RESEARCHED ARGUMENT ESSAY GUIDELINES
(Based on Tom Regan’s “The Case for Animal Rights” in the course text,
“The Norton Reader”. Argue for or against the essay and/or the issue
presented in the essay using the essay/text as the main source.
Strategies of Argument:
-Explore a question. (Many arguments develop from problems that puzzle.)
-Make a claim. (Some arguments may begin with opinions that can be supported
with good reasons and convincing evidence.)
“Any claim should be followed by its proof.” –Aristotle
Presenting Evidence:
-Recognize reliable sources* of information-MINIMUM of (2) sources; including
the text.
-Provide evidence for all your claims
*use .gov (government sites) .org (non-profit sites) and/or .edu
(educational sites) for reliable sources. (.com could be anyone) NO WIKIPEDIA!
Reasons for Argument:
-Argue for the greater good; lesser evil
-Fairness and Equality
-Long-term or short-term good
-Benefit for greater numbers
-For or against self-interest
-Feasibility
SAMPLE OUTLINES:
1. Intro: Statement of Claim
Reason #1 and supporting evidence
Reason #2 and supporting evidence…
Conclusion
OR
2. Intro: Statement of Claim
Reason #1 and supporting evidence
-deal with objections
Reason #2 and supporting evidence
-deal with objections…
Conclusion
Sample Outlines, con’t…
OR
3. Intro: The Problem
-previous attempts to solve it
-why previous attempts failed
New
Solution
:
-advantages of the proposal
-Feasibility
-Implementation
Conclusion
TIPS:
-Handle information honestly, quote fairly from your sources, anticipate
objections, argue civilly, be credible, and use emotional appeals sparingly
-Remember to stay away from using the first person “I”; this weakens the points you
are trying to make.
-Share background information about the author either in the introduction or second
paragraph. This will answer the reader’s question “Why should I, or shouldn’t I, listen to
this author?!”
FORMAT:
-see syllabus for guidelines
MUST HAVE A WORKS CITED PAGE OR CONSIDERED PLAGAIRISM!
(Use MLA or APA format for works cited page and documentation within the text)
1. This is a "real" test, which means you must do your own work. It's an open book test, so you can
use any resources such as books, your notes, or the computer. However, you must do your own
work. This means that you must not ask other students, instructors, acquaintances, paid
consultants, Facebook friends, etc. for help. Any violations of the CBC Academic Honesty Policy
will result in a failing grade for the course.
If you use any Internet resources, make sure that you do NOT copy and paste information. You
can use the Internet, but you must put all answers in your own words. You will receive no credit
for any answers with copied material.
The test must be completed and turned in by 11:59 on the due date to receive full credit. Late
tests will be accepted, but will lose 10% of.
1. This is a real test, which means you must do your own w.docxjackiewalcutt
1. This is a "real" test, which means you must do your own work. It's an open book test, so you can
use any resources such as books, your notes, or the computer. However, you must do your own
work. This means that you must not ask other students, instructors, acquaintances, paid
consultants, Facebook friends, etc. for help. Any violations of the CBC Academic Honesty Policy
will result in a failing grade for the course.
If you use any Internet resources, make sure that you do NOT copy and paste information. You
can use the Internet, but you must put all answers in your own words. You will receive no credit
for any answers with copied material.
The test must be completed and turned in by 11:59 on the due date to receive full credit. Late
tests will be accepted, but will lose 10% of the possible points for each day they are late.
I have read and understand the test policies.
2. Assume that you are hired as the Network Administrator for a small company. The 4 current
employees have 3 Windows computers and 1 Mac computer. However, the business is growing
and hiring 10 more employees. The business owner wants to set up file and print sharing for the
employees, and set up a web server to sell their products on the Internet. Would you suggest
implementing a Windows based network server or a UNIX/Linux based network server? Of
course you must explain your suggestion if you want to receive full points for this question.
3. It would be difficult for a user to tell the difference between a UNIX server and a Linux server if
all they were doing was typing commands.
True
False
4. True or False. The Courts in the United States have determined that UNIX and Linux are the
same thing as far as Intellectual Property rights are concerned.
5. When you connect to the UNIX server and run a UNIX command such as ls, where does the code
for the ls command run, on your PC, or on the UNIX server?
A. UNIX Server
B. PC
6. DOS has a tree structured file system for every logical disk. What is the maximum number of
tree structures or top level directories in the UNIX file system ?
A. 1
B. 1 for every physical drive
C. 1 for every drive partition or physical drive
D. 1 per device (drive, optical disk, thumb drive etc.)
7. What key(s) or character(s) do you have to use to get out of the man page utility?
A. exit
B. x
C. q
D. Q
8. What will be returned if you type: apropos delete user
A. Every man page that has the word delete OR the word user
B. Every man page that has the words delete AND user. Either word can be anywhere on the line.
C. Every man page that has the exact phrase "delete user". The words must be in that order, with
just one space between them.
D. A portal to another dimension will open
9. What would you type to see all the files in the current directory?
10. Assume you are in your home directory. What UNIX command do you use to see a listing of all
the files in the directory /usr/lib ...
2. Assume that you are hired as the Network Administrator for a smal.docxstandfordabbot
2. Assume that you are hired as the Network Administrator for a small company. The 4 current employees have 3 Windows computers and 1 Mac computer. However, the business is growing and hiring 10 more employees. The business owner wants to set up file and print sharing for the employees, and set up a web server to sell their products on the Internet. Would you suggest implementing a Windows based network server or a UNIX/Linux based network server? Of course you must explain your suggestion if you want to receive full points for this question.
3. It would be difficult for a user to tell the difference between a UNIX server and a Linux server if all they were doing was typing commands.
True
False
4. True or False. The Courts in the United States have determined that UNIX and Linux are the same thing as far as Intellectual Property rights are concerned.
5. When you connect to the UNIX server and run a UNIX command such as ls, where does the code
for the ls command run, on your PC, or on the UNIX server? A. UNIX Server B. PC
6. DOS has a tree structured file system for every logical disk. What is the maximum number of
tree structures or top level directories in the UNIX file system ? A. 1 B. 1 for every physical drive C. 1 for every drive partition or physical drive D. 1 per device (drive, optical disk, thumb drive etc.)
7. What key(s) or character(s) do you have to use to get out of the man page utility? A. exit B. x C. q D. Q
8. What will be returned if you type: apropos delete user A. Every man page that has the word delete OR the word user B. Every man page that has the words delete AND user. Either word can be anywhere on the line. C. Every man page that has the exact phrase "delete user". The words must be in that order, with
just one space between them. D. A portal to another dimension will open
9. What would you type to see all the files in the current directory?
10. Assume you are in your home directory. What UNIX command do you use to see a listing of all the files in the directory /usr/lib ?
11. While a directory may seem empty because it doesn't contain any files or sub-directories, you will always see two items if you use the command to see all files. What are the names of these two items, and what are they?
12. What you would type on the command line to move to the directory above the current
directory?
13. What you would type on the command line to move to your home directory?
14. What you would type on the command line to move to the directory /etc/rc.d ?
15. What you would type on the command line to move to a subdirectory of the current directory named junkDir? (You can assume that junkDir exists.)
16. What is wrong with cat? That is, why do you typically use more or less instead of the cat command? A. It only works on files that have 10 or fewer lines. B. It only works on files that have lines that are 40 characters or less. C. It only works on files that have an extension of ".txt" D. Th.
csc3412 Assignment 1Semester 1, 2014Due Date Midnight.docxfaithxdunce63732
csc3412 Assignment 1
Semester 1, 2014
Due Date: Midnight 31 March 2014, AEST
This assignment consists of 3 questions each of equal value. They
consist of common tasks required of a system administrator—tasks
I have had to do at some time in the past.
Clear Layout
It is vitally important that your assignment is clearly laid out with
questions and parts of questions clearly defined. It must be a
straight forward matter for the examiner to determine that you
have completed each exercise satisfactorily. We want quality not
quantity. Poorly organised submissions will be rejected or receive
a poor mark.
A text file or PDF/A document typeset using vanilla LATEX are
preferred over a document produced by a word-processor. If you
must use Microsoft Word please export your document as PDF/A1
not PDF.
Command Output
When answering these questions you will have to run commands
under Linux—whenever a command is run you will need to:
a. explain in your own words the purpose of the command in the
context of the assignment question. (Please do not just copy
the “Description” section from the man page!) Also, you
need to explain in your own words all terminology used—as
if you were explaining to an average user! (Please show you
understand what you are doing!)
b. show that the command worked—either from its output or
the output from another command. For example
prompt> dd if=/dev/zero of=Crypt.fs bs=1M count=32
32+0 records in
1 PDF/A is an archival format of PDF that embeds all fonts used in the doc-
ument within the PDF file. To ensure PDF/A format in Word check “ISO-
19005-compliant (PDF/A)” under “Options” when saving a file as PDF.
LATEX produces PDF/A by default.
32+0 records out
33554432 bytes (34 MB) copied, 0.109063 s, 308 MB/s
prompt> ls -l Crypt.fs
-rw-r--r-- 1 user user 33554432 2014-02-25 10:18 Crypt.fs
c. To capture text output from programs you will have to redi-
rect the output to a file or use the command script. If you
are using the command script turn off the tty escape se-
quences that change the colour of console text—the escape
sequences will appear in output file and make it impossible
to read.
2
Question 1 (marks 20)
On modern networked computers, maintaining the correct time on
each machine is important. Computers on a LAN or WAN with
different times can cause problems.
In about a page and in your own words explain why it is im-
portant for computers to maintaining the correct time and more
importantly explain how do they do it.
In your explanation make certain to include discussions on the
following linked topics:
• The computer’s hardware clock (also called the Real Time
Clock or RTC)
• The computer’s software clock (also called the kernel or sys-
tem clock)
• In Linux, how they are syncronised and why do they need to
be syncronised? (See Exercise 2.35 from the Study Book)
• What is UTC and why is it used? (UTC: Coordinated Uni-
versal Time, or Temps Universel Coordonné, and if you want—
you can expla.
1. This is a real test, which means you must do your own w.docxjackiewalcutt
1. This is a "real" test, which means you must do your own work. It's an open book test, so you can
use any resources such as books, your notes, or the computer. However, you must do your own
work. This means that you must not ask other students, instructors, acquaintances, paid
consultants, Facebook friends, etc. for help. Any violations of the CBC Academic Honesty Policy
will result in a failing grade for the course.
If you use any Internet resources, make sure that you do NOT copy and paste information. You
can use the Internet, but you must put all answers in your own words. You will receive no credit
for any answers with copied material.
The test must be completed and turned in by 11:59 on the due date to receive full credit. Late
tests will be accepted, but will lose 10% of the possible points for each day they are late.
I have read and understand the test policies.
2. Assume that you are hired as the Network Administrator for a small company. The 4 current
employees have 3 Windows computers and 1 Mac computer. However, the business is growing
and hiring 10 more employees. The business owner wants to set up file and print sharing for the
employees, and set up a web server to sell their products on the Internet. Would you suggest
implementing a Windows based network server or a UNIX/Linux based network server? Of
course you must explain your suggestion if you want to receive full points for this question.
3. It would be difficult for a user to tell the difference between a UNIX server and a Linux server if
all they were doing was typing commands.
True
False
4. True or False. The Courts in the United States have determined that UNIX and Linux are the
same thing as far as Intellectual Property rights are concerned.
5. When you connect to the UNIX server and run a UNIX command such as ls, where does the code
for the ls command run, on your PC, or on the UNIX server?
A. UNIX Server
B. PC
6. DOS has a tree structured file system for every logical disk. What is the maximum number of
tree structures or top level directories in the UNIX file system ?
A. 1
B. 1 for every physical drive
C. 1 for every drive partition or physical drive
D. 1 per device (drive, optical disk, thumb drive etc.)
7. What key(s) or character(s) do you have to use to get out of the man page utility?
A. exit
B. x
C. q
D. Q
8. What will be returned if you type: apropos delete user
A. Every man page that has the word delete OR the word user
B. Every man page that has the words delete AND user. Either word can be anywhere on the line.
C. Every man page that has the exact phrase "delete user". The words must be in that order, with
just one space between them.
D. A portal to another dimension will open
9. What would you type to see all the files in the current directory?
10. Assume you are in your home directory. What UNIX command do you use to see a listing of all
the files in the directory /usr/lib ...
2. Assume that you are hired as the Network Administrator for a smal.docxstandfordabbot
2. Assume that you are hired as the Network Administrator for a small company. The 4 current employees have 3 Windows computers and 1 Mac computer. However, the business is growing and hiring 10 more employees. The business owner wants to set up file and print sharing for the employees, and set up a web server to sell their products on the Internet. Would you suggest implementing a Windows based network server or a UNIX/Linux based network server? Of course you must explain your suggestion if you want to receive full points for this question.
3. It would be difficult for a user to tell the difference between a UNIX server and a Linux server if all they were doing was typing commands.
True
False
4. True or False. The Courts in the United States have determined that UNIX and Linux are the same thing as far as Intellectual Property rights are concerned.
5. When you connect to the UNIX server and run a UNIX command such as ls, where does the code
for the ls command run, on your PC, or on the UNIX server? A. UNIX Server B. PC
6. DOS has a tree structured file system for every logical disk. What is the maximum number of
tree structures or top level directories in the UNIX file system ? A. 1 B. 1 for every physical drive C. 1 for every drive partition or physical drive D. 1 per device (drive, optical disk, thumb drive etc.)
7. What key(s) or character(s) do you have to use to get out of the man page utility? A. exit B. x C. q D. Q
8. What will be returned if you type: apropos delete user A. Every man page that has the word delete OR the word user B. Every man page that has the words delete AND user. Either word can be anywhere on the line. C. Every man page that has the exact phrase "delete user". The words must be in that order, with
just one space between them. D. A portal to another dimension will open
9. What would you type to see all the files in the current directory?
10. Assume you are in your home directory. What UNIX command do you use to see a listing of all the files in the directory /usr/lib ?
11. While a directory may seem empty because it doesn't contain any files or sub-directories, you will always see two items if you use the command to see all files. What are the names of these two items, and what are they?
12. What you would type on the command line to move to the directory above the current
directory?
13. What you would type on the command line to move to your home directory?
14. What you would type on the command line to move to the directory /etc/rc.d ?
15. What you would type on the command line to move to a subdirectory of the current directory named junkDir? (You can assume that junkDir exists.)
16. What is wrong with cat? That is, why do you typically use more or less instead of the cat command? A. It only works on files that have 10 or fewer lines. B. It only works on files that have lines that are 40 characters or less. C. It only works on files that have an extension of ".txt" D. Th.
csc3412 Assignment 1Semester 1, 2014Due Date Midnight.docxfaithxdunce63732
csc3412 Assignment 1
Semester 1, 2014
Due Date: Midnight 31 March 2014, AEST
This assignment consists of 3 questions each of equal value. They
consist of common tasks required of a system administrator—tasks
I have had to do at some time in the past.
Clear Layout
It is vitally important that your assignment is clearly laid out with
questions and parts of questions clearly defined. It must be a
straight forward matter for the examiner to determine that you
have completed each exercise satisfactorily. We want quality not
quantity. Poorly organised submissions will be rejected or receive
a poor mark.
A text file or PDF/A document typeset using vanilla LATEX are
preferred over a document produced by a word-processor. If you
must use Microsoft Word please export your document as PDF/A1
not PDF.
Command Output
When answering these questions you will have to run commands
under Linux—whenever a command is run you will need to:
a. explain in your own words the purpose of the command in the
context of the assignment question. (Please do not just copy
the “Description” section from the man page!) Also, you
need to explain in your own words all terminology used—as
if you were explaining to an average user! (Please show you
understand what you are doing!)
b. show that the command worked—either from its output or
the output from another command. For example
prompt> dd if=/dev/zero of=Crypt.fs bs=1M count=32
32+0 records in
1 PDF/A is an archival format of PDF that embeds all fonts used in the doc-
ument within the PDF file. To ensure PDF/A format in Word check “ISO-
19005-compliant (PDF/A)” under “Options” when saving a file as PDF.
LATEX produces PDF/A by default.
32+0 records out
33554432 bytes (34 MB) copied, 0.109063 s, 308 MB/s
prompt> ls -l Crypt.fs
-rw-r--r-- 1 user user 33554432 2014-02-25 10:18 Crypt.fs
c. To capture text output from programs you will have to redi-
rect the output to a file or use the command script. If you
are using the command script turn off the tty escape se-
quences that change the colour of console text—the escape
sequences will appear in output file and make it impossible
to read.
2
Question 1 (marks 20)
On modern networked computers, maintaining the correct time on
each machine is important. Computers on a LAN or WAN with
different times can cause problems.
In about a page and in your own words explain why it is im-
portant for computers to maintaining the correct time and more
importantly explain how do they do it.
In your explanation make certain to include discussions on the
following linked topics:
• The computer’s hardware clock (also called the Real Time
Clock or RTC)
• The computer’s software clock (also called the kernel or sys-
tem clock)
• In Linux, how they are syncronised and why do they need to
be syncronised? (See Exercise 2.35 from the Study Book)
• What is UTC and why is it used? (UTC: Coordinated Uni-
versal Time, or Temps Universel Coordonné, and if you want—
you can expla.
Global web tutors experts provides you help in writing all types of subjects assignment especially for Unix Assignment help. If you need any help in any subject then you can avail our services via call, chat or email to our experts. Our experts are available 24*7.
Assessment item 1 File Systems and Advanced Scripting .docxdavezstarr61655
Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts which manage user information.
You are to prepare a simple shell script which reads a text file called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/SM/I/outline.html#contentPanel
You work for the Information Technology Department in your University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS volume.
All volumes including the operating system should be engineered in such a way to ensure the
best data protection is afforded in the event of local disk failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 200G.
3. uni2 with mount point /users/deleted& reservation of 100G.
4. uni3 with mount point /users/staff& reservation of 100G.
5. uni4 with mount point /users/guest & reservation of 250G.
Given the above your task is as follows define a strategy for how you will ensure the volumes
outlined above are provisioned whilst ensuring there data protection. Document this accordingly
along with a suitable rationale for your design.
Part 3: Implementing the Filesystem (4 marks)
Given the strategy defined in part two, your job is to implement the storage system.
1. To do this install the latest version of Ubuntu Server on a virtual machine. You will need to
ensure the networking is bridged and the root portioning is managed appropriately. You will
need to add additional virtual disks to meet the storage needs above.
2. Install the ZFS package and configure it such that pools of storage are created to meet the above
requirements including redundan.
Research TopicCorporations are making the assumption that ever.docxbrittneyj3
Research Topic
Corporations are making the assumption that everyone uses a smartphone. How does this perpetuate the negative outcomes created by the “Digital Divide”?
The purpose of the rough draft assignment is to allow me to understand where your team is at, and to be able to provide feedback that you can use for refining your paper.
Your paper should have the following characteristics:
Be in APA format
Have the following sections:
Title page
Abstract (from Friday's assignment - revised according to the feedback that was given (if any).
Rough draft, this should address:
Introduction
Background/Literature Review
Relevant Theory Exploration
Findings/Examples
Lessons Learned
Future Research
References (non-annotated)
Appendix:
Research Outline (From Friday's assignment - revised/corrected - if needed)
Annotated bibliography (From Saturday morning's assignment - revised according to the feedback that was given (if any).
The goal for THIS assignment is to make significant strides on addressing item 3 (rough draft).
Due by: Today at 8:00pm
.
Research two (2) manufacturing or two (2) service companies that m.docxbrittneyj3
Research two (2) manufacturing or two (2) service companies that manage inventory and complete this assignment.
Write a five to seven (5-7) page paper in which you:
1. Determine the types of inventories these companies currently manage and describe their essential inventory characteristics.
2. Analyze how each of their goods and service design concepts are integrated.
3. Evaluate the role their inventory plays in the company's performance, operational efficiency, and customer satisfaction.
4. Compare and contrast the four (4) different types of layouts found with each company; explain the importance of the layouts to the company's manufacturing or service operations.
5. Determine at least two (2) metrics to evaluate supply chain performance of the companies; suggest improvements to the design and operations of their supply chains based on those metrics.
6. Suggest ways to improve the inventory management for each of the companies without affecting operations and the customer benefit package. Provide a rationale to support the suggestion.
7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Running head: ANNOTATED BIBLIOGRAPHY
Annotated Bibliography
Your Name
Date
Article # 1
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 2
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 3
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 4
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 5
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 6
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 7
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 8
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 9
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 10
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
.
More Related Content
Similar to RESEARCHED ARGUMENT ESSAY GUIDELINES (Based on Tom Regan’.docx
Global web tutors experts provides you help in writing all types of subjects assignment especially for Unix Assignment help. If you need any help in any subject then you can avail our services via call, chat or email to our experts. Our experts are available 24*7.
Assessment item 1 File Systems and Advanced Scripting .docxdavezstarr61655
Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts which manage user information.
You are to prepare a simple shell script which reads a text file called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/SM/I/outline.html#contentPanel
You work for the Information Technology Department in your University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS volume.
All volumes including the operating system should be engineered in such a way to ensure the
best data protection is afforded in the event of local disk failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 200G.
3. uni2 with mount point /users/deleted& reservation of 100G.
4. uni3 with mount point /users/staff& reservation of 100G.
5. uni4 with mount point /users/guest & reservation of 250G.
Given the above your task is as follows define a strategy for how you will ensure the volumes
outlined above are provisioned whilst ensuring there data protection. Document this accordingly
along with a suitable rationale for your design.
Part 3: Implementing the Filesystem (4 marks)
Given the strategy defined in part two, your job is to implement the storage system.
1. To do this install the latest version of Ubuntu Server on a virtual machine. You will need to
ensure the networking is bridged and the root portioning is managed appropriately. You will
need to add additional virtual disks to meet the storage needs above.
2. Install the ZFS package and configure it such that pools of storage are created to meet the above
requirements including redundan.
Research TopicCorporations are making the assumption that ever.docxbrittneyj3
Research Topic
Corporations are making the assumption that everyone uses a smartphone. How does this perpetuate the negative outcomes created by the “Digital Divide”?
The purpose of the rough draft assignment is to allow me to understand where your team is at, and to be able to provide feedback that you can use for refining your paper.
Your paper should have the following characteristics:
Be in APA format
Have the following sections:
Title page
Abstract (from Friday's assignment - revised according to the feedback that was given (if any).
Rough draft, this should address:
Introduction
Background/Literature Review
Relevant Theory Exploration
Findings/Examples
Lessons Learned
Future Research
References (non-annotated)
Appendix:
Research Outline (From Friday's assignment - revised/corrected - if needed)
Annotated bibliography (From Saturday morning's assignment - revised according to the feedback that was given (if any).
The goal for THIS assignment is to make significant strides on addressing item 3 (rough draft).
Due by: Today at 8:00pm
.
Research two (2) manufacturing or two (2) service companies that m.docxbrittneyj3
Research two (2) manufacturing or two (2) service companies that manage inventory and complete this assignment.
Write a five to seven (5-7) page paper in which you:
1. Determine the types of inventories these companies currently manage and describe their essential inventory characteristics.
2. Analyze how each of their goods and service design concepts are integrated.
3. Evaluate the role their inventory plays in the company's performance, operational efficiency, and customer satisfaction.
4. Compare and contrast the four (4) different types of layouts found with each company; explain the importance of the layouts to the company's manufacturing or service operations.
5. Determine at least two (2) metrics to evaluate supply chain performance of the companies; suggest improvements to the design and operations of their supply chains based on those metrics.
6. Suggest ways to improve the inventory management for each of the companies without affecting operations and the customer benefit package. Provide a rationale to support the suggestion.
7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Running head: ANNOTATED BIBLIOGRAPHY
Annotated Bibliography
Your Name
Date
Article # 1
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 2
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 3
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 4
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 5
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 6
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 7
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 8
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 9
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
Article # 10
APA Citation
What is the article about?
Why was the research performed?
Findings
Strengths
Weaknesses
Implications for Practice
Key Words
.
Research Topic Stratgic planning in Information Technology.docxbrittneyj3
Research Topic: Stratgic planning in Information Technology
Ten scholarly or peer-reviewed journal articles to be used for the paper. please remember to add ten in-text citations and ten references to the paper:
· Use the following sites to find the journal articles:
https://dl-acm-org.eu1.proxy.openathens.net/
https://search.proquest.com/abiglobal/index?accountid=10378
The research paper must include the following sections.
1. Introduction
2. Background and significance study.
3. Literature review
4. Research design and methods
5. Preliminary suppositions and implications
6. Conclusion
7. References.
.
RESEARCH TOPIC; SOCIAL WORKERS AND IDENTIFICATION OF HUMAN TRAFF.docxbrittneyj3
RESEARCH TOPIC; SOCIAL WORKERS AND IDENTIFICATION OF HUMAN TRAFFICKING VICTIMS
PART 1
Role of Theoretical Framework in Qualitative Research
Discussion Post
The theoretical framework informs epistemologies and methodologies in a qualitative study since it is pervasive and influential compared to the methodology alone. It is applied to enhance the understanding of a particular problem or phenomenon (Grant & Osanloo, 2014). These frameworks provide focus and organization to the study, expose meaning, connect the study to the existing dissertation along with identifying the pros and cons of particular research.
Moreover, the methodological approach guides the qualitative study by establishing ideas and approaches to the research. Just as how a house requires a plan before construction, the theoretical framework serves as a blueprint, which provides the structure to the entire dissertation (Baltimore, 2016). Additionally, the choice of theory offers a conceptual background for understanding, analyzing, and designing ways to investigate a particular problem. Therefore, if the well-utilized, theoretical framework can create a tension that produces productive outcomes for the study.
More so, the theoretical framework connects different elements of dissertation/qualitative study, such as providing a brief discussion of the problem, purpose, significance, and research questions in the dissertation. Aligning a theory with these essential components provides an intriguing highlight, which adds weight to levels of knowledge that the study is investigating (Grant & Osanloo, 2014). Similarly, just as how a reliable and robust blueprint to help build a secure home foundation based on the owner’s desire. Therefore, the theoretical framework act as a strong basis for various parts of the dissertation that needs to be developed, in the body of the paper.
Finally, the elevation and foundation blueprints are both critical in a home building analogy. Similarly, theoretical frameworks and their concepts should be applied to be meaningful to the structure of these methodologies and epistemologies relating to the qualitative research.
References
Grant, C., & Osanloo, A. (2014). Understanding, selecting, and integrating a theoretical framework in dissertation research: Creating the blueprint for your “house.” Administrative Issues Journal: Connecting Education, Practice, and Research, 4(2), 12–26.
Laureate Education (Producer). (2016). Theoretical lens and frameworks for qualitative researchers [Video file]. Baltimore, MD: Author. Retrieved from the Walden Library databases.
PART 2
DQ 2: QUALITATIVE RESEARCH ANALYSIS
A brief statement of the purpose and primary research question the article addresses
The goal of the study was to assess whether if social workers could effectively detect sex-trafficked victims amongst their clients. This arises from the fact that social workers play an essential role in evaluating, as well as giving treatment services to s.
Research topic What is the impact of Gamification on security train.docxbrittneyj3
Research topic: What is the impact of Gamification on security training?
Ph.D. in Information Technology is my program.
How is the research topic related to your major? (( Information Technology is my major))
How is the research topic connected to program goals and core courses ?? -- -- ((see attachment for core courses ))
Programs goals:
Contribute to organizational strategy and resiliency through IT
Define shifts in national and international IT policy
Leverage IT technologies to manage risk and enforce security measures
Design highly scalable systems to process and analyze Big Data
Empower smart cities through data science
Manage data-driven decisions … identify cyber threats … improve connectivity
https://www.ucumberlands.edu/academics/graduate/programs/executive-doctorate-philosophy-information-technology
.
Research Title VII of the Civil Rights Act of 1964 and discuss why i.docxbrittneyj3
Research Title VII of the Civil Rights Act of 1964 and discuss why it is so significant.
Your paper should discuss the state of race relations in the United States prior to the Civil Rights Act of 1964. It should also discuss the political environment that led to the passing of the Civil Rights Act of 1964. Additionally, please include a response to the following in your analysis:
What is the purpose of this law?
What groups does it protect? What groups does it not protect?
How were the Jim Crow laws tested during this time period?
What is the U.S. Supreme Court case
Plessy v. Ferguson
about? Is the rule established in the Plessy case still the rule today?
.
Research topic StakeholderInstructionsYour submission .docxbrittneyj3
Research topic: Stakeholder
Instructions:
Your submission must include the following information in the following format:
DEFINITION: A brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.
SUMMARY:Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article's author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.
DISCUSSION:Using 300-350 words, write a discussion, in your own words the way the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.
REFERENCES: All references must be listed at the bottom of the submission--in APA format
.
Research the secondary transition services for students with disabil.docxbrittneyj3
Research the secondary transition services for students with disabilities. Focus on students with Significant Cognitive Disabilities (SCD) and their transition to post-high school environments. The research report should provide descriptive information about Secondary Transition to Post High School environments:
(1) an in-depth description of the services in the State and your district,
(2) what is secondary transition?
(3) why is it important for school personnel to help students transition from secondary to post-high school?
(4) list and describe the five components of the Taxonomy for Transition Programming;
(5) explain why self-determination is important for students with disabilities.
You must conclude the report by creating a secondary transition plan for a student with significant cognitive disabilities. You must include your philosophy about secondary transition for students with SCD and who should be responsible for ensuring that students are prepared for post-high school outcomes based on your research.
.
Research the use of social stories for teaching socially appro.docxbrittneyj3
Research
the use of social stories for teaching socially appropriate behavior to a child with ASD.
Imagine
that you are a special education teacher in a resource room at an elementary school. One of your students is autistic and is having difficulty with understanding and responding to body language and facial expressions. Her peers in the room are starting to avoid her due to this behavior and you feel that a social story will help her make the connection.
Write
a 2-page social story that explores a specific social skill for an elementary age child.
Include
the following components in your social story:
A title and an introduction which sets the scene
The story with descriptions, coaching language, and “applause” for the student
Photographs or realistic drawings that specifically reflect the content
A conclusion that’s positive and supportive
.
Research the variety of enumeration tools available. Select one tool.docxbrittneyj3
Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts (example: Softerra LDAP Browser is the industry-leading software for browsing and analyzing LDAP directories. It provides a wide variety of features for handy viewing of directory contents, getting information about directory infrastructure and objects.)
Please write 350 words essay.
.
Research Topic and Methodology Form—Unit 4Use the research s.docxbrittneyj3
Research Topic and Methodology Form—Unit 4
Use the research study approved for the Unit 2 assignment to complete this form.
1. Write the APA-formatted reference for your article.
2. Paste the persistent link for your article here.
3. Identify and describe the main topic of the research article. Note: This is the overall, general topic the researchers are investigating. It is not the same thing as the purpose of the article.
4. Identify the research problem the researchers investigated in the article. In one to two paragraphs, describe a few of the research findings the researchers report in their literature that are closely related to the research problem. Use appropriate citations for secondary sources.
5. List the research question or questions the researchers used. Make sure these are formed as questions and that they are answerable using research methods. In one to two paragraphs, explain how answering these research questions would help solve the research problem identified in number 4.
6. Identify the methodology, either qualitative or quantitative, and the approach the researchers used to answer the research question or questions. Recall:
· Qualitative approaches include case study, phenomenology, grounded theory, ethnography, and generic qualitative inquiry.
· Quantitative approaches are experimental, quasi-experimental, and non-experimental.
7. Describe the findings in the literature review that are closely related to the research problem in the chosen research.
8. Explain how the answers to the research question or questions will help the researchers solve the research problem in the chosen research.
In one paragraph, explain how the methodology and approach allow the researchers to answer the research question or questions listed in number 5.
1
Article
Are parents identifying
positive aspects to parenting
their child with an intellectual
disability or are they just
coping? A qualitative
exploration
Carole Beighton
Kingston & St. Georges University of London, United Kingdom of Great Britain and Northern Ireland
Jane Wills
London South Bank University, United Kingdom of Great Britain and Northern Ireland
Date accepted: 30 May 2016
Abstract
Although acknowledging the stress of raising their child with intellectual disabilities, parents also
report that their child has brought about many positive changes in themselves and family. This
study reports what parents perceive to be a positive aspect of parenting their child, as currently
what constitutes a ‘positive’ is unclear. Seven key themes were identified; an increased sense of
personal strength and confidence, changed priorities, greater appreciation of life, pleasure in the
child’s accomplishments, increased faith/spirituality, more meaningful relationships and the positive
effect that the child has on the wider community. Interpretive examination of the themes reveals
that the positive aspects identified consist mostly of meaning-focused coping strategies. T.
Research TitleStudent NameCourse Number – TermYearProfess.docxbrittneyj3
Research Title
Student Name
Course Number – Term/Year
Professor Name
Introduction
Main research question
Problem statement
Purpose of the research
Research Outline
Simplified
Main points that your audience would appreciate
Findings from the literature
What were the major take-aways?
What is important for your audience to know?
Any resources you would like to share with them in case they would like to further their knowledge on this topic?
Can you incorporate visuals?
Conclusion
Summarize your learning/findings
Did anything change for you as a result of this research?
What else would you like to say?
Reference List
.
Research these topics topics for a two to three page paper. Write th.docxbrittneyj3
Research these topics topics for a two to three page paper. Write the paper in your own words. Do not copy and paste. Use APA formatting and include at least three references.
1. Give a brief description or timeline for computer development from the 1940's until today.
2. Describe Moore's Law. Do you think it still applies today?
3. Describe the Internet of Things (IoT).
.
Research the web to identify a SystemsSoftware Development Lifecycl.docxbrittneyj3
Research the web to identify a Systems/Software Development Lifecycle. In a report format, discuss selected SDLC by providing an overview (history, how it’s used,etc.), Benefits of the approach, example of benefit, weaknesses of the approach, and example of the weakness. The paper should be no more than 5 not including cover, index and bibliography pages. Please cite all sources according to APA 6th edition.
.
Research the specific domains and components of the COBIT Framework..docxbrittneyj3
Research the specific domains and components of the COBIT Framework. Discuss the levels of security architecture as they relate to the principles of the COBIT Framework. COBIT faced a variety of criticism. Explain one criticism of COBIT and discuss if and how the criticism was addressed (if it was)
and assessment of how COBIT criticism was addressed and offer an opposite view of the criticism
3 pages
.
Research the role that Milton plays in Romantic writing and trac.docxbrittneyj3
Research the role that Milton plays in Romantic writing and trace one or two Miltonic elements in
Mandeville
. Why is Godwin so influenced by Milton? Why does he quote Milton so extensively. My essay on
Mandeville
should assist you in this effort.
.
Research the two alternative presentation applications that yo.docxbrittneyj3
Research
the two alternative presentation applications that you chose and
compare
them to the features and functionality of Microsoft® PowerPoint®.
Note
: There are several alternative presentation applications besides Microsoft® PowerPoint®, including Sway®. It does not, however, have to be a Microsoft® application.
Create
a 12- to 15-slide presentation that includes the following:
A title page
A reference page
A slide theme and a template
Animations using the timing feature
Slide transitions
A picture or an image
Word art
A recorded audio on one of the slides
Use
speaker notes to expand ideas beyond the slide bullet points and
include
research supporting your comparisons.
Submit
a Microsoft® PowerPoint® Presentation file (PPTX).
Cite
a minimum of 4 sources, formatted according to APA guidelines.
.
Research project oversight using the University Library.Writ.docxbrittneyj3
Research
project oversight
using the University Library.
Write
a 700- to 1,050-word executive summary to your organization's leadership team answering the following:
(Paper MUST be broken into these sections with headings and an introduction and conclusion, and Reference page)
What is
project oversight
?
How will project oversight impact the organization? How will it impact the project manager?
What is the importance of project oversight to the future of project management?
Format
your paper consistent with APA guidelines.
A reference from UOP Library is Required.
.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Unit 8 - Information and Communication Technology (Paper I).pdf
RESEARCHED ARGUMENT ESSAY GUIDELINES (Based on Tom Regan’.docx
1. RESEARCHED ARGUMENT ESSAY GUIDELINES
(Based on Tom Regan’s “The Case for Animal Rights” in the
course text,
“The Norton Reader”. Argue for or against the essay and/or the
issue
presented in the essay using the essay/text as the main source.
Strategies of Argument:
-Explore a question. (Many arguments develop from problems
that puzzle.)
-Make a claim. (Some arguments may begin with opinions that
can be supported
with good reasons and convincing evidence.)
“Any claim should be followed by its proof.” –Aristotle
Presenting Evidence:
-Recognize reliable sources* of information-MINIMUM of (2)
sources; including
the text.
-Provide evidence for all your claims
*use .gov (government sites) .org (non-profit sites) and/or .edu
(educational sites) for reliable sources. (.com could be anyone)
NO WIKIPEDIA!
Reasons for Argument:
-Argue for the greater good; lesser evil
-Fairness and Equality
-Long-term or short-term good
-Benefit for greater numbers
-For or against self-interest
2. -Feasibility
SAMPLE OUTLINES:
1. Intro: Statement of Claim
Reason #1 and supporting evidence
Reason #2 and supporting evidence…
Conclusion
OR
2. Intro: Statement of Claim
Reason #1 and supporting evidence
-deal with objections
Reason #2 and supporting evidence
-deal with objections…
Conclusion
Sample Outlines, con’t…
OR
3. Intro: The Problem
-previous attempts to solve it
-why previous attempts failed
New
Solution
3. :
-advantages of the proposal
-Feasibility
-Implementation
Conclusion
TIPS:
-Handle information honestly, quote fairly from your sources,
anticipate
objections, argue civilly, be credible, and use emotional appeals
sparingly
-Remember to stay away from using the first person “I”; this
weakens the points you
are trying to make.
-Share background information about the author either in the
introduction or second
paragraph. This will answer the reader’s question “Why should
I, or shouldn’t I, listen to
this author?!”
FORMAT:
4. -see syllabus for guidelines
MUST HAVE A WORKS CITED PAGE OR CONSIDERED
PLAGAIRISM!
(Use MLA or APA format for works cited page and
documentation within the text)
1. This is a "real" test, which means you must do your own
work. It's an open book test, so you can
use any resources such as books, your notes, or the computer.
However, you must do your own
work. This means that you must not ask other students,
instructors, acquaintances, paid
consultants, Facebook friends, etc. for help. Any violations of
the CBC Academic Honesty Policy
will result in a failing grade for the course.
If you use any Internet resources, make sure that you do NOT
copy and paste information. You
can use the Internet, but you must put all answers in your own
words. You will receive no credit
for any answers with copied material.
5. The test must be completed and turned in by 11:59 on the due
date to receive full credit. Late
tests will be accepted, but will lose 10% of the possible points
for each day they are late.
I have read and understand the test policies.
2. Assume that you are hired as the Network Administrator for a
small company. The 4 current
employees have 3 Windows computers and 1 Mac computer.
However, the business is growing
and hiring 10 more employees. The business owner wants to set
up file and print sharing for the
employees, and set up a web server to sell their products on the
Internet. Would you suggest
implementing a Windows based network server or a
UNIX/Linux based network server? Of
course you must explain your suggestion if you want to receive
full points for this question.
3. It would be difficult for a user to tell the difference between
a UNIX server and a Linux server if
all they were doing was typing commands.
6. True
False
4. True or False. The Courts in the United States have
determined that UNIX and Linux are the
same thing as far as Intellectual Property rights are concerned.
5. When you connect to the UNIX server and run a UNIX
command such as ls, where does the code
for the ls command run, on your PC, or on the UNIX server?
A. UNIX Server
B. PC
6. DOS has a tree structured file system for every logical disk.
What is the maximum number of
tree structures or top level directories in the UNIX file system ?
A. 1
B. 1 for every physical drive
C. 1 for every drive partition or physical drive
7. D. 1 per device (drive, optical disk, thumb drive etc.)
7. What key(s) or character(s) do you have to use to get out of
the man page utility?
A. exit
B. x
C. q
D. Q
8. What will be returned if you type: apropos delete user
A. Every man page that has the word delete OR the word user
B. Every man page that has the words delete AND user. Either
word can be anywhere on the line.
C. Every man page that has the exact phrase "delete user". The
words must be in that order, with
just one space between them.
D. A portal to another dimension will open
9. What would you type to see all the files in the current
8. directory?
10. Assume you are in your home directory. What UNIX
command do you use to see a listing of all
the files in the directory /usr/lib ?
11. While a directory may seem empty because it doesn't
contain any files or sub-directories, you
will always see two items if you use the command to see all
files. What are the names of these
two items, and what are they?
12. What you would type on the command line to move to the
directory above the current
directory?
13. What you would type on the command line to move to your
9. home directory?
14. What you would type on the command line to move to the
directory /etc/rc.d ?
15. What you would type on the command line to move to a
subdirectory of the current directory
named junkDir? (You can assume that junkDir exists.)
16. What is wrong with cat? That is, why do you typically use
more or less instead of the cat
command?
A. It only works on files that have 10 or fewer lines.
B. It only works on files that have lines that are 40 characters or
less.
C. It only works on files that have an extension of ".txt"
10. D. The cat command sends the entire file to the display. This
makes it cumbersome for files
that are longer than a single screen.
17. In WinSCP, which protocol should be used to connect to the
CBC UNIX server?
A. FTP
B. SFTP
C. SFTP (allow SCP Fallback)
D. SCP
18. True or False. UNIX follows the same 3 letter file
extensions as Windows. That is, it uses .exe,
.doc, .jpg etc.
19. When you use the DOS COPY command you can assume
many defaults. In fact you can leave the
name of the destination blank, and DOS will assume that the
destination is the current directory.
Will the UNIX cp command work if you leave the destination
11. blank?
A. Yes. The cp command will assume you want to copy to the
current directory.
B. No. You must specify a destination.
20. What is the difference between rmdir and rm –r ?
A. The rmdir command will recursively delete any sub-
directories and files while rm –r will not.
B. The rm -r command will recursively delete any sub-
directories and files while rmdir will not
C. There is no difference, neither will recursively delete any
sub-directories and files
D. There is no difference, both will recursively delete any sub-
directories and files
21. When you delete a file using rm, how do you get it back out
of the trash if you change your
mind?
A. Go to the trash folder in your home directory and move or
copy the file.
12. B. Use the undelete utility
C. Run rm -recover filename, where filename is the name of the
file you want to
restore
D. There is no trash and no way to recover the file without
using special recovery software.
22. Why can't normal users, that is a user that is NOT an admin
or superuser, change their user id
(uid)?
A. They CAN change it by using the usermod command
B. The uids must be assigned in sequence, and only the admin
knows which uid should be the
next to use
C. This would cause security issues as any user could
impersonate any other user by simply
changing to their uid
D. The user may try to use a uid that has already been assigned
and this would cause the OS to
crash.
13. 23. Explain the difference between how umask and the chmod
command affect your permissions?
A. There is no difference
B. The umask command only affects files that already exist,
while chmod changes your
default permissions
C. The chmod command only affects files that already exist,
while umask changes your
default permissions
D. The umask command only works in symbolic mode, while
chmod only works in binary
mode
E. The umask command sets permissions for directories, while
the chmod command sets file
permissions.
14. 24. Can you set your default file permissions to 644 and at the
same time have your default
directory permissions set to 744? Why or why not?
25. Say you had a file named q19 that had permissions of -r-xr-
x---- What command would you
use If you wanted to change permissions on q19 to -rwxr--r--
(You must include the command
name and the arguments to the command.)
tsako
Cross-Out
26. Say you have a subdirectory named testsub, which has
permissions of drw------- Also assume
that there was a file in testsub named testfile that had
permissions of -rwxrwxrwx. Would you
be able to see details such as the file permissions for testfile if
you ran ls –al testsub?
A. Yes
B. No
15. 27. Say you have a subdirectory named testsub, which has
permissions of drw------- Also assume
that there was a file in testsub named testfile that had
permissions of -rwxrwxrwx. Would you
be able to cat testfile ?
A. Yes
B. No
28. Say you have a subdirectory named testsub, which has
permissions of drw------- Also assume
that there was a file in testsub named testfile that had
permissions of -rwxrwxrwx. Would you
be able to execute testfile ?
A. Yes
B. No
29. Say you have a subdirectory named testsub, which has
permissions of drw------- Also assume
that there was a file in testsub named testfile that had
permissions of -rwxrwxrwx. Would you
be able to cd into testsub ?
A. Yes
16. B. No
30. Which of the following is NOT a requirement for making
your umask changes permanent?
A. You must add the source .login command to your startup
script
B. The umask command must be in your .login file
C. The .login file must be in your home directory
D. You must have read and execute permissions on your .login
file
31. Users with an account on a UNIX system can edit some of
their own information in the
/etc/passwd file, even though they do NOT have write
permission.
A. True
B. False
32. Assume you are in vi in command mode. What happens if
you hit the i key?
17. A. You will change to input/insert mode and the cursor will
move to the beginning of the
current line.
B. You will change to input/insert mode and the cursor will
move to the end of the current line.
C. You will change to input/insert mode and the cursor will
move to the right of the current
character.
D. You will change to input/insert mode and the cursor will stay
where it is.
33. Assume you are in vi in command mode. What happens if
you hit the A key?
A. You will change to input/insert mode and the cursor will
move to the beginning of the
current line.
B. You will change to input/insert mode and the cursor will
move to the end of the current line.
C. You will change to input/insert mode and the cursor will
move to the right of the current
18. character.
D. You will change to input/insert mode and the cursor will stay
where it is.
34. In vi, what key(s) do you hit to change from input/insert
mode to command mode ?
A. i, a, I, A, etc.
B. <ctrl-x>
C. <ctrl-q>
D. <esc>
35. Assume you are in command mode. What the vi command(s)
would you use to delete or cut the
current line?
36. Assume you are in command mode. What the vi command(s)
would you use to replace the
current character?
37. Assume you are in command mode. What the vi command(s)
would you use to force vi to quit
19. w/o making any changes, even though you have edited the
contents of the buffer
A. :q
B. :q!
C. :x
D. :x!
38. Assume you are in command mode. Write the command you
would use to have vi display line
numbers.
39. Assume that you are in vi. What would you expect to happen
if you typed the following:
<esc>:-5,+5 [email protected]^[email protected]@
(You should be able to look at this and determine what will the
command is saying. If you want
20. to test this you will should create a text file with at least 20
lines, and put the word “tony” on
every line. Some of the lines should have “tony” as the first
word on the line, but it should not
be the first word in other lines. Position yourself about halfway
through the file before running
the command.)
40. This question requires you to perform the following hands-
on tasks on your account on the CBC
Linux server. Make sure and follow the instructions very
carefully, especially the last instruction.
I will only check for a file named “all.done”, so if you name
your file something else you will not
receive credit for this question.
Also remember that if the Linux server supports FTP (WinSCP),
you can always move the file to
your Windows PC or Mac, perform the tasks, then copy the file
back to the Linux server.
A.Copy the file /home/test2.txt to your home directory.
21. B.Remove all of the tab (^I) characters. (Hint: it may be easier
to do this if you can see the tabs.)
C. Edit the file and add two lines at the top of the file which
contain your name (on the first line)
and the "Geek In Training" (on the second line).
D. In the first 30 lines, change all occurrences of the phrase
"WWW" to the phrase "Santa Claus
is coming to town".
E.From line 30 to the end of the file change all occurrences of
the phrase “WWW” to the phrase
“Que pasa”.
F.Add the line "FIN" to the end of the file.
G.Save the file with the name: all.done
41. This question requires you to perform the following hands-
22. on tasks on your account on the CBC
Linux server. Make sure and follow the instructions very
carefully, especially step 2. I will only
check for a file named “executeTest”, so if you name your file
something else you will not
receive credit for this question.
A. Create a file on the PC (use any editor), which contains the
following two lines:
echo "I love UNIX"
date
B. Save the file as plain text with the name: executeTest
C. Move the file to your account on the UNIX system
23. D. Give yourself, your group, and the world execute
permissions. You can add other permissions
if you wish. (Hint – to test this try running the file by typing
./executeTest. If you get the
“Permission Denied” error message then something is wrong. If
you see “I love UNIX” followed
by the current date then you have execute permission.