Student Name _________________________________ Date _____________SEC450 iLab3 Report
Initial Configuration ISP Router
version 12.3(4)T7
!
hostname ISP_Router
!
interface FastEthernet0/0
ip address 200.100.0.1 255.255.255.0
!
interface FastEthernet1/0
ip address 200.100.40.1 255.255.255.0
!
interface Serial0/0
ip address 200.100.10.1 255.255.255.0
!
interface Serial0/1
ip address 200.100.20.1 255.255.255.0
!
router rip
network 200.100.0.0
network 200.100.10.0
network 200.100.20.0
network 200.100.40.0
!
line con 0
line aux 0
line vty 0 4
password cisco
line vty 5 15
password cisco
!
end
Note: RED text indicates the required questions to answer
Task to Set up Security Policy for Offsite Database Server
#1. Explain the meaning of the "three P's" best practice rule to create ACL in routers
#2. Explain the difference between the following two access-list commands
a) access-list 101 permit tcp any any eq 80
b) access-list 101 permit tcp any eq 80 any
#3. What are well-known, registered, and ephemeral UDP/TCP ports?
#4. What is wrong with ACL 105?
access-list 105 permit tcp any any
access-list 105 deny tcp host 201.141.0.3 any
#5. What well-known TCP port does Oracle Database (sql net) server use?
#6. A company is managing an Oracle Database located in a Public Server to support day-to-day operations in Dallas and Chicago networks. The company has requested its Internet Access Provider (ISP) to create the necessary ACL at the ISP router securing that only responses from Oracle server to certain hosts are allowed to enter Dallas and Chicago LANs.
ISP network engineers decided to use extended ACL, and applies it to F0/0 interface in ISP router. Why did they decide to create an extended ACL and apply it in interface F0/0 for inbound traffic?
#7. Copy below ISP router’s initial running-config file from page 2, and add the commands needed to create and apply the ACL in the ISP router.
Answer all questions in this document and upload it in Week 3 iLab Dropbox.
3
Revision Date: 1103
1
SEC450 ACL Tutorial
This document highlights the most important concepts on Access Control List (ACL) that
you need to learn in order to configure ACL in CLI. This tutorial does not intend by any
mean to cover all ACL applications, but only those scenarios used in then SEC450
iLabs.
Introduction to Access Control List
A host-based firewall essentially works closing and/or opening ports in a
computer. The engine behind firewalls is built with Access Control Lists (ACL).
Network-based firewalls are implemented in device-specific appliances and
routers. Basically, firewalls in routers filter packets through interfaces to permit
or deny them.
Ports are layer-4 address specified in TCP/IP protocol suit that identify
networking processes running in clients and servers.
ACLs are configured using shell-specific commands. In Cisco IOS, CLI
commands.
1 SEC450 ACL Tutorial This document highlights.docxdorishigh
1
SEC450 ACL Tutorial
This document highlights the most important concepts on Access Control List (ACL) that
you need to learn in order to configure ACL in CLI. This tutorial does not intend by any
mean to cover all ACL applications, but only those scenarios used in then SEC450
iLabs.
Introduction to Access Control List
A host-based firewall essentially works closing and/or opening ports in a
computer. The engine behind firewalls is built with Access Control Lists (ACL).
Network-based firewalls are implemented in device-specific appliances and
routers. Basically, firewalls in routers filter packets through interfaces to permit
or deny them.
Ports are layer-4 address specified in TCP/IP protocol suit that identify
networking processes running in clients and servers.
ACLs are configured using shell-specific commands. In Cisco IOS, CLI
commands access-list and access-group are used to create and apply ACL on
an interface.
ACL can be named by number ID or a name. Naming ACL is useful to identify
ACL’s purpose.
ACL are classified in Standard ACL, and Extended ACL.
Standard ACL’s number IDs are assigned from 1 to 99. Extended ACL’s number
IDs are from 100 to 199.
Standard ACL only uses source IP address in an IP packet to filter through an
interface. Hence, standard ACL denies or permits all packets (IP) with the same
source IP regardless upper protocols, destination IP address, etc. Example 1:
Router(config)#access-list 8 deny host 172.12.3.5
Extended ACL does filtering packets based on protocol, source IP address,
source port number, destination IP address and destination port number.
Example 2: Router(config)#access-list 102 deny tcp host 10.0.3.2 host
2
172.129.4.1 Deny tcp packets with source IP address 10.0.3.2 and destination IP
address 172.129.4.1.
Since, Standard ACLs only have source IP address; the rule is to apply them in
an interface as closer as possible to the concerning destination network.
For the contrary, the rule for Extended ACLs is to apply them in an interface as
closer as possible to the source IP address.
Use Extended ACL in all iLabs as they are more granular on packets to filter.
Create Extended ACL in global configuration
You can use access-list command options lt, gt, eq, neq, range (less than,
greater than, equal, not equal, range of ports) to do operation with port numbers.
Example 3: access-list 102 deny tcp any host 11.23.45.7 gt 20 denies all
packets with any source IP address to destination IP address 11.23.45.7 and
destination tcp port greater than 20.
Example 4: access-list 107 permit udp any any permits all packets with udp
protocol with any source IP address to any destination IP address.
Extended ACL can do packet filtering based on source port number and
destination port number.
Extended ACL Syntax can be as follows:
access-list <#,name> <protocol> ...
1 SEC450 ACL Tutorial This document highlights.docxdorishigh
1
SEC450 ACL Tutorial
This document highlights the most important concepts on Access Control List (ACL) that
you need to learn in order to configure ACL in CLI. This tutorial does not intend by any
mean to cover all ACL applications, but only those scenarios used in then SEC450
iLabs.
Introduction to Access Control List
A host-based firewall essentially works closing and/or opening ports in a
computer. The engine behind firewalls is built with Access Control Lists (ACL).
Network-based firewalls are implemented in device-specific appliances and
routers. Basically, firewalls in routers filter packets through interfaces to permit
or deny them.
Ports are layer-4 address specified in TCP/IP protocol suit that identify
networking processes running in clients and servers.
ACLs are configured using shell-specific commands. In Cisco IOS, CLI
commands access-list and access-group are used to create and apply ACL on
an interface.
ACL can be named by number ID or a name. Naming ACL is useful to identify
ACL’s purpose.
ACL are classified in Standard ACL, and Extended ACL.
Standard ACL’s number IDs are assigned from 1 to 99. Extended ACL’s number
IDs are from 100 to 199.
Standard ACL only uses source IP address in an IP packet to filter through an
interface. Hence, standard ACL denies or permits all packets (IP) with the same
source IP regardless upper protocols, destination IP address, etc. Example 1:
Router(config)#access-list 8 deny host 172.12.3.5
Extended ACL does filtering packets based on protocol, source IP address,
source port number, destination IP address and destination port number.
Example 2: Router(config)#access-list 102 deny tcp host 10.0.3.2 host
2
172.129.4.1 Deny tcp packets with source IP address 10.0.3.2 and destination IP
address 172.129.4.1.
Since, Standard ACLs only have source IP address; the rule is to apply them in
an interface as closer as possible to the concerning destination network.
For the contrary, the rule for Extended ACLs is to apply them in an interface as
closer as possible to the source IP address.
Use Extended ACL in all iLabs as they are more granular on packets to filter.
Create Extended ACL in global configuration
You can use access-list command options lt, gt, eq, neq, range (less than,
greater than, equal, not equal, range of ports) to do operation with port numbers.
Example 3: access-list 102 deny tcp any host 11.23.45.7 gt 20 denies all
packets with any source IP address to destination IP address 11.23.45.7 and
destination tcp port greater than 20.
Example 4: access-list 107 permit udp any any permits all packets with udp
protocol with any source IP address to any destination IP address.
Extended ACL can do packet filtering based on source port number and
destination port number.
Extended ACL Syntax can be as follows:
access-list <#,name> <protocol> ...
Components of computer systems often have dependencies--other co.pdfalamodeindia1
Components of computer systems often have dependencies
--
other components that must be
installed before they will function properly. These dependencies are frequently shared by
multiple components. For example, both the TELNET client program and the FTP cli
ent
program require that the TCP/IP networking software be installed before they can operate. If you
install TCP/IP and the TELNET client program, and later decide to add the FTP client program,
you do not need to reinstall TCP/IP.
For some components it
would not be a problem if the components on which they depended were
reinstalled; it would just waste some resources. But for others, like TCP/IP, some component
configuration may be destroyed if the component was reinstalled.
It is useful to be able to r
emove components that are no longer needed. When this is done,
components that only support the removed component may also be removed, freeing up disk
space, memory, and other resources. But a supporting component, not explicitly installed, may
be removed
only if all components which depend on it are also removed. For example, removing
the FTP client program and TCP/IP would mean the TELNET client program, which was not
removed, would no longer operate. Likewise, removing TCP/IP by itself would cause the fa
ilure
of both the TELNET and the FTP client programs. Also if we installed TCP/IP to support our
own development, then installed the TELNET client (which depends on TCP/IP) and then still
later removed the TELNET client, we would not want TCP/IP to be remo
ved.
We want a program to automate the process of adding and removing components. To do this we
will maintain a record of installed components and component dependencies. A component can
be installed explicitly in response to a command (unless it is alrea
dy installed), or implicitly if it
is needed for some other component being installed. Likewise, a component, not explicitly
installed, can be explicitly removed in response to a command (if it is not needed to support
other components) or implicitly remov
ed if it is no longer needed to support another component.
Input
The input will contain a sequence of commands (as described below), each on a separate line
containing no more than eighty characters. Item names are case sensitive, and each is no longer
th
an ten characters. The command names (
DEPEND
,
INSTALL
,
REMOVE
and
LIST
) always
appear in uppercase starting in column one, and item names are separated from the command
name and each other by one or more spaces. All appropriate
DEPEND
commands will appear
before the occurrence of any
INSTALL
dependencies. The end of the input is marked by a line
containing only the word
END
.
Command Syntax
Interpretation/Response
DEPEND item1 item2 [item3 ...]
item1
depends on
item2
(and
item3
...)
INSTALL item1
install
item1
and those on which it depends
REMOVE item1
remove
item1
, and those on whch it depends, if possible
LIST
list the names of all currently
-
installed components
Output
.
Lab8 Controlling traffic using Extended ACL Objectives Per.pdfadityacommunication1
Lab8 Controlling traffic using Extended ACL
Objectives
Perform basic configuration tasks on a router.
Applying Static routes and default route.
Exploring the routing table entry.
Applying Extended (named) access control lists (ACLs).
Testing the access control lists (ACLs).
Required Resources
2 Cisco Routers (1841)
2 Cisco Switches (2950-24)
3 Computers
UTP (straight through and cross over) cables
Tasks:
A. Build up the topology.
B. Perform Basic Router Configurations
Steps:
1. Connect the components as shown in Fig 1.
2. Configure the router hostname to match the topology diagram.
3. Configure IP addresses and masks on all devices.
4. Configure a loopback interface (loopback 0) on R2 to simulate the ISP. (search on the internet
how to configure loopback interface)
C. Enable Static route for all networks.
Steps:
1. For Router 1
R1(config)# ip route 192.168.20.0 255.255.255.0 serial 0/0/0
Default root can be configured as:
R1(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.2
2. For Router 2
R2(config)# ip route 192.168.10.0 255.255.255.0 serial 0/0/1
R2(config)# ip route 192.168.11.0 255.255.255.0 serial 0/0/1
D. Verify full IP connectivity using the ping command and the routing table of routers.
Step#1:
For R1 and R2, use the command show ip route, take a snapshot for the resulting routing table,
and discuss the outputs:
*Routing table of R1(Screenshoot)
*Routing table of R2 (Screenshot)
Step#2:
Make sure that the whole network nodes can ping each other.
Before configuring and applying this ACL, be sure to test connectivity from Laptop1 to the
loopback interface (ISP - 209.165.200.225)
E. Configuring an Extended ACL
In this section, you are configuring an extended ACL on R1 that blocks traffic originating from any
device on the 192.168.10.0/24 network to access the 209.165.200.255 host (the simulated ISP).
This ACL will be applied outbound on the R1 Serial 0/0/0 interface.
Steps:
1. Configure a named extended ACL.
R1(config)#ip access-list extended EXTEND-1
R1(config-ext-nacl)#deny ip 192.168.10.0 0.0.0.255 host 209.165.200.225
2. Apply the ACL.
With standard ACLs, the best practice is to place the ACL as close to the destination as possible.
Extended ACLs are typically placed close to the source.
R1(config)#interface serial 0/0/0
R1(config-if)#ip access-group EXTEND-1 out
3. Test the ACL.
From Laptop1; ping the loopback interface on R2.
R1(config-ext-nacl)#permit ip any any
**Please provide full code and screenshoots from Cisco packet tracer.
Table -1 begin{tabular}{|c|ccc|} hline Device & Interface & IP Address & Default Gateway & & & R1
& Fa0/0 & 192.168.10.1/24 & N/A & Fa0/1 & 192.168.11.1/24 & N/A & So/0/0 & 10.1.1.1/24 & N/A
& Fa0/1 & 192.168.20.1/24 & N/A R2 & So/0/1 & 10.1.1.2/24 & N/A & loopback 0 &
209.165.200.225/8 & N/A & & & & & 192.168.10.10/24 & 192.168 .10 .1 hline Laptop1 & NIC &
192.168.11.10/24 & 192.168 .11 .1 hline Laptop2 & NIC & 192.168.20.254/24 & 192.168 .20 .1
hline hline PC3 & NIC & & hline end{tabular}.
Introduction
This Tutorial is On Socket Programming In C Language for Linux. Instructions Give Below will only work On Linux System not in windows.
Socket API In windows is called Winsock and there we can discuss about that in another tutorial.
What is Socket?
Sockets are a method for communication between a client program and a server program in a network.
A socket is defined as "the endpoint in a connection." Sockets are created and used with a set of programming requests or "function calls" sometimes called the sockets application programming interface (API).
The most common sockets API is the Berkeley UNIX C interface for sockets.
Sockets can also be used for communication between processes within the same computer.
you will post on a current political issue that interests you and be.docxemelyvalg9
you will post on a current political issue that interests you and begin the weekly debates. The debate topic will be centered on the content for this week but will include current issues that are happening in politics and government. It is essential to follow the debate guidelines set up in
Week 1
and participate fully in the debate process. Remember debating is not about who is right or wrong, but who can express their ideas in a professional manner using current evidence and a thorough understanding of the issue.
Some potential topics for this week include:
The Supreme Court often makes final judgments on a wide variety of cases. How does their decision affect the legislative review of the law or statute that was involved in the final decision? Discuss some of the ramifications of this decision based on other social issues occurring at the time.
Presidential appointments to the United States Supreme Court impact the judicial philosophy of that body and the outcome of rulings. The first female member of the Court was Associate Justice Sandra Day O’Conner (1981–2006), followed by Ruth B. Ginsburg (1993), Sonia Sotomayor (2009), and Elena Kagan (2010). What impact will these appointments have on the judicial philosophy of the Roberts Court?
Examples of interactions between the legislative and judicial branches of government—how did these interactions take place? Were they mandated in some way? Was there some other outside influence?
Recent examples of preliminary and declaratory judgments.
.
You will examine and summarize the public health responses to your s.docxemelyvalg9
You will examine and summarize the public health responses to your selected issue/topic which is HIV//AIDS...by identifying who is involved and what actions they are taking (the “who” and the “how”). Specifically, the following critical elements must be addressed: IV. Public Health Response: In this section, you will inspect the public health landscape to identify who is involved in responding to your public health issue and what actions they are taking. A. Describe the public health organizations involved in the response to the public health issue at the national and local levels. Use examples that show which entities are working on the issue and what they are doing. For example, what federal and local agencies and/or not-for-profit entities are involved, and what are their roles in the response? B. Explain the specific public health subdisciplines involved in understanding and responding to the issue, including what their roles are. Examples of public health subdisciplines include biostatistics, epidemiology, maternal and child health, and disaster-response planning. C. Explain the public health services involved in the response to the issue. What types of services, programs, or campaigns have been offered by organizations in response to the problem? Be sure to provide examples. Use the Public Health Interventions Worksheet to enter your descriptions. you are using worksheet ATTACHED
.
More Related Content
Similar to Student Name _________________________________ Date _____________SE.docx
Components of computer systems often have dependencies--other co.pdfalamodeindia1
Components of computer systems often have dependencies
--
other components that must be
installed before they will function properly. These dependencies are frequently shared by
multiple components. For example, both the TELNET client program and the FTP cli
ent
program require that the TCP/IP networking software be installed before they can operate. If you
install TCP/IP and the TELNET client program, and later decide to add the FTP client program,
you do not need to reinstall TCP/IP.
For some components it
would not be a problem if the components on which they depended were
reinstalled; it would just waste some resources. But for others, like TCP/IP, some component
configuration may be destroyed if the component was reinstalled.
It is useful to be able to r
emove components that are no longer needed. When this is done,
components that only support the removed component may also be removed, freeing up disk
space, memory, and other resources. But a supporting component, not explicitly installed, may
be removed
only if all components which depend on it are also removed. For example, removing
the FTP client program and TCP/IP would mean the TELNET client program, which was not
removed, would no longer operate. Likewise, removing TCP/IP by itself would cause the fa
ilure
of both the TELNET and the FTP client programs. Also if we installed TCP/IP to support our
own development, then installed the TELNET client (which depends on TCP/IP) and then still
later removed the TELNET client, we would not want TCP/IP to be remo
ved.
We want a program to automate the process of adding and removing components. To do this we
will maintain a record of installed components and component dependencies. A component can
be installed explicitly in response to a command (unless it is alrea
dy installed), or implicitly if it
is needed for some other component being installed. Likewise, a component, not explicitly
installed, can be explicitly removed in response to a command (if it is not needed to support
other components) or implicitly remov
ed if it is no longer needed to support another component.
Input
The input will contain a sequence of commands (as described below), each on a separate line
containing no more than eighty characters. Item names are case sensitive, and each is no longer
th
an ten characters. The command names (
DEPEND
,
INSTALL
,
REMOVE
and
LIST
) always
appear in uppercase starting in column one, and item names are separated from the command
name and each other by one or more spaces. All appropriate
DEPEND
commands will appear
before the occurrence of any
INSTALL
dependencies. The end of the input is marked by a line
containing only the word
END
.
Command Syntax
Interpretation/Response
DEPEND item1 item2 [item3 ...]
item1
depends on
item2
(and
item3
...)
INSTALL item1
install
item1
and those on which it depends
REMOVE item1
remove
item1
, and those on whch it depends, if possible
LIST
list the names of all currently
-
installed components
Output
.
Lab8 Controlling traffic using Extended ACL Objectives Per.pdfadityacommunication1
Lab8 Controlling traffic using Extended ACL
Objectives
Perform basic configuration tasks on a router.
Applying Static routes and default route.
Exploring the routing table entry.
Applying Extended (named) access control lists (ACLs).
Testing the access control lists (ACLs).
Required Resources
2 Cisco Routers (1841)
2 Cisco Switches (2950-24)
3 Computers
UTP (straight through and cross over) cables
Tasks:
A. Build up the topology.
B. Perform Basic Router Configurations
Steps:
1. Connect the components as shown in Fig 1.
2. Configure the router hostname to match the topology diagram.
3. Configure IP addresses and masks on all devices.
4. Configure a loopback interface (loopback 0) on R2 to simulate the ISP. (search on the internet
how to configure loopback interface)
C. Enable Static route for all networks.
Steps:
1. For Router 1
R1(config)# ip route 192.168.20.0 255.255.255.0 serial 0/0/0
Default root can be configured as:
R1(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.2
2. For Router 2
R2(config)# ip route 192.168.10.0 255.255.255.0 serial 0/0/1
R2(config)# ip route 192.168.11.0 255.255.255.0 serial 0/0/1
D. Verify full IP connectivity using the ping command and the routing table of routers.
Step#1:
For R1 and R2, use the command show ip route, take a snapshot for the resulting routing table,
and discuss the outputs:
*Routing table of R1(Screenshoot)
*Routing table of R2 (Screenshot)
Step#2:
Make sure that the whole network nodes can ping each other.
Before configuring and applying this ACL, be sure to test connectivity from Laptop1 to the
loopback interface (ISP - 209.165.200.225)
E. Configuring an Extended ACL
In this section, you are configuring an extended ACL on R1 that blocks traffic originating from any
device on the 192.168.10.0/24 network to access the 209.165.200.255 host (the simulated ISP).
This ACL will be applied outbound on the R1 Serial 0/0/0 interface.
Steps:
1. Configure a named extended ACL.
R1(config)#ip access-list extended EXTEND-1
R1(config-ext-nacl)#deny ip 192.168.10.0 0.0.0.255 host 209.165.200.225
2. Apply the ACL.
With standard ACLs, the best practice is to place the ACL as close to the destination as possible.
Extended ACLs are typically placed close to the source.
R1(config)#interface serial 0/0/0
R1(config-if)#ip access-group EXTEND-1 out
3. Test the ACL.
From Laptop1; ping the loopback interface on R2.
R1(config-ext-nacl)#permit ip any any
**Please provide full code and screenshoots from Cisco packet tracer.
Table -1 begin{tabular}{|c|ccc|} hline Device & Interface & IP Address & Default Gateway & & & R1
& Fa0/0 & 192.168.10.1/24 & N/A & Fa0/1 & 192.168.11.1/24 & N/A & So/0/0 & 10.1.1.1/24 & N/A
& Fa0/1 & 192.168.20.1/24 & N/A R2 & So/0/1 & 10.1.1.2/24 & N/A & loopback 0 &
209.165.200.225/8 & N/A & & & & & 192.168.10.10/24 & 192.168 .10 .1 hline Laptop1 & NIC &
192.168.11.10/24 & 192.168 .11 .1 hline Laptop2 & NIC & 192.168.20.254/24 & 192.168 .20 .1
hline hline PC3 & NIC & & hline end{tabular}.
Introduction
This Tutorial is On Socket Programming In C Language for Linux. Instructions Give Below will only work On Linux System not in windows.
Socket API In windows is called Winsock and there we can discuss about that in another tutorial.
What is Socket?
Sockets are a method for communication between a client program and a server program in a network.
A socket is defined as "the endpoint in a connection." Sockets are created and used with a set of programming requests or "function calls" sometimes called the sockets application programming interface (API).
The most common sockets API is the Berkeley UNIX C interface for sockets.
Sockets can also be used for communication between processes within the same computer.
you will post on a current political issue that interests you and be.docxemelyvalg9
you will post on a current political issue that interests you and begin the weekly debates. The debate topic will be centered on the content for this week but will include current issues that are happening in politics and government. It is essential to follow the debate guidelines set up in
Week 1
and participate fully in the debate process. Remember debating is not about who is right or wrong, but who can express their ideas in a professional manner using current evidence and a thorough understanding of the issue.
Some potential topics for this week include:
The Supreme Court often makes final judgments on a wide variety of cases. How does their decision affect the legislative review of the law or statute that was involved in the final decision? Discuss some of the ramifications of this decision based on other social issues occurring at the time.
Presidential appointments to the United States Supreme Court impact the judicial philosophy of that body and the outcome of rulings. The first female member of the Court was Associate Justice Sandra Day O’Conner (1981–2006), followed by Ruth B. Ginsburg (1993), Sonia Sotomayor (2009), and Elena Kagan (2010). What impact will these appointments have on the judicial philosophy of the Roberts Court?
Examples of interactions between the legislative and judicial branches of government—how did these interactions take place? Were they mandated in some way? Was there some other outside influence?
Recent examples of preliminary and declaratory judgments.
.
You will examine and summarize the public health responses to your s.docxemelyvalg9
You will examine and summarize the public health responses to your selected issue/topic which is HIV//AIDS...by identifying who is involved and what actions they are taking (the “who” and the “how”). Specifically, the following critical elements must be addressed: IV. Public Health Response: In this section, you will inspect the public health landscape to identify who is involved in responding to your public health issue and what actions they are taking. A. Describe the public health organizations involved in the response to the public health issue at the national and local levels. Use examples that show which entities are working on the issue and what they are doing. For example, what federal and local agencies and/or not-for-profit entities are involved, and what are their roles in the response? B. Explain the specific public health subdisciplines involved in understanding and responding to the issue, including what their roles are. Examples of public health subdisciplines include biostatistics, epidemiology, maternal and child health, and disaster-response planning. C. Explain the public health services involved in the response to the issue. What types of services, programs, or campaigns have been offered by organizations in response to the problem? Be sure to provide examples. Use the Public Health Interventions Worksheet to enter your descriptions. you are using worksheet ATTACHED
.
You will engage with intercultural communication outside of class..docxemelyvalg9
You will engage with intercultural communication outside of class. This assignment requires that you interact with and learn about a culture that is di
ff
erent from your own. The important consideration here is
involvement
, not just as a bystander or observer, but
engagement
with people from a cultural group other than your own.
.
You will create a critical book review. It MUST contain the followin.docxemelyvalg9
You will create a critical book review. It MUST contain the following sections:
I. Complete bibliography (APA)
II. A brief italicized summary of the thesis or purpose of the book (I.e., why the book’s author decided to write the book)
III. Critical description and review of main chapters/sections of the book in meeting the author’s purpose in writing the book, and how each of those chapters contributed or did not contribute to that purpose. Things to think about here include:
Is there an adequate, consistent development of the author's purpose throughout the chapters or sections? Why or why not?
What is the author’s purpose, i.e., what does he/she hope to accomplish through this
book? Does the author accomplish the purpose? If so, how does he/she do so? If not,
why not?
Does the author approach the subject with any biases, i.e., do the author’s professional, theological, experiential, philosophical, denominational, or cultural perspectives influence his/her conclusions?
Does the author properly support his/her thesis? Does the author adequately consider and refute opposing viewpoints?
Is the book limited in application to audiences and is the book relevant to contemporary business practices?
IV. A general summary that addresses each of the following:
What are the strengths of the book, i.e., what contributions does the book make?
Why should a person read this book?
What did you learn from this book?
How might you apply the lessons of this book going forward in your academics or career?
Would you recommend the book to others? Why, or why not?
.
You will craft a business report that demonstrates the company’s abi.docxemelyvalg9
You will craft a business report that demonstrates the company’s ability to understand the use of social media for the following purposes: Raise awareness, Influence desire,Encourage trial, Facilitate purchases, Create loyalty.
You will use ONE (1) of the following companies or brands:
Coca-Cola, Red Bull, Nike, Chanel, Uber, Boeing, MAC Cosmetics, LA Dodgers, Pampers, Netflix or McDonald’s
Your assignment is to analyze the brand or business’ use of social media by examining their presence on the following social media platforms:
Facebook
Twitter
Instagram
Pinterest
YouTube
Your report needs to be factual and analytical. Please don’t incorporate your personal feelings or emotional responses. Think of this report as the type of report created by a social media consultancy firm before a first meeting with a client. The goal is to assess where the client is in terms of their social media use while providing a sense of what the firm would/could do for them if they were to hire it. The report should include the following sections (
TIP: Follow the sections below as an outline and write your report with the specific sections!
)
Introduction
: Introduce the company and what it is that they do and why social media is important to their business; HINT: Look at the industry they operate within as well as norms/standards for social media use in that industry; Be succinct. No filler.
Overall summary of social media use and purpose:
Briefly summarize the company’s history with social media and current use of social media along with the overall strategic focus from one or several of the above purposes; Can you identify who manages social media for the business (marketing department, outside social media advertising firm etc.)? Are they using the different tools like Twitter, Instagram Pinterest etc. in ways that are unique or duplicative (of other companies or competitors or even of other platforms—in other words are they saying the same uninspired things over and over again across platform or are they a unique voce that adapts to the platform/medium? How are they leveraging each tool for best effect/impression?
Use of each listed tool:
List how each tool is used; provide examples
Assessment and recommendations:
Assess overall social media use. Make at least three recommendations based upon your assessment and research; HINT: look at strengths, weaknesses, opportunities and threats associated with the firm’s use of social media.
.
You will create a thread in response to the provided prompt for each.docxemelyvalg9
You will create a thread in response to the provided prompt for each forum. Each thread must be at least 400 words, demonstrate course-related knowledge, and integrate at least 2 peer-reviewed articles. In addition to the thread, you will reply to the threads of at least 3 classmates. Each reply must be at least 250 words and contain at least 1 citation from a peer-reviewed journal and 1 from the textbook
The case of Welcome Israel provides another opportunity to analyze individual and organizational approach to change(s) and the impact of those changes. The case provides a synopsis with Ofra Sherman and Glaxo’s situations as the change was unfolding between these two firms. As you reflect on the change in this case study, respond to the following prompts as you prepare your DB thread for this assignment:
What did Glaxo-Welcome do? What should they have done?
Did Ofra Sherman do the right thing? What would you have done?
What was Ofra Sherman’s predicament? How did she get into it?
How do you evaluate her actions as described in the case?
RESPOND TO THIS POST FROM FERGUSON
Wellcome Israel is a pharmaceutical company operating in Israel. Wellcome is being acquired by Glaxo and soon will become Wellcome-Glaxo. This appears to be a hostile bid type takeover to create a large pharmaceutical company. All employees and management were extremely surprised by the takeover and are having a hard time processing it. The main them and problem that will be noted in this post is the lack of communication, direction and vision.
Glaxo-Wellcome is on the way to becoming one of the largest pharmaceutical companies in the world. There is an apparent hostile takeover in progress that no one including Wellcome management is aware of. As with any change there are periods of uncertainty, fear, and anxiety. The main focus is a general manager Ofra Sherman and her team who works for Wellcome Israel through Promedico. This takeover was done in a manner that is very disturbing in the fact that there was no communication and very little guidance throughout the entire process.
What they should have done is really quite simple and that is communicate. As I mentioned before change is a very anxious time and can lead to stress and poor work performance for those involved. “Good communication throughout every stage of the change process is vital to keep everyone informed and motivation levels high.” (Kirke 2012) This takeover shouldn’t have been a surprise to Wellcome and they should have been upfront with employees about what was going to occur and then once the takeover by Glaxo started the communication should have ramped up. I think one of the best ways to have handled this would have been to have teams from both companies setting up meetings so there was a continuous flow of information.
Ofra Sherman in my mind was in a very tough spot once again a lack of communication between all the parties really left her between a rock and a .
you will choose a social issue affecting the workplace and working.docxemelyvalg9
you will choose a social issue affecting the workplace and working environment, and develop a paper that thoroughly discusses the issue from both the workplace and societal viewpoints. Be sure to include the positive and negative aspects of the issue in relation to the workplace, society, and workers, especially the unique worker groups who may be most affected (e.g., women, immigrants, LGBTQ citizens, the working or middle classes, and racial, ethnic or cultural groups). Analyze how the issue could be positively supported using various social controls (e.g., laws, organizational policies/practices, training/education, government or corporate involvement, or social change) and recommend interventions in these areas. In addition, discuss the potential social or economic benefits which may result if your recommendations were implemented.
Choose
one
of the following social issues:
The role of women in leadership
Sexual harassment
Executive versus worker compensation disparity
The gender wage gap
Whistleblowing
The paper must be eight to ten double-spaced pages in length (excluding the title and reference pages) and formatted according to APA style. You must use at least five scholarly sources. Cite your sources in text and on the reference page.
Writing the Paper
The Paper:
Must be eight to ten double-spaced pages in length (excluding title and reference pages), and formatted according to APA style
Must begin with an introductory paragraph that has a succinct thesis statement.
Must address the topic of the paper with critical thought.
Must end with a conclusion that reaffirms your thesis.
Must use at least five scholarly sources
Must document all sources in APA style, as outlined in the Ashford Writing Center.
Must include a separate reference page, formatted according to APA style
.
You will accomplish several acid-base titration exercises to complet.docxemelyvalg9
You will accomplish several acid-base titration exercises to complete this Case Assignment at the following Virtual Laboratory website:
Strong acid versus strong base titration and weak acid versus strong base titration
http://group.chem.iastate.edu/Greenbowe/sections/projectfolder/flashfiles/stoichiometry/a_b_phtitr.html
First read the following article about pH indicators:
http://chemwiki.ucdavis.edu/Physical_Chemistry/Acids_and_Bases/Case_Studies/Acid_and_Base_Indicators
In this experiment you will be analyzing the neutralization between a strong acid and a strong base. According to the Arrhenius Acid-base Theory, when dissolved in water, an acid raises the concentration of hydrogen ion, H
+
while a base increases the hydroxide ion, OH
-
concentration. When reacted together the acid and base will neutralize each other according to the net ionic equation (1).
H
+
(aq) + OH
‐
(aq) → H
2
O(l) (1)
An acid is considered to be strong if it completely ionizes in water. In this lab, you will be using the strong acid, hydrochloric acid, HCl, to neutralize the strong base, sodium hydroxide, NaOH, according to the neutralization reaction below.
HCl(aq) + NaOH(aq) → NaCl(aq) + H
2
O(l) (2)
The progression of the reaction will be observed using a pH meter and a titration curve will be created using the experimental data. You will start with a sample containing only the acid and indicator and slowly add your standardized base. A titration curve is simply a plot of the pH of an acid versus the volume of base added, or vice versa. The titration curve gives a good description of how an acid-base reaction proceeds. The pH will start out low and acidic, then increase as it approaches the equivalence point, where the concentration of acid equals that of the base. Then as the solution becomes more basic, it will slowly rise and level off as an excess amount of base is added. Note that the equivalence point is slightly different from the endpoint of a titration. The endpoint is when the indicator changes color. This does not always correspond to the equivalence point.
As pre-laboratory preparation it is critical that you review the ideas on strong acid-strong base titration presented in your class readings.
Strong acid versus strong base
With your first sample, select an indicator from the two options and do a quick titration by adding 1 mL increments until you reach pH 2.5; then dropwise increments until you reach pH 10.7; after that add 1 mL increments until pH 11.5. Record your buret readings after the addition of each increment. Allow time for the reaction vessel to become equilibrated and for the pH reading to become stabilized and then record the pH value in your notebook alongside the buret reading. Leave an empty column between the buret reading and the pH in which to place the volume of NaOH added (difference between present buret reading and initial buret reading). Stop the titration when you have reach.
You will be creating the front page of The Terrace Gazette. Your.docxemelyvalg9
You will be creating the front page of
The Terrace Gazette
. Your front page will feature the following:
One story that summarizes the story and provides a discussion of the thoughts, actions, and motivations of Troy or Rose.
Two pictures - one should illustrate a major scene in the play; the other should illustrate a particular character. Each picture needs a caption.
One story that provides a detailed analysis of a character through the lens of a particular theme in the text.
One story that provides opinion - It can criticize a character, praise another... it needs evidence.
.
You want to create a study to examine the psychological factors affe.docxemelyvalg9
You want to create a study to examine the psychological factors affecting how teenagers in an impoverished urban area spend their time outside of school.
Use of the scientific method.
•Discussion of which methods you used, why, and potential sources of error.
•Explanation of the relationship between the hypothesis vs. the null hypothesis; and connection to your study.
•Analysis of potential ethical issues, their importance in research, and how to address them.
•Discussion of potential issues regarding culture, gender, diversity, or the environment and how to address them.
•Explanation of which types of sources were used and how these choices may affect results.
•An overview of how you would present your findings and why they can be classified as being within the field of psychology.
.
You will be completing a Spotlight on a selected African nation. .docxemelyvalg9
You will be completing a Spotlight on a selected African nation.
Here is the template for this assignment:
Spotlight template (editable)
These nations cannot be selected as they are covered in the course materials:
Algeria
Congo
Cote d'Ivoire (Ivory Coast)
Ethiopia
Egypt
Ghana
Liberia
Libya
Mauritania
Mali
Rwanda
South Africa
These nations have already been selected by your classmates:
Angola - Kelly
Cameroon - Christopher & Anthony (Because of my error, two are assigned to this nation)
Central Republic of Africa - Roman
Chad - Morgan
Djibouti - Leeann
Gabon - Nicholas
Kenya - Jacob
Madagascar - Jena
Morocco - Dylan
Mozambique - Rosalynn
Namibia - Domique
Nigeria - Avery
Republic of the Congo - Alexus
Senegal - Timothy
Sierra Leone - Evan & Dailaquon (Because of my error, two are assigned to this nation)
Somalia - Cierra
Sudan - Megan
Tanzania - Bobbie
Togo - Jacob
Note: Your instructor will update this list as nations are selected.
.
You receive a document (linked below) by certified mail. After readi.docxemelyvalg9
You receive a document (linked below) by certified mail. After reading the document, prepare a response that summarizes the approach you would take to the citations and penalties that have been proposed. Be sure to include the following in your response:
* steps you are required to take,
* options available to you,
* contacts you would make, and
* documentation necessary to respond to the citations and penalties.
Your response must be a minimum of two pages in length, using at least one reference. All sources must be cited and a reference provide using APA style.
.
You receive a document (linked below) by certified mail. After rea.docxemelyvalg9
You receive a document (linked below) by certified mail. After reading the document, prepare a response that summarizes the approach you would take to the citations and penalties that have been proposed. Be sure to include the following in your response:
steps you are required to take,
options available to you,
contacts you would make, and
documentation necessary to respond to the citations and penalties.
Your response must be a minimum of two pages in length, using at least one reference. All sources must be cited and a reference provide using APA style.
Click
here
to access the OSHA citation document for this assignment.
.
You recently received a Leader of the Year award from a local ci.docxemelyvalg9
You recently received a
Leader of the Year
award from a local civic group. As such, you have been asked to make a speech to a group of management graduates who wish to take up leadership roles in your industry. Write a speech that you would give to this group of graduates.
In your speech, discuss:
The leadership qualities that led to you receiving the award
Your sources of motivation and inspiration to be a good leader
Examples of influences by different colleagues—peers, juniors, and seniors—throughout your tenure as a leader
Please include a 10–12-slide PowerPoint presentation to accompany your speech. Apply APA standards to citation of sources.
Your presentation should include highlights from the speech, such as career progression, influences, mentor information, future goals, etc.
.
Student NameStudent ID No. Assessment Task 2. .docxemelyvalg9
Student Name: Student ID No.:
Assessment Task 2. Case study report. Starbuck’s Coffee (30 marks).
Samson &Daft (2015) pp.346-347
Assessment Criteria
HD
D
C
P
MF
F
Q1. Identification and explanation of Starbuck’s competitive strategy according to Porter. (6 marks)
Q2. Discussion of Schultz’s use of the following to implement the competitive strategy at Starbuck’s. (12 marks)
· Leadership (3 marks)
· Structure (3 marks)
· Information and control systems (3 marks)
· Human resources (3 marks)
Q3. Discussion of strategies and business activities Schultz has used in expanding Starbucks internationally (6 marks).
Academic writing, report format and referencing (6 marks)
· Clear, grammatically correct writing with no spelling mistakes and correct use of the report format (3 marks)
· Correct in-text citations and reference list citing a minimum of four academic references using the APA method (3 marks).
TOTAL MARKS OBTAINED
Grade
Aspects of the assignment which were done well.
Aspects of the assignment which could be improved.
Lecturer: Location: Date:
IMG_4441.JPG
IMG_4440.JPG
.
Student Name Brief #5 Use of Audit Software Review and Survey.docxemelyvalg9
Student Name Brief #5 Use of Audit Software: Review and Survey Date
Central Message: Auditing has had to change from “around the computer” to “through the
computer” due to sources only being available in electronic form. CAATs and CAATTs improve
efficiency and effectiveness of audits. A variety of standards and statements were issued because
new guidance was necessary once the growth of IT affected the nature, timing, and extent of audit
procedures. Continuous auditing is the key to improving the efficiency and effectiveness of audits.
Author’s Theme: Auditors are advised to use CAATs to gather evidence so that they can increase
the efficiency of inspection and analytical review. One of the many statements released on IT, SAS
94, stressed that IT’s impact on internal control is a result of the nature and extent of the system’s
complexity rather than the size of the firm, which is why auditing through the computer is
important when testing controls. Auditors can pinpoint the risk areas and thus have a better idea of
what to inquire when questioning management; improving the quality of the evidence and thus the
audit. Importance: Advancement in information technology has a direct impact on business
processes and the audit. Increasingly, auditors are required to perform audits in computerized
environments; therefore, additional standards are required to ensure that financial statements
auditors continue to perform high quality audits. Conclusion/Opinions: (1) The author concludes
that auditing through the computer is important when testing controls because of the impact IT has
on internal control. GAAS field work #2 supports this because the IT system is a part of the entity’s
environment, and especially, when it is complex, the auditor must audit through the computer to
adequately assess internal control risk. (2) Using CAATs can increase the efficiency of audit
procedures. SAS No. 106 indicates that CAATs allow auditors to inspect electronic evidence directly.
(3) Auditors should use data analysis from audit software in order to pinpoint the risk areas and
gain a better idea of what to ask management. AS # 5 states that risk assessment underlies the
entire audit process, including the determination of significant accounts and relevant assertions,
selecting controls to test, and determining the evidence necessary.
Auditing
Article-Briefs
All Briefs are Individual Assignments
Briefs are one (1) page write-ups of selected articles requiring you to (1) summarize the article with the central message and the author’s theme; (2) discuss 2 reasons why this is an important or unimportant topic for the audit profession; and (3) indicate your agreement or disagreement with 3 of the author’s conclusions or opinions and support your 3 points with different auditing standards (PCAOB, ASB, IAASB, ACFE, IIA etc.). Do not agree or disagree with the standards but agree or disagree with the author. You may NO.
Student Instructions.JPG
Student.xlsx
DocumentationCBAAuthorDatePurposeTo track data on active students at CBAData Definition TableFieldDescriptionData TypeNotesSIDStudent IDNumberLast NameStudent's last nameTextGenderStudent's genderTextMale, FemaleMajorStudent's majorTextAccounting, Finance, Marketing, Management, UndecidedGPAStudent's GPANumberFormat to two decimal placesScholarshipsStudent's receiving scholarshipNumberAccounting format, no decimal placesResidenceStudent's residenceTextIn state, Out of stateClassStudent's classTextFreshman, Sophomore, Junior, Senior
CBA DataSIDLast NameGenderMajorGPAScholarshipsResidenceClass101MccawleyMaleMarketing2.69Out of stateSenior102TatraiFemaleAccounting2.99In stateSophomore103AmukamaraMaleUndecided2.95In stateFreshman104SimonsenFemaleMarketing2.86Out of stateSenior105LarraldeMaleUndecided2.01Out of stateSophomore106ShearerMaleManagement2.32In stateJunior107OttoFemaleUndecided2.39In stateFreshman108BelloffFemaleMarketing2.88In stateSenior109BrizendineMaleManagement2.28In stateJunior110BreitenbachFemaleFinance3.27In stateSophomore111FullerFemaleUndecided2.98In stateFreshman112PomerenkeMaleManagement2.88In stateSenior113JohnsonMaleUndecided2.78In stateFreshman147LopezMaleManagement2.96$ 2,000In stateSenior118ThomasMaleMarketing2.98$ 2,000Out of stateJunior137LunaFemaleAccounting3.23$ 2,000In stateJunior117HullMaleManagement2.97In stateSophomore115LoertscherMaleMarketing3.25$ 2,000In stateSenior119RichardsonMaleMarketing3.85In stateSenior120RomeroFemaleAccounting2.96Out of stateSophomore121AgbebakuMaleUndecided2.99Out of stateFreshman122BocskayMaleAccounting2.27Out of stateSenior123ConnollyFemaleUndecided3.18Out of stateFreshman124CruzFemaleUndecided2.07In stateFreshman125JeffressFemaleFinance2.29In stateJunior126KangFemaleMarketing2.65Out of stateJunior127KreisherFemaleMarketing3.27In stateSophomore128LesinskiFemaleManagement2.85Out of stateJunior129RichMaleMarketing2.92In stateSenior130SantillanFemaleMarketing2.26In stateJunior114NkolMaleManagement3.59$ 2,000In stateSenior132LlanesFemaleUndecided2.07Out of stateFreshman133BrezinaMaleUndecided3.26Out of stateFreshman134ThurowFemaleAccounting2.30In stateSenior135BurnsFemaleManagement2.66Out of stateSenior136LucchesiMaleFinance2.32In stateJunior175DaveyFemaleManagement3.81$ 2,000Out of stateSenior138SchornackMaleManagement2.61Out of stateSophomore139GomezFemaleMarketing2.57In stateJunior140SkaarMaleMarketing2.86In stateSenior141RubinoFemaleManagement2.59In stateSophomore142DecarloFemaleUndecided2.95In stateFreshman143McclellandFemaleMarketing2.65Out of stateSenior144SupanMaleMarketing2.66In stateJunior145WinklerFemaleManagement2.96In stateSenior146GallegosMaleUndecided2.96Out of stateFreshman131SandovalFemaleFinance3.82$ 2,500Out of stateJunior148WaldronMaleUndecided2.93In stateFreshman149PerkinsFemaleMarketing2.57In stateJunior150SappFemaleManagement2.91Out of stateJunior151LicanoFemaleMarketing2.03In stateSophomore152GonzalezFemaleMark.
Student Lab Activity A. Lab # CIS CIS170A-A1B. Lab.docxemelyvalg9
Student Lab Activity
A. Lab # CIS CIS170A-A1
B. Lab 5s of 7: Modularization
C. Lab Overview – Scenario / Summary:
TCOs:
TCO: 7
Given a set of program specifications for a simple business problem utilizing a modular design, code and test a program that meets the specifications and employs best programming practices.
TCO: 8
Given a set of program specifications for a simple business problem, code and test a program that implements methods with parameter lists that are passed as supported by the chosen programming language
This lab will familiarize the student with the process of modularizing his or her code.
D. Deliverables:
Step
Deliverable
Points
5
Program Listing, Output, and Project Files
45
The Dropbox deliverables include the following.
1. Include a zipped file with all the files from your Visual Basic project (see directions in Doc Sharing on how to collect and zip files.)
2. Create a single MS Word document and include the following.
· For each lab, copy and paste your code directly into the MS Word file.
· Include screenshot(s) of your test data with test results. Enter enough data to demonstrate that all your code has been tested.
· Include another screenshot of the Visual Basic build output messages. Check your build output to make sure you have a successful build with (0) errors and (0) warnings. NOTE: The build output messages appear at the bottom of your window after you click the Build menu and before you click the Start Without Debugging option. Your build output messages provide a list of compiler warnings or errors and let you know whether your program compiled successfully.
· Include the Word document as part of the zipped project file.
3. Upload each part of the lab into its corresponding weekly Dropbox.
E. Lab Steps:
Preparation:
If you are using the Citrix remote lab, follow the login instructions located in the iLab tab in Course Home.
Locate the Visual Studio 2010 Icon on the desktop. Click to open.
Lab:
Step 1: Create a New Project
Create a new project in VB.NET. Name your project CIS170A_Lab05.
Practically every real-world professional program in existence today uses some type of modular design—this is just the way programs are designed and built. As a result, the primary objective of this lab is for you to understand how modular programs are designed and how data are passed between modules as the program is executing. This may be one of the most important lessons of this course, so it is critical that you focus on the modular design of the program; if you have any questions, post them to the Lab Forum threaded discussion.
In this project, we are going to use the Week 4 Hockey Player Statistics program that you created last week as a starting point and make a few minor changes in the program requirements. What you will do is take the existing project and with only slight modifications to the form design you will modularize the design of the code and then add a few new requirements. As you .
Student Name:________________
1. Article Title, Author, Date and Source:
Transmission Unaccomplished, John Authers September 24
th
2010 Financial Times Page 12
2. Article Summary:
“Transmission Unaccomplished” written in the Lex section of Friday’s Financial Times
offers an interesting and simplified perspective of the complex and sophisticated purpose and
workings of monetary policy. At a time when the world is reeling from the effects of
misunderstood monetary policy in the United States and other nations around the globe, this
article clearly cuts to the heart of the matter, provides a simple, easy to understand analogy
relating monetary policy to an automobile. The authors describe the key moving parts of the
economy as they correlate to their counterparts in an automobile. While he labor and
resources constitute the fuel of the economy, technology and institutions correspond to the
engine, and commerce is depicted as wheels. The financial system is the transmission,
responsible for moving the power and energy created by the fuel and engine to the wheels.
This simple analogy helps frame the context for the reason why central bankers – the
transmission mechanics – were facing increasing difficulty. In particular, the 1.6 % drop in
the dollar’s value, the lack of real economic turn-around, and the lagging increase in GDPs
around the world. The authors seem to think the US, despite an increasing saving rate and
10% deleveraging, still has long ways to go on the road to recovery, and the automobile
analogy suggests, is in need of significant repairs and rebuilding before it is truly road worthy.
3. How is the article is related to the readings and class discussions?
The concepts in the article mesh with the readings in chapters 3 – 5 as a current, real world
depiction of how monetary policy influences decisions in economics. The article highlights the
need for central bankers to properly manage monetary policy in order to maintain the
transmission of the vehicle, and keep the proper amount of power moving from the motor to the
wheels. It questions the true value of quantitative easing, and highlights the ramifications of
pursuing excessive QE as a policy. Just as was discussed in the first five chapters of the text
book, monetary policy involves a delicate balance of adjusting interest rates, setting currency
value, and establishing guidelines that enable prosperity and growth. The article also identifies
too much intervention as a possible means for enhancing the problems we face, rather than
ameliorating the problems.
4. What did I learn from this article?
This article certainly helped put monetary policy, something I seem to be familiar with only
through studying politics and economics, into a very concise, easy to understand framework that
enables a deeper understanding of greater associated issues. I learned that the US liabilities are
Student .
Student ID 52421157 Exam 250758RR - Essentials of Psycho.docxemelyvalg9
Student ID: 52421157
Exam: 250758RR - Essentials of Psychology Webinar Exam
When you have completed your exam and reviewed your answers, click Submit Exam. Answers will not be recorded until you
hit Submit Exam. If you need to exit before completing the exam, click Cancel Exam.
Questions 1 to 20: Select the best answer to each question. Note that a question and its answers may be split across a page
break, so be sure that you have seen the entire question and all the answers before choosing an answer.
1. Prozac, Celexa, Zoloft, Paxil, and Lexapro are common drugs used to treat
A. psychosis.
B. obsessive compulsive disorder.
C. depression.
D. anxiety.
2. According to the DSM-IV-TR and your text, several different mental disorders are currently recognized.
Which symptoms and subcategories are correctly aligned?
A. Dissociative disorders: multiple personality disorder, dissociative amnesia, and dissociative fugue
B. Schizophrenia: hypochondriasis and conversion disorder
C. Mood disorders: disorganized, paranoid, catatonic, and undifferentiated
D. Somatoform disorders: generalized anxiety, panic, obsessive compulsive disorder, and PTSD
3. All of the following are common changes that occur in adulthood except
A. divorce.
B. life reviews.
C. menopause.
D. midlife transitions.
4. What are the purposes of dreams, according to Freud?
A. Unconscious wish fulfillment
B. Both
C. Neither
D. Dreams for survival
5. Behavioral therapy would employ all of the following treatment techniques except
A. meditation.
B. aversive conditioning.
C. systematic desensitization.
D. exposure treatment.
6. If you believe that the body is a machine and will eventually stop working efficiently, you believe in the
_______ theory.
A. genetic preprogramming theory
B. disengagement theory
C. wear-and-tear theory
D. second shift theory
7. The textbook discusses the DSM-IV TR. What does that mean?
A. Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition Transfers
B. Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition Text Revision
C. Diagnostic and Statistical Manual of Mental Dementia, Fourth Edition Text Revision
D. Diagnostic and Statistical Manual of Mental Dementia, Fourth Edition Transfers
8. The James–Lange theory says that emotional experience is a reaction to
A. a combination of bodily events occurring as a result of external situation and physiological arousal and emotional experience.
B. bodily events occurring as a result of an external situation.
C. a combination of nonspecific kinds of physiological arousal and its interpretations.
D. both physiological arousal and emotional experience as well as nerve stimuli.
9. The scientific method involves
A. theories and operational definitions as well as hypotheses and research.
B. hypotheses and research.
C. theories and operational definitions.
D. neither theories and operational definitions nor hypotheses and research.
10. The foll.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Student Name _________________________________ Date _____________SE.docx
1. Student Name _________________________________ Date
_____________SEC450 iLab3 Report
Initial Configuration ISP Router
version 12.3(4)T7
!
hostname ISP_Router
!
interface FastEthernet0/0
ip address 200.100.0.1 255.255.255.0
!
interface FastEthernet1/0
ip address 200.100.40.1 255.255.255.0
!
interface Serial0/0
ip address 200.100.10.1 255.255.255.0
!
interface Serial0/1
ip address 200.100.20.1 255.255.255.0
!
router rip
network 200.100.0.0
network 200.100.10.0
network 200.100.20.0
network 200.100.40.0
!
line con 0
line aux 0
line vty 0 4
password cisco
line vty 5 15
password cisco
!
2. end
Note: RED text indicates the required questions to answer
Task to Set up Security Policy for Offsite Database Server
#1. Explain the meaning of the "three P's" best practice rule to
create ACL in routers
#2. Explain the difference between the following two access-
list commands
a) access-list 101 permit tcp any any eq 80
b) access-list 101 permit tcp any eq 80 any
#3. What are well-known, registered, and ephemeral UDP/TCP
ports?
3. #4. What is wrong with ACL 105?
access-list 105 permit tcp any any
access-list 105 deny tcp host 201.141.0.3 any
#5. What well-known TCP port does Oracle Database (sql net)
server use?
#6. A company is managing an Oracle Database located in a
Public Server to support day-to-day operations in Dallas and
Chicago networks. The company has requested its Internet
Access Provider (ISP) to create the necessary ACL at the ISP
router securing that only responses from Oracle server to certain
hosts are allowed to enter Dallas and Chicago LANs.
ISP network engineers decided to use extended ACL, and
applies it to F0/0 interface in ISP router. Why did they decide
to create an extended ACL and apply it in interface F0/0 for
inbound traffic?
4. #7. Copy below ISP router’s initial running-config file from
page 2, and add the commands needed to create and apply the
ACL in the ISP router.
Answer all questions in this document and upload it in Week 3
iLab Dropbox.
3
Revision Date: 1103
1
SEC450 ACL Tutorial
This document highlights the most important concepts on
Access Control List (ACL) that
you need to learn in order to configure ACL in CLI. This
tutorial does not intend by any
mean to cover all ACL applications, but only those scenarios
used in then SEC450
5. iLabs.
Introduction to Access Control List
-based firewall essentially works closing and/or
opening ports in a
computer. The engine behind firewalls is built with Access
Control Lists (ACL).
-based firewalls are implemented in device-specific
appliances and
routers. Basically, firewalls in routers filter packets through
interfaces to permit
or deny them.
-4 address specified in TCP/IP protocol suit
that identify
networking processes running in clients and servers.
-specific commands. In
Cisco IOS, CLI
commands access-list and access-group are used to create and
apply ACL on
an interface.
6. useful to identify
ACL’s purpose.
Extended ACL’s number
IDs are from 100 to 199.
filter through an
interface. Hence, standard ACL denies or permits all packets
(IP) with the same
source IP regardless upper protocols, destination IP address,
etc. Example 1:
Router(config)#access-list 8 deny host 172.12.3.5
source IP address,
source port number, destination IP address and destination port
number.
Example 2: Router(config)#access-list 102 deny tcp host
10.0.3.2 host
7. 2
172.129.4.1 Deny tcp packets with source IP address 10.0.3.2
and destination IP
address 172.129.4.1.
to apply them in
an interface as closer as possible to the concerning destination
network.
in an interface as
closer as possible to the source IP address.
on
packets to filter.
Create Extended ACL in global configuration
-list command options lt, gt, eq, neq,
range (less than,
greater than, equal, not equal, range of ports) to do operation
with port numbers.
8. Example 3: access-list 102 deny tcp any host 11.23.45.7 gt 20
denies all
packets with any source IP address to destination IP address
11.23.45.7 and
destination tcp port greater than 20.
Example 4: access-list 107 permit udp any any permits all
packets with udp
protocol with any source IP address to any destination IP
address.
number and
destination port number.
access-list <#,name> <protocol> host <source_ip>
<port_qualifier>
<source_port_number> host <dest_ip> <port_qualifier>
<dest_port_number>
where:
<#,name> is a number between 100 to 199 or a one-word name
<protocol> is any protocol in the TCP/IP suite
<source_ip> & <dest_ip> are the source and destination IP
9. addresses
<port_qualifier> is optional, and can be eq, gt, lt, neq, & range
<source_port_number> & <dest_port_number> follow
<port_qualifier> to specify the
port number(s). <port_qualifier> and <port_number> can be
replaced by the application
protocol. Example, http instead of eq 80
protocol, per
interface, per traffic direction”.
in CLI global
configuration using access-list command(s). Then, apply the
ACL using
access-group command in CLI interface configuration.
3
-list commands.
10. Routers process the
ACL commands in order; top first to bottom last.
-list command depends upon
previous access-list
commands. Therefore, always write the commands in order;
more-specific-traffic
commands first, and, more-generic-traffic commands last.
Example 5:
Router(config)#access-list 101 deny tcp host 10.0.3.2 any
Router(config)#access-list 101 permit tcp any any
But never follows the order below, because the second
command is worthless.
Router(config)#access-list 101 permit tcp any any
Router(config)#access-list 101 deny tcp host 10.0.3.2 any
-list command at the end that
denies all packets
(i.e. deny ip any any). Hence, packets that are not specifically
permitted in a
command will be denied by the ACL.
Example 6: Use command Router(config)#access-list 105
permit ip any any at
11. the end of ACL if it requires to permit all other traffic after
denying packets with
Router(config)#access-list 105 deny icmp any host
192.168.10.244
-list commands to filter
packets from a subnet
of source and/or destination IP addresses instead of single
hosts. IP addresses
in each of those subnets must be continuous. Here the syntax.
Filtering on port
numbers is also applicable, but it have been omitted for the sake
of simplicity.
access-list <#,name> <protocol> <source_ip>
<source_wildcard> < <dest_ip>
<dest_wildcard>
where:
<#,name> is a number between 100 to 199 or a one-word name
<protocol> is any protocol in the TCP/IP suite
<source_ip> & <dest_ip> are the source and destination IP
addresses
<source_wildcard> & <dest_wildcard> specify the subnet
ranges of source and
12. destination IP addresses
protocols such as EIGRP
and OSPF. Wildcard bit 0 means the bit in the IP address must
be the same as
the corresponding bit in the subnet IP addresses. Wildcard bit 1
means the bit in
the IP address can be any value (0 or 1).
Example 7: access-list 105 deny udp 172.16.7.3 0.0.0.3 any
means to deny
all packets with udp protocol with source IP addresses from
172.16.7.0 to
4
172.16.7.3 to any destination IP address. Note that .3 means in
binary
.00000011 and .000000xx for wildcard.
Example 8: access-list 109 permit tcp host 192.168.6.3 eq 80
10.0.0.0
13. 0.0.0.255 means to permit all tcp packets from source IP
address 192.168.6.3
and source port tcp 80 (i.e. http server) to destination IP
addresses in the subnet
10.0.0.0 to 10.0.0.255. The fact that 10.0.0.0 would not qualify
for host IP in
classful networks has been ignored for simplicity.
host in access-list
commands. Example 9:
access-list 110 permit ip host 10.23.4.3 host 10.30.2.1 and
access-list 110 permit ip 10.23.4.3 0.0.0.0 10.30.2.1 0.0.0.0 are
equivalent
commands. Both permit filtering packets with source IP address
10.23.4.3 and
destination IP address 10.30.2.1.
-list commands when the ACL
requires filtering
packets on subnet of IP addresses; either at source, destination
or both.
Apply to an Interface a created ACL
14. that permits filtering
any traffic excepting udp packets with source IP address
10.23.4.3 and
destination IP address 10.30.2.1 as shown in the network
diagram below.
configuration.
Router#config t
Router(config)#access-list 103 deny udp host 10.23.4.3 host
10.30.2.1
Router(config)#access-list 103 permit ip any any
the source. The
interface is S0/1 in Router for traffic coming from IP 10.23.4.3.
Router(config)#interface s0/1
Router(config-if)#ip access-group 103 in
5
15. then erase first the
ACL from global and interface configurations. To erase ACL
103 from the
previous example execute the following commands:
Router(config)#no ip access-list 103
Router(config)#interface s0/1
Router(config-if)#no ip access-group 103
Now, you can start over creating ACL 103. If you do not erase
the ACL first, then
access-list commands will be compounding in the configuration
file producing
unexpected behavior. Use command show run to verify the
ACL is erase and
created again correctly.
Verify ACL Configuration
in a router R to
deny TCP traffic coming through interface Serial 0/2 from
source IP address
10.16.2.1 to destination IP address172.16.5.3 with destination
port number
greater than 200. Then, the ACL should permit filtering any
other traffic.
16. ed to do in CLI.
First, create the ACL.
Second, apply the ACL to interface Serial 0/2.
R> enable
R# config t
R(config)# access-list 101 deny tcp host 10.16.2.1 host
172.16.5.3 gt 200
R(config)# access-list 101 permit ip any any this command is
needed to permit any
other traffic after denying the one from previous command.
R(config)# interface serial0/2
R(config-if)# ip access-group 101 in this command is to apply
the ACL to serial0/2 for
traffic coming in.
R(config-if)# exit
R# show run this is to verify the ACL configuration is correct in
running-config.file
R#show running-config
version 12.3
!
hostname R
!
17. interface FastEthernet0/0
ip address 192.168.200.1 255.255.255.0
!
interface FastEthernet0/1
ip address 192.168.20.1 255.255.255.0
shutdown
!
interface Serial0/0
ip address 200.100.20.2 255.255.255.0
6
!
interface Serial0/1
ip address 192.168.30.2 255.255.255.0
shutdown
!
18. interface Serial0/2
ip address 192.168.40.1 255.255.255.0
ip access-group 101 in
!
router rip
network 192.168.200.0
network 200.100.20.0
!
ip default-network 200.100.20.0
ip route 0.0.0.0 0.0.0.0 serial0/0
!
!
access-list 101 permit tcp host 10.16.2.1 host 172.16.5.3 gt 200
access-list 101 permit ip any any
!
!
line con 0
line aux 0
19. line vty 0 4
password cisco
line vty 5 15
password cisco
!
end
below and start over
again
R# config t
R(config)# no access-list 101
R(config)# interface serial0/2
R(config-if)#no ip access-group 101
Student Name _________________________________ Date
_____________Database Server Security Demands – iLab3
Objectives
In this lab, the students will examine the following objectives.
· Become familiar with well-known and ephemeral ports
· Create ACL to meet requirements on database security
demands
· Learn best practices to create and apply ACLs.
Scenario
A small company is using the topology shown below. The
20. Public Server is actually an off-site Database Server that
contains company records. Assume that the 200.100.0.0/16
network represents the Internet. The Dallas and Chicago Servers
and hosts need to access the database server securely. Only
users in the Dallas and Chicago LANs should be able to access
the database server.
Topology
The last page of the lab assignment document contains a full-
page topology. Remove this page and use it for reference to the
topology and the IP addresses.
21. Initial Configuration
The Dallas, Chicago, and ISP Routers’ FastEthernet and Serial
interfaces used for the lab have been correctly configured and
enabled. Unused interfaces have been shutdown. The RIP
routing tables are complete for all routers and hosts. No ACLs
have been applied to any of the routers. Below is the initial
running-config file in ISP router.
version 12.3(4)T7
!
hostname ISP_Router
!
interface FastEthernet0/0
ip address 200.100.0.1 255.255.255.0
!
interface FastEthernet1/0
ip address 200.100.40.1 255.255.255.0
!
interface Serial0/0
ip address 200.100.10.1 255.255.255.0
!
interface Serial0/1
ip address 200.100.20.1 255.255.255.0
!
router rip
network 200.100.0.0
network 200.100.10.0
network 200.100.20.0
network 200.100.40.0
!
line con 0
line aux 0
line vty 0 4
22. password cisco
line vty 5 15
password cisco
!
end
Lab Data Collection and Submission
Download and open the lab document file: SEC450_DB-
SecurityDemands_Report.docx. Enter your name and date at the
top of the lab document. As you complete each task of the lab
assignment entering all relevant configuration commands, and,
answered questions (as specified in the iLab assignment) into
this lab document. You will submit the completed
SEC450_DB_SecurityDemands_Report.docx file into the this
week’s eCollege iLab Dropbox.
Note: RED text indicates the required questions to answer
Task to Set up Security Policy for Offsite Database Server
The following requirements were given to the network engineer
to create and apply ACL 100 in ISP router
1. Permit SQL database traffic from the Public server to the
Dallas Host.
2. Permit SQL database traffic from the Public server to the
Dallas Server.
3. Permit SQL database traffic from the Public server to the
Chicago Host.
4. Permit SQL database traffic from the Public server to the
Chicago Server.
5. Deny all other TCP traffic from the Public server to any
destination.
6. Permit all other traffic.
#1. Explain the meaning of the "three P's" best practice rule to
23. create ACL in routers
#2. Explain the difference between the following two access-
list commands
a) access-list 101 permit tcp any any eq 80
b) access-list 101 permit tcp any eq 80 any
#3. What are well-known, registered, and ephemeral UDP/TCP
ports?
#4. What is wrong with ACL 105?
access-list 105 permit tcp any any
access-list 105 deny tcp host 201.141.0.3 any
24. #5. What well-known TCP port does Oracle Database (sql net)
server use?
#6. A company is managing an Oracle Database located in a
Public Server to support day-to-day operations in Dallas and
Chicago networks. The company has requested its Internet
Access Provider (ISP) to create the necessary ACL at the ISP
router securing that only responses from Oracle server to certain
hosts are allowed to enter Dallas and Chicago LANs.
ISP network engineers decided to use extended ACL, and
applies it to F0/0 interface in ISP router. Why did they decide
to create an extended ACL and apply it in interface F0/0 for
inbound traffic?
#7. Copy below ISP router’s initial running-config file from
page 2, and add the commands needed to create and apply the
ACL in the ISP router.
25. Answer all questions in the iLab Report document and upload it
in Week 3 iLab Dropbox.
4
Revision Date: 1103