any human population since natural selection should favor reduction of the frequency of the sickle cell allele to near zero. For example, individuals who carry two copies of the sickle cell allele typically die before reaching reproductive age, which will reduce the frequency of the allele in a population and minimize its transfer between generations. Why does the disease exist at all? An understanding of the origin of sickle cell disease and several other red blood cell disorders requires knowledge of a few of the basics about genetics and something about the process of natural selection. There is also another piece of the puzzle: malaria.
Malaria
The plasmodium parasite that causes malaria in humans is transmitted by mosquitos and the parasite spends part of their life cycle in mosquitos and part of it in human hosts. The parasite enters the human bloodstream via the saliva of an infected female mosquito obtaining a blood meal. Once in the blood stream and liver the parasites replicate to the point that the liver cells are filled with new copies of the parasite. These are then released into the bloodstream where they invade circulating red blood cells. After penetrating the red blood cells, the parasites consume hemoglobin in the red blood cells and enlarge until they fill the cell completely. During their growth these plasmodia particles reproduce forcing red blood cells to lyse (break apart) releasing new copies into the blood stream where they continue to infect new red blood cells. A mosquito taking a blood meal from a person whose red cells contain malaria-causing parasites then becomes a host furthering th.
What is primary memory What are the characteristics of primary mem.docxsorayan5ywschuit
What is primary memory? What are the characteristics of primary memory?
What is the process of memory from perception to retrieval? What happens when the process is compromised?
Is it possible for memory retrieval to be unreliable? Why or why not? What factors may affect the reliability of one’s memory?
.
What is Plot Prep Scholar offers this interesting article on the .docxsorayan5ywschuit
What is Plot? Prep Scholar offers this interesting article on the components of a Plot. You will need to be familiar with plot points to complete your Unit 1 Literary Response
Muniz, H. (2019, Dec. 3). What is the plot of a story. The five points of a narrative.
Prep Scholar.
.
What is the IPAT formula, and what do each of its variables mean Do.docxsorayan5ywschuit
What is the IPAT formula, and what do each of its variables mean? Do you think it is realistic to think that Americans could get their environmental impact close to that of a person living in an undeveloped country by using renewable resources and environmentally friendly technology? Why, or why not?
Your response must be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Cunningham, W. P., & Cunningham, M. A. (2011). Principles of environmental science inquiry and applications (6th ed.). New York, NY: McGraw-Hill.
.
What is your relationship to writing Discuss something about writin.docxsorayan5ywschuit
What is your relationship to writing? Discuss something about writing that has you confused or that you don't like. It can be how to get started, using commas, complete sentences, spelling...anything that contributes to your struggle or anxiety about writing. What do you hope to achieve in this class?
(one paragraph)
.
What reasons are given for the enduring popularity of Edward Hopper.docxsorayan5ywschuit
What reasons are given for the enduring popularity of Edward Hopper? Do you think that the themes of loneliness, separation and the disillusionment with materialism continue to be prevailing characteristics of modern American life?
How would you describe the relationship between architecture, industry, and technology? How do you think this relationship makes architecture different from other arts, such as painting or sculpture?
.
What methods, specifically, have citizens utilized to influenc.docxsorayan5ywschuit
What methods, specifically, have citizens utilized to influence and become involved in the budgeting and financial management arenas in the public sphere? Which movements or strategies have been most successful from a citizen perspective? To what degree do budgeting professionals and public administrators seek and consider this citizen involvement? What will be the trend for the future with regard to citizen participation in the process?
250 word response. APA format, 2 references
.
What is your position on the debate about national ID cards Autho.docxsorayan5ywschuit
What is your position on the debate about national ID cards? Authors Ehrenhalt and Dority both make compelling cases for and against the use of such cards, and for the most part, their debates are grounded in questions of privacy for American citizens. What is privacy? What does it mean to have privacy? Ehrenhalt writes in 1999, and Dority writes in 2002. How might these two author’s change their arguments based on the kinds of technology that we have today—smart phones, GPS trackers, spyware, and more. Is privacy achievable in our advanced state of technological development? Would national ID cards really make a difference in privacy one way or another? (125 Words)
.
What problems arise when a species is introduced from a foreign ecos.docxsorayan5ywschuit
A species introduced to a new environment from a foreign ecosystem can cause problems if it adapts well and has no natural predators or competition in its new home, allowing it to overpopulate and disrupt the existing ecosystem. Factors like climate similarities, availability of resources and lack of diseases or predators will determine if an introduced species can survive and thrive in its new environment. An introduced species may eventually evolve into a new species through genetic changes over many generations as it adapts to its new environment.
What is your favorite ad that you have ever seen Please describe.docxsorayan5ywschuit
The document asks the reader to describe their favorite advertisement by answering questions about the product advertised, the storyline and plot of the ad, where the ad was shown, and reasons why the ad was effective or entertaining.
What methodologies have been used for data breachesDifferent type.docxsorayan5ywschuit
What methodologies have been used for data breaches?
Different types of attacks ? comparision on attacks how did they happen and how did attackers entered into the system? what are the different companies that have been attacked by these attacks?
how much did they gain or company lost? how did they found out attacks are done?
.
What kinds of cultural changes will hospitals have to make in order .docxsorayan5ywschuit
What kinds of cultural changes will hospitals have to make in order to adapt to the changing health care environment? How can these changes be achieved most efficiently?
What steps are required to change a dysfunctional culture?
Your paper should be in APA format and cite all references used. Submit to the Seminar Dropbox
.
What kind of research might have helped MySpace continue to compete .docxsorayan5ywschuit
What kind of research might have helped MySpace continue to compete after Facebook started taking over? What sorts of external factors might they have looked at? Support your response and be sure to discuss with others.
As a second question to discuss, should DeWolfe and Anderson have given up so much equity (66%) in the beginning to eUniverse? What were the pros and cons of this? Was there an alternative strategy available? If so, what was it? Support your response.
.
What is validating form data and explain the issue with the isset fu.docxsorayan5ywschuit
What is validating form data and explain the issue with the isset function (Chapter 2)?
Give the syntax for: (a) inserting a record in a table (b) updating a record in a table (Chapter 5).
Explain the use of hidden form inputs (Chapter 10).
What information is stored on the user's machine using cookies and how they are set (Chapter 12)?
.
What is your definition of Social JusticeAfter reviewing another .docxsorayan5ywschuit
What is your definition of Social Justice?
After reviewing another discussion/definition of social justice, up to this point, in your collegiate sojourn at Roosevelt, is your point of view regarding Social Justice clearer or more obfuscated?
What does Social Justice mean to you?
In your opinion, can or does any institution of higher learning (university or college) give a (or any) Social Justice paradigm consistent with your definition of social justice?
give a title to your thread
One to two pages
.
What is the watering hole techniqueThe term watering hole” refer.docxsorayan5ywschuit
What is the watering hole technique?
The term “watering hole” refers to initiating an attack against targeted businesses and organizations. In a watering hole attack scenario, threat actors compromise a carefully selected website by inserting an exploit resulting in malware infection.
How does a watering hole technique work?
A watering hole attack typically works this way:
Attackers gather strategic information that they can use to gain entry into their targeted organization. This step can be compared to a military reconnaissance mission. The information gathered may include insights on trusted websites often visited by the employees or members of their targeted entity. The process of selecting websites to compromise was initially dubbed “strategic web compromises.”
Attackers insert an exploit into the selected sites.
Once targeted victims visit the compromised site, the exploit takes advantage of software vulnerabilities, either old or new, to drop malware. The dropped malware may be in the form of a remote access Trojan (RAT), which allows attackers to access sensitive data and take control of the vulnerable system.
Where is this attack technique used?
Watering hole attacks were previously documented in several high-profile cases which include:
VOHO. In mid-2012 RSA identified a campaign known as VOHO, which was aimed at a particular group of organizations, specifically those involved with business and local government agencies in certain geographic areas. The attackers compromised carefully selected sites by inserting malicious JavaScript to deliver a Gh0st RAT variant. Gh0st RATs were previously seen in other attacks that targeted civic organizations and diplomatic entities worldwide.
Attack on high-profile groups. Just before the end of 2012, the Council on Foreign Relations (CFR) website was compromised to host a zero-day exploit in Internet Explorer. Those who visited the site were served with a backdoor malware. Microsoft addressed this vulnerability though the Microsoft Security Bulletin MS13-008.
Why is it effective?
Attackers incorporate strategies to circumvent the targeted organizations’ defenses in order for watering hole attacks to be effective. These may come in the form of outdated systems or simply human error.
In watering hole attacks, the goal is not to serve malware to as many systems possible. Instead, the attackers run exploits on well-known and trusted sites likely to be visited by their targeted victims. This makes the watering hole technique effective in delivering its intended payload.
Aside from carefully choosing sites to compromise, watering hole attacks are known to incorporate zero-day exploits that target unpatched vulnerabilities. Thus, the targeted entities are left with little or no defense against these exploits.
This doesn’t mean that attackers don’t target patched system vulnerabilities. Because of patch management difficulties in an enterprise setting, IT administrators may delay deploying critical upda.
What is the purpose of theory and how does this differ from a conjec.docxsorayan5ywschuit
What is the purpose of theory and how does this differ from a conjecture or opinion? Compare scientific inquiry with naive inquiry (conjecture or opinion) commenting particularly on the differences in the quality of data collection and analysis, the way conclusions are drawn, and the precision of theory. Be sure to draw upon the assigned readings and other authoritative sources in providing support for your response, and to adhere to APA format in your post.
.
what is the major take-away from the Hansz etal paper on green issue.docxsorayan5ywschuit
what is the major take-away from the Hansz etal paper on green issues. Again, do not get caught up in the math.
What is the practice evidence/application?
Is there a difference with commerical properties?
Submission form:
1. Basic outline/purpose of article
2. Findings
3. Limit
4. Application
.
What is the foundation of American Indian ReligionIndigenous Spirit.docxsorayan5ywschuit
What is the foundation of American Indian Religion/Indigenous Spirituality according to your text and video programs. What is consider sacred in Indian Country. Support your answer with example from the text and videos in this week's material.
10 minute vid to watch first:
https://youtu.be/YI3yIjHiPl0
.
What is the cornerstone of the American criminal justice system1..docxsorayan5ywschuit
What is the cornerstone of the American criminal justice system?
1. Constitutional rights – due process
2. The assumption that “one is presumed innocent until proven guilty”
3. The burden of proof rests with the state/government
4. Why so many safeguards for the accused?
5. Are we ignoring the victim?
6. What should we do for the victim?
7. How should the system be re-designed so as to provide fair treatment for all concerned?
Please address 1-7 in a 2-3 page paper incorporating all that you have learned up to this point in CJ.
.
What is Sickle Cell AnemiaRed blood cells with normal hemoglobin .docxsorayan5ywschuit
What is Sickle Cell Anemia?
Red blood cells with normal hemoglobin (HbA) move easily through the bloodstream, delivering oxygen to all of the cells of the body. Normal red blood cells are shaped like jelly- filled doughnuts with a depression in the center and they are soft and flexible. Sickle cell anemia occurs when an abnormal form of hemoglobin (HbS) is produced. HbS molecules tend to clump together, making red blood cells sticky, stiff, and more fragile. Red blood cells containing HbS can clog blood vessels, deprive the body’s tissues and organs of the oxygen they need, and are short-lived. Normal red blood cells last about 4 months in the bloodstream but sickle cells only last 10 to 20 days, which causes anemia (a low number of red blood cells). People who are anemic tire more easily and often feel weak (NIH, 2007).
Sickle cell anemia is not contagious and cannot be passed from one person to another like a cold or other infection. People with sickle cell anemia have inherited two sickle cell alleles, one from each parent. A child who has inherited the sickle cell allele from only one parent will not develop the disease, but they do carry the sickle cell trait. People carrying a single sickle cell allele can pass the trait to their own children.
One would think that there is little reason for sickle cell disease to remain in the any human population since natural selection should favor reduction of the frequency of the sickle cell allele to near zero. For example, individuals who carry two copies of the sickle cell allele typically die before reaching reproductive age, which will reduce the frequency of the allele in a population and minimize its transfer between generations. Why does the disease exist at all? An understanding of the origin of sickle cell disease and several other red blood cell disorders requires knowledge of a few of the basics about genetics and something about the process of natural selection. There is also another piece of the puzzle: malaria.
Malaria
The plasmodium parasite that causes malaria in humans is transmitted by mosquitos and the parasite spends part of their life cycle in mosquitos and part of it in human hosts. The parasite enters the human bloodstream via the saliva of an infected female mosquito obtaining a blood meal. Once in the blood stream and liver the parasites replicate to the point that the liver cells are filled with new copies of the parasite. These are then released into the bloodstream where they invade circulating red blood cells. After penetrating the red blood cells, the parasites consume hemoglobin in the red blood cells and enlarge until they fill the cell completely. During their growth these plasmodia particles reproduce forcing red blood cells to lyse (break apart) releasing new copies into the blood stream where they continue to infect new red blood cells. A mosquito taking a blood meal from a person whose red cells contain malaria-causing parasites then becomes a host furthering th.
What is primary memory What are the characteristics of primary mem.docxsorayan5ywschuit
What is primary memory? What are the characteristics of primary memory?
What is the process of memory from perception to retrieval? What happens when the process is compromised?
Is it possible for memory retrieval to be unreliable? Why or why not? What factors may affect the reliability of one’s memory?
.
What is Plot Prep Scholar offers this interesting article on the .docxsorayan5ywschuit
What is Plot? Prep Scholar offers this interesting article on the components of a Plot. You will need to be familiar with plot points to complete your Unit 1 Literary Response
Muniz, H. (2019, Dec. 3). What is the plot of a story. The five points of a narrative.
Prep Scholar.
.
What is the IPAT formula, and what do each of its variables mean Do.docxsorayan5ywschuit
What is the IPAT formula, and what do each of its variables mean? Do you think it is realistic to think that Americans could get their environmental impact close to that of a person living in an undeveloped country by using renewable resources and environmentally friendly technology? Why, or why not?
Your response must be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Cunningham, W. P., & Cunningham, M. A. (2011). Principles of environmental science inquiry and applications (6th ed.). New York, NY: McGraw-Hill.
.
What is the IPAT formula, and what do each of its variables mean Do.docx
Hey there I want your help with this assignment I want you t
1. Hey there I want your help with this assignment
I want you to do me pre note for chapter 11 and 12
I want one page for each total two pages
I will attach a form for chapter one I want you to do like it.
Due within 15 hrs from now