Friedrich schleiermacher’s on religion attempts to answer
ÿÿ
Due April 29 ? Enlightenment and Revolutionsÿ
READ the attached documents: excerpts from Thomas Paine, Age of Reason; Friedrich Schleiermacher, On Religion
WRITE: Friedrich Schleiermacher’s On Religion attempts to answer Christianity’s “cultured despisers.” Having read Schleiermacher and Paine, how do you think would Schleiermacher respond to Paine?ÿ
Use quotes directly from the readings but do so minimally.ÿ
2.5 pages, double spaced.ÿ
MKT235 Post University Social media marketing
In the hypothetical business simulation, let?s assume Apple is interested in breaking into the fashion industry with a new line of iShirts. They plan on leveraging the existing brand equity that they have earned over the past 25+ years. Starting in Unit 2 and ending in Unit 8, you will design and deliver a social media marketing plan.
Source comparison worksheet | LDR711A Leadership Theory And Practice | University of Phoenix
ÿÿ
Reflection question: Both articles addressed the same topic?leadership versus management. What insights can you gain from comparing the two sources? research value? How will you apply these insights in your doctoral research?
Based on the readings, write a 125-word evaluative discussion on the differences and similarities between and among management and leadership.
Include in-text citations and a reference list.
University of the Cumberlands Hi, I need help with this discussion question, thank you.
SUBJECT – 2023 SUMMER – ANALYZING & VISUALIZING DATA (ITS-530-A01) – FIRST BI-TERMWeek 4 Discussion 2When thinking about data visualization, it is important to understand regular expressions in data analytics. Therefore, note the importance of data visualizations and choose two types of expressions (* – wildcards for example) and discuss the difference between the two types of expressions.
The Concept of Outsource Manufacturing Discussion Responses
This week’s discussion is about “Outsourcing and Procurement”:1-)Hello Everyone,After the watching the video I can observe that outsource manufacturing consists of hiring people outside of the company to assemble parts of, or build an entire product. The main reason why companies chose to do this is to cut costs. Labor is often among any company?s largest costs. Outsourcing parts of the production line to a third party in a lower cost location leads to a significant decrease in production costs.Disadvantages of Outsourcing:Although there are several reasons to outsource, according to Webb (2017) there are also disadvantages to the practice such as:Make or Buy Decisions for Manufacturing Industries:The make-or-buy question has always been a concern of complex nature which represents a fundamental dilemma faced by many companies. The cut-throat competition compels all the manufacturing and services companies to re-evaluate their existing processes, technologies, products and services in order to find an opportunity to positively impact the bottom line by making strategically drawn out make-or-buy decisions (Sillanpaa, 2015). The make-or-buy decision is the act of making a strategic choice between producing an item internally (in-house) or buying it externally (from an outside vendor). The video described that, outsourcing decisions are based on the difference in the cost of purchasing or buying a product or service from an external supplier compared to the cost of producing the item or providing the service in house. One important aspect of cost management is determining whether to make or buy components in a product. A complete and correct assessment of the various elements of the cost is essential to make sound economic decisions.Kraljic?s Supply Matrix:The supplier suffers from a range of risks depending on its geographic location, business model and supply chain length. If the vendor is based in Switzerland, it is unlikely that political uncertainty or logistical delay will impact upon operations. On the other hand, facilities based in the developing world may be subject to legislative risk, political upheaval and unreliable transportation routes. According to Webb (2017), all such risk factors have bearing upon the buying company. Profitability describes the impact of a supply item upon the bottom line. For certain areas of spend, such as stationery, supplies have only a negligible effect on profits. In other categories, a single source of supply can make or break a business. For Apple, a large proportion of its profits are determined by Foxconn?s ability to manufacture the scale of products required to a precise specification.2-)Outsourcing and ProcurementIn this video Dr. Millar present topics on outsourcing, names of some companies that outsource, the products they outsource, reason for outsourcing, issues with outsourcing, benefits and risks involved, framework for make-buy model, hierarchical model for outsourcing decision, procurement strategy, link between procurement and outsourcing, and types of e-market . Outsourcing is a common activity and is on the rise due to its use by manufacturing and electronic industry. The concepts learned from this video are benefits of outsourcing, risks of outsourcing, Hierarchical Model for outsourcing decision and Kraljic Supply Matrix.Benefits of OutsourcingEconomies of scale allows cost to decrease both in purchasing and manufacturing due to bigger orders or multiple orders. In other words, as the business grows or due to bulk product ordering cost of product can be reduced thus increasing profit.Risk pooling is the ability for suppliers to spread the risk of demand and supply. Outsourcing allows transferring the risk of uncertainty to suppliers through the effect of risk-pooling.Reduce capital investment allows to save the money allocated for the function or support of an activity. By transferring some of the non-core activities to the supplier, the cost of maintaining those activities are also transferred to the supplier.Focus on core competency allows focusing on the talent available inside the organization so that performance can be increased.Increased flexibility allows making use of talent available outside the organization (Millar, 2013, February 22).Risks of outsourcingLoss of competitive knowledge even though outsourcing can be considered an effective way to compete in the business world. Care must be taken not to outsource the processes at what the company is specialized at.Conflicting objectives when an organization outsources only product and services are transferred not the responsibility of meeting quality and customer satisfaction. Therefore the organization can lose visibility as well as direct control on its transferred operations (Millar, 2013, February 22).3-)In the shared video, Miller has explained procurement and outsourcing with few examples. Below are the few points which are discussed in the video:Outsourcing:Outsourcing is a process where an organization assign or delegate some organization?s activities to outside company by seeking benefits or fulfill some business need. Initially, manufacturing used to outsource, nowadays product design and innovation get outsourced. Benefits can get in terms of cost savings, competitive advantage, focus on core business etc. Likewise, outsourcing provides many advantages to organizations, whereas it can bring dependency issues. It can be competitive knowledge sharing to competitors. Therefore, in outsourcing secondary activities of business outsourced to other companies.In general, there are two main reasons to outsourcing; dependency on capacity (Knowledge and Skills) and dependency on knowledge. Based on the product is modular or integral, outsourcing decision may differ. There are few parameters that need to consider while outsourcing, those are customer importance, component clock speed, competitive position, capable suppliers and architecture.Procurement:Procurement is the process of finding and acquiring the goods, services or works from the external organizations. Procurement decision should be made considering few parameters like types of products the firm is purchasing, level of risks and uncertainty involved.Kraljic?s Supply Matrix:This matrix works on two dimensions; one is profit impact and another is supply risk. Using these two dimensions, firm can decide where they land while procuring any service or product.E-market:In a procurement process, getting suitable suppliers to business is challenging. Suppliers price negotiation depends on demand and supply gap. If the demand of procurement thing is high and supply is less, then suppliers offers high prices and vice versa. E-market provides a platform where may suppliers easily accessible and firm can find suitable suppliers easily. Advantages of e-market are; flexible revenue model and open market. There are two ways e-market service is accessible; one is licensing fees and second is subscription fee. Install.com for food service industry and Pefa.com for a fresh fish market are two examples of e-market.
Responses week 1 | Computer Science homework help
Provide (4) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1, 2, 3 and 4 below. Ensure you list and break down each response in a word document. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.
RESPONSE 1:
ISSC 471
1. What is IT Security Auditing? What does it involve?
An IT security audit is a comprehensive examination and assessment of an information security system. By conducting regular audits, organizations can identify weak spots and vulnerabilities in their IT infrastructure, verify security controls, ensure regulatory compliance, and more. It involves running scans on IT resources like file-sharing services, database servers and SaaS applications to assess network security, data access levels, user access rights and other system configurations. It includes physically inspecting data centers for resilience to fires, floods, and power surges as part of a disaster recovery evaluation. Finally, it involves interviewing employees outside the IT team to assess their knowledge of security concerns and adherence to company security policy.
2. Why are Governance and Compliance Important?
To ensure that businesses protect their information, have consistent cohesion departmentally, and follow all governmental regulations, a governance, risk, and compliance program is important. This helps to minimize the threats and risks that companies are exposed to on a daily basis.
3. Explain in detail the roles and responsibilities in an organization associated with the following:
According to our lesson, the risk manager, auditor, and executive manager have the following responsibilities:
Risk Manager – responsible ÿÿÿÿÿfor identifying organizational risk.
Auditor – responsible for ÿÿÿÿÿconducting information assurance audit and applying frameworks to the ÿÿÿÿÿseven domains to align with compliance.
Executive Manager – responsible ÿÿÿÿÿfor aligning external or internal compliance with governance requirements.
4. Define the Certification and Accreditation (C&A) Process and briefly discuss the phases of C&A.
It is my understanding that the C&A process is outdated, and we now use assessment and authorization (A&A) to follow terminology in the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). In my job, we follow NIST guidelines, and all of our accreditation processes follow the RMF process. The C& process was initiation and planning, certi?cation, accreditation, and then continuous monitoring. Though I never worked with the C&A process, I have been working with RMF for about 2 years now, and it is very involved.
References:
Tierney, M. (2020, Aug 5) IT Security Audits: The Key to Success. Retrieved from: https://blog.netwrix.com/2020/04/09/it-security-audit/
Hall, K.T. (n.d.) Why a Governance, Risk, and Compliance Program is Important for Your Business. Retrieved from: https://www.scripted.com/writing-samples/why-a-governance-risk-and-compliance-program-is-important-for-your-business
Sengupta, S. (2018, Apr 13) Cyber Security ? Certification and Accreditation. Retrieved from: https://www.nxtkey.com/cyber-security-certification-and-accreditation
-JAMIE
RESPONSE 2:
1. What is IT Security Auditing? What does it involve?
According to the reading this week an IT Security Audit is an internal assessment of an organizations policies, controls, and activities. An audit ensures that an organization is in compliance with legal regulations and that their security controls are adequate. Audits can involve any number of aspects within a business? activities including finances, compliance, operations, investigations and information technology. An IT Security Audit also involves three goals, providing an objective and review of policies, providing reasonable assurance controls are in place, and recommendations for improvement.
ÿ2. Why are Governance and Compliance Important?
As businesses become ever more reliant on technology governance and compliance become a more integral part of business function. Governance of IT systems ensures proper use as well as compliance and risk management, all vital to the success in a business environment. Compliance is important and beneficial to all aspects of a business, it ensures the reliability as well as public trust of a business which is vital to the business? success.
ÿ3. Explain in details the roles and responsibilities in an organization associated with the following:
ÿÿÿRisk Manager- A risk manager is familiar with the risks and vulnerabilities that an organization faces, as well as creating and evaluating risk management procedures. They are also responsible for knowing auditing controls as well as reporting procedures (Patel, 2016)ÿÿÿÿAuditor- The roles and responsibilities of an auditor include assessing current security controls and risk management procedures, advise management on how to improve security controls, evaluate risks, and analyze internal operations (Kumar, 2017)ÿÿÿÿExecutive Manager- The Executive Manager is responsible for ensuring their department is aligned with company vision and goals. They help to create and implement policies and procedures, and they make business decisions, such as security policy changes, based on the information received from the risk manager and auditor (Woodman, 2018)
4. Define the Certification and Accreditation (C&A) Process and briefly discuss the phases of C&A.
The Certification and Accreditation process is a standardized process, activities, and management to validate, implement and ensure security. The phases of the C&A process include Phase I Initiation and Planning: Which defines the C&A effort, it documents the steps needed to achieve the desired accreditation. Phase II Certification: This phase verifies system compliance with the identified security standards. Phase III Accreditation: Here validation is made that the system is compliant and security accreditation is achieved. Phase IV Post Accreditation: This phase continuously monitors the system to ensure it remains compliant with accreditation standards (QTS, 2019).
Alysha Macleod
Kumar N. (2017) Roles and Responsibilities of an Internal Auditor. EnterSlice
Patel N. (2016) A Risk Manager?s Role in Strategic Leadership. NIC State.
https://erm.ncsu.edu/library/article/risk-manager-strategic-leadership
QTS. (2019) The Four Phases of the Certification and Accreditation Process. QTS
https://www.qtsdatacenters.com/resources/articles/the-four-phases-of-the-certification-and-accreditation-process
Woodman C. (2018) Job Description of an Executive Manager. Career Trend
https://careertrend.com/about-6507018-executive-manager-job-description.html
ISSC 341
RESPONSE 3:
There are 7 layers to the Open Systems Interconnection (OSI) model, but I will be discussing layers one and two. The first layer, physical layer, is responsible for the physical cable or wireless connection between the network nodes. It defines the connector, the electrical cable or wireless technology connecting the devices, and is responsible for transmission of raw data (Os and 1s). The second layer, data link layer, establishes and terminates a connection between two physically connected nodes on a network. It is comprised of two parts, Logical Link Control (LLC) which identifies protocols and performs error checking/synchronizes frames. Media Access Control (MAC) uses MAC addresses to connect devices and define permissions to transmit and receive data.
ÿÿÿÿÿÿÿÿÿÿÿIPv6 is the latest version of internet protocol and was introduced in 1998 by the Internet Engineering Task Force (IETF) to solve address space exhaustion. IPv6 uses 128-bit addressing instead of IPv4 32-bit addressing scheme. What that means is IPv4 address method uses four sets of one-to-three-digit number (192.0.2.146), and IPv6 uses eight groups of four hexadecimal digits (2001:0db8:85a3:0000:0000:8a2e:0370:7334). While IPv6 may seem more secure and will eventually replace IPv4 one day, the adoption of it has been delayed because there?s a dual stack requirement. IPv6 is not backwards compatible with IPv4. There is a problem with the network address translation (NAT), which takes private IP address and turns them into public IP addresses.
ÿÿÿÿÿÿÿÿÿÿÿIPv4 allows for a variation of the network and host segments of an IP address, known as subnetting. It can be used to design a network physically and logically. Subnetwork addresses enhance local routing capabilities, while reducing number of address required. The subnet mask is used to show what part of the addresses is the network portion and what part is the host portion. In IPv4, there are 3 default subnet masks corresponding to three classes of IP address.
ÿÿÿÿÿÿÿÿÿÿÿHope everyone is having a great start to their week!
Regards,
Al
Works Cited:
McKeever, G., Sillam, Y., R.M., Hathaway, M., Houcheime, W., P.W., Kerman, D., Lynch, B., Hewitt, N., & Ray, T. (2020, June 10). What is OSI Model | 7 Layers Explained | Imperva. Learning Center. https://www.imperva.com/learn/application-security/osi-model/
Fruhlinger, K. S. A. J. (2020, August 26). What is IPv6, and why aren?t we there yet? Network World. https://www.networkworld.com/article/3254575/what-is-ipv6-and-why-aren-t-we-there-yet.html
Google IPv6 adoption Statistics. (2020). IPv6. https://nfware.com/blog-what-is-ipv6
IPv4 subnetting. (2021). IPv4 Subnetting. https://www.ibm.com/docs/en/zos/2.4.0?topic=internetworking-ipv4-subnetting
-ALI
RESPONSE 4:
1. For this discussion, compare and contrast two layers of the Open Systems Interconnection (OSI) Reference Model, including the protocols that run on each layer.ÿ
The Open Systems Interconnection (OSI) Reference Model consist of 7 layers and they are from top to bottom application, presentation, session, transport, network, data link and physical. The architecture of the OSI reference model is separated into 7 layers so it aids in development, design, and troubleshooting and provides changes in one layer without effecting the other therefor all layers are equally important. These 7 layers of OSI reference model are divided into 2 groups upper (top 3 layers) and lower layers (bottom 4 layers). The upper layers define communication between the applications of the end users and the lower layers define how the data is transmitted between the two applications. Common protocols used in the layers are TCP, IP/IPX and Ethernet for the lower group and for the upper group HTPP, SSL and RPC just to name a few.ÿ
2. What was the reason that IPv6 was introduced? Why do you think many organizations are not
upgrading their network solely to IPv6 and run that protocol instead of running IPv4?
IPv6 was introduced for its capacity over the IPv4, IPv4 is out of IP addresses and holds 4.3 billion addresses. With the growing devices like the smartphone, tablets, computer and other devices IPv4 was not able to support which gave birth to IPv6 which supports 128 bit addressing. Many organizations are not upgrading because IPv4 is enough for the company and because the internet at large doesn?t support IPv6 end to end there is a need to encapsulate IPv6 traffic into IPv4.
3. What is the purpose of subnetting when using IPv4 addressing? What role does subnet mask play in subnetting of IPv4?
Subnetting provides network security, better performance while providing clean separation for troubleshooting. Subnet mask plays important part of masking the IP address. Looking forward to reading other post and learning the role of IPv4 and 6 as my knowledge on the subject is limited. Have a good rest of the week.
References:
Imperva. (n.d.). What is OSI Model | 7 Layers Explained | Imperva? Learning Center. Retrieved from https://www.imperva.com/learn/application-security/osi-model/
PARR, B. (2011, February 03). IPv4 & IPv6: A Short Guide. Retrieved March 05, 2019, from Mashable:
https://mashable.com/2011/02/03/ipv4-ipv6-guide/#MFRFxeOnk
-TAVEN
Ethics and Law Discussion
Question 1 (1 point)In the URL encoding scheme, the URL is converted into a valid ASCII format, so that data can be safely transported over HTTP. Which character is used in the URL encoding followed by the character?s two-digit ASCII code, which is expressed in hexadecimal?. Select oneQuestion 1 options:&Question 2 (1 point)Vulnerability management life cycle is an important process that helps in finding and remediating security weaknesses before they are exploited.identify the phase that involves the remediation.Question 2 options:Pre-Assessment PhaseVulnerability Assessment PhaseRisk Assessment PhasePost Assessment PhaseQuestion 3 (1 point)Silicon Pvt Ltd is a reputed company, which is having around 1000?s employees working in their company. One day, one of the employees approached the authorized person of the organization claiming that he/she forgot their ID badge and requested the person to allow through a secure door. Whereas the authorized person believed that the person forgot the ID badge and helped the person to go through the entrance by swiping with his/her ID badge. Later on that authorized person realized that the person is a non-employee of the organization and he/she is an intruder who intentionally entered into the company From the above scenario, which of the following comes under the Human-based Social EngineerinQuestion 3 options:TailgatingPiggybackingReverse Social EngineeringNone of the aboveQuestion 4 (1 point)Run the following ?nbtstat? command, in order to get the content of NetBIOS name cache, the tables of NetBIOS names and their resolved IP addresseQuestion 4 options:. nbstat .exe ?enbstat .exe ?tnbstat .exe ?cnbstat .exe ?iQuestion 5 (1 point)Which type of attack that search for the web server login passwords by using the alphabetical letters, symbols and number is calledQuestion 5 options:Password GuessingDictionary AttackBrute Force AttackHybrid AttackQuestion 6 (1 point)From the following TCP Communication Flags identity the flag which Initiates a connection between different hosts.Question 6 options:. PSHQuestion 7 (1 point)SavedGoogle supports several advanced operators that help in modifying the search. Which of the following Google advanced search operator displays the web pages stored in the Google cacheQuestion 7 options:[site:][link:][info:][cache:]Question 8 (1 point)Which of the following term is defined as the process of installing a modified set of kernel patches that allows running third-party applications not signed by the OS vendor?Question 8 options:TrackingHijackingBlackjackingJailbreakingQuestion 9 (1 point)Jack, a skillful hacker targeted a major banking services firm located in Japan, using the LOIC (Low Orbit Ion Cannon) tool, Jack made the number of HTTP requests rise to a high level, which made the victim?s server with the number of requests and resulted in failure of server responding to the request and crashed. Which type of attack Jack performed in the above scenario?Question 9 options:Social engineering attackMITM attackPacket Injection attackDoS and DDoSQuestion 10 (1 point)Which of the following statement is true for Service Request Floods A. An attacker or group of zombies attempts to exhaust server resources by setting up and tearing down TCP connections B. It attacks the servers with a high rate of connections from a valid source C. It initiates a request for a single connectionQuestion 10 options:ONLY An attacker or group of zombies attempts to exhaust server resources by setting up and tearing down TCP is true connectionsBoth It attacks the servers with a high rate of connections from a valid source and It initiates a request for a single connection are trueBoth An attacker or group of zombies attempts to exhaust server resources by setting up and tearing down TCP connections and It attacks the servers with a high rate of connections from a valid source are trueOnly It initiates a request for a single connection is trueQuestion 11 (1 point)Using which port the attacker can compromise the entire network, and receive a copy of every packet that passes through a switchQuestion 11 options:SPAN PortTAP PortUDP portTCP portQuestion 12 (1 point)Question 12 options:EavesdroppingShoulder surfing Dumpster divingImpersonation on social networking sitesQuestion 13 (1 point)In Code Breaking Methodologies, which of the following method involves the use of social engineering techniques to extract cryptographic keysQuestion 13 options:Brute-ForceTrickery and DeceitFrequency AnalysisOne-Time PadQuestion 14 (1 point)In the Command Injection attacks, the following type of attack is used to deface a website virtually. Select oneQuestion 14 options:HTML EmbeddingShell InjectionWebsite EmbeddingHTML injectionQuestion 15 (1 point)Which type of rootkit is used to hide the information about the attacker by replacing original system calls with fake ones?Question 15 options:Application Level RootkitLibrary Level Rootkit Boot Loader Level RootkitHardware/Firmware RootkitQuestion 16 (1 point)Switch Port Stealing sniffing technique uses the following attack to sniff the packetsQuestion 16 options:MAC floodingARP SpoofingDHCP attacksDNS poisoningQuestion 17 (1 point)Identify the following technique, in which the attacker use drones to detect open wireless networksQuestion 17 options:WarChalkingWarFlyingWarDrivingQuestion 18 (1 point)In which of the following mobile platform vulnerabilities, unsolicited text/email messages sent to mobile devices from known/ unknown phone numbers/email IDs.Question 18 options:Mobile PhishingSMS SpamSMS PhishingMobile SpamQuestion 19 (1 point)Identify the ports that are allowed by the firewall in an organizationQuestion 19 options:Port 443 and Port 69Port 80 and Port 69Port 80 and Port 110Port 80 and Port 443Question 20 (1 point)Identify which of the following detection is used to detect the intrusion based on the fixed behavioral characteristics of the user and components in a computer systemQuestion 20 options:Anomaly Detection Protocol Anomaly DetectionIntrusion Detection SystemSignature RecognitionQuestion 21 (1 point)Sam receives an email with an attachment, he downloads the file and finds that it is infected with virus which overwrites a part of the host file with a constant content without increasing the length of the file and preserving its functionality. Which type of virus that the file was infected by?Question 21 options:Cavity VirusesShell VirusesFile Extension Viruses Cluster VirusesQuestion 22 (1 point)Which of the following attack allows Android users to attain privileged control access with in Android?s subsystemQuestion 22 options:RootingJailbreakingSMiShingApp SandboxingQuestion 23 (1 point)From the following identify the technique through which an attacker distributes malware on the web by sending a malware attached email and tricking the victim to click the attachment.Social Engineered Click-jackingSpearphishing SitesSpam EmailsDrive-by DownloadsQuestion 24 (1 point)From the following, identify the attack in which an attacker exploit default configuration and settings of off-the-self libraries and code.Question 24 options:Operating System AttackMisconfiguration AttacksApplication-Level AttackShrink-Wrap Code AttacksQuestion 25 (1 point)Identify the hacking phase in which an attacker tries to gather information about the target prior to launch an attackQuestion 25 options:ScanningGaining AccessReconnaissanceClearing TracksQuestion 26 (1 point)Identify the type of vulnerability assessment used to determine the vulnerabilities in a workstation or server by performing configuration level check through the command line.Question 26 options:Active AssessmentNetwork AssessmentsHost-Based AssessmentApplication AssessmentQuestion 27 (1 point)Attacker uses the ?%00? character prior to a string in order to bypass detection mechanism. Identify the type of evasion technique used by the attacker.Question 27 options:Case VariationURL EncodingNull ByteObfuscated CodesQuestion 28 (1 point)In the SQL Injection Characters, which of the following character represents the global variable?Question 28 options:@@variableQuestion 29 (1 point)SavedIdentify the type of cloud computing, which provides virtual machines and other abstracted hardware and operating systems which may be controlled through a service APIQuestion 29 options:Software-as-a-Service (SaaS)Platform-as-a-Service (PaaS)Infrastructure-as-a-Service (IaaS)Virtual ServiceQuestion 30 (1 point)SavedIdentify the type of virus that adds its code to the host code without relocating the host code to insert its own code at the beginningQuestion 30 options:Intrusive VirusesTransient VirusesAdd-on VirusesShell VirusesQuestion 31 (1 point)Identify the type of IDS alert that occurs when an IDS fails to react to an actual attack eventQuestion 31 options:True PositiveTrue NegativeFalse NegativeFalse PositiveQuestion 32 (1 point)SavedCloud Pent Testing is not allowed for one of the following Cloud Computing type, as it might impact on the infrastructureQuestion 32 options:Platform-as-a-Service (PaaS)Software-as-a-Service (SaaS)Hybrid-as-a-Service(HaaS)Infrastructure-as-a-Service (IaaS)Question 33 (1 point)The testing that is also called black box testing, which require no knowledge of the inner design of the code is calledQuestion 33 options:Fuzzing TestFunction TestStatic TestDynamic TestSavedIdentify the command which is used to adjust RSSI rangeQuestion 34 options:python RFCrack.py ?i ?F MOD_2FSK -F 314350000python RFCrack.py -j -F 314000000python RFCrack.py -r -U “-75” -L “-5” -M MOD_2FSK -F 314350000python RFCrack.py -r -M MOD_2FSK -F 314350000Question 35 (1 point)Which type of DNS record helps in mapping an IP address to a hostname?Question 35 options:HINFOQuestion 36 (1 point)SavedWhich of the following sequence is used by the attacker, in the Directory Traversal Attacks to access restricted directories outside of the web server root directory. Select oneQuestion 36 options://…Question 37 (1 point)SavedWhich of the following attack involves in stealing a cloud service provider?s domain nameQuestion 37 options:CybersquattingDomain SnippingDNS Poisoningd. Domain HijackingQuestion 38 (1 point)Identify the rootkit, which helps in hiding the directories, remote connections and logins.Question 38 options:Azazel ZeroAccessNecursAvatarQuestion 39 (1 point)SavedQuestion 39 options:RemoteExecPDQ DeployDameWare Remote SupportKeyloggersQuestion 40 (1 point)Which of the following tool can capture RPL related information and live packets from networks in a non-intrusive manner?Question 40 options:Foren6RFCrackHackRF OneTelnetQuestion 41 (1 point)SavedRoy is a senior penetration tester working in a Gensolutions Inc, a US based company. The company uses the Oracle database to store all its data. It also uses Oracle DataBase Vault in order to restrict user from accessing the confidential data from their database. One day Roy was asked to find all the possible vulnerabilities of the company?s Oracle Database Vault. Roy tried different kinds of attacks to penetrate into the company?s Oracle DB Valut and succeeded. Which of the following attack helped Roy to bypass Gensolutions Oracle DB Vault? Select oneQuestion 41 options:Denial of service attackSQL InjectionSession HijackingSniffingQuestion 42 (1 point)In a computer based social engineering, a person receives emails that issues warnings to the user on the new viruses, worms or Trojan that may harm the user?s system. These kind of computer based social engineering is known asQuestion 42 options:Spam EmailChain LettersHoax LettersInstant Chat MessengerQuestion 43 (1 point)ICMP scanning involves in checking for the live systems, which can be done by sending the following ping scan request to a host. If the host is live, then it will return a reply.Question 43 options:ICMP Echo ReplyICMP Echo PingICMP Echo RequestICMP Echo hostQuestion 44 (1 point)Which of the following cryptographic attack technique involves extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or tortureQuestion 44 options:Chosen-ciphertext AttackAdaptive Chosen-plaintext AttackRubber Hose AttackQuestion 45 (1 point)The attacker uses the following attack, in order to listen to the conversation between the user and the server and captures the authentication token of the user. With this authentication token, the attacker replays the request to the server with the captured authentication token and gains unauthorized access to the serverQuestion 45 options:Session Replay attackSession Fixation attacksSession hijacking using proxy serversClient side attacksQuestion 46 (1 point)Which of the following Hping command used to intercept all traffic containing HTTP signature?Question 46 options:hping3 192.168.1.103 -Q -p 139 -shping3 -9 HTTP ?I eth0hping3 -S 192.168.1.1 -a 192.168.1.254 -p 22 –floodhping3 ?F ?P ?U 10.0.0.25 ?p 80Question 47 (1 point)In webserver password cracking techniques, The attacker tries every combination of character until the password is broken, such type of attack is known as. Select one:Question 47 options:Brute force attackDictionary attacksGuessing attackHybrid attackQuestion 48 (1 point)Which of the following service uses the port TCP/UDP 53 to enumerateQuestion 48 options:DNS Zone TransferSNMP TrapNetBIOS Name ServiceGlobal Catalog ServiceQuestion 49 (1 point)SavedAt which phase of the Session Fixation attack does the attacker obtains a legitimate session ID by establishing a connection with the target web server.Question 49 options:Entrance phaseSession set-up phaseFixation phaseFinal phaseIn the Permanent Denial-of-service, the attacker will uses the ?Bricking a system? method, in order to __________Question 50 options:Send fraudulent hardware updates to the victimsLaunch a massive denial of service attacks and compromise websitesExploit weaknesses in programming source codeSend malicious email attached to the victi
Bus 225 section 1 review problems solutions chapter 1 to 3
ÿÿ
Chapter #1
PROBLEMS (p. 24-25)
(Note: Some of these problems require the use of the Time Value of Money Tables in the Chapter 1 Appendix, pp. 40-43).
1. Using the rule of 72, approximate the following amounts.
a. If the value of land in an area is increasing 6 percent a year, how long will it take for property values to double?
ÿb. If you earn 10 percent on your investments, how long will it take for your money to double?
ÿc. At an annual interest rate of 5 percent, how long will it take for your savings to double?
ÿÿ
2. In 2013, selected automobiles had an average cost of $16,000. The average cost of those same automobiles is now $20,000. What was the rate of increase for these automobiles between the two time periods?
3. A family spends $46,000 a year for living expenses. If prices increase by 3 percent a year for the next three years, what amount will the family need for their living expenses after three years?
ÿÿ
4. Ben Collins plans to buy a house for $220,000. If that real estate is expected to increase in value by 2 percent each year, what will its approximate value be seven years from now?
ÿÿ
5. What would be the yearly earnings for a person with $8,000 in savings at an annual interest rate of 1.5 percent?
ÿÿ
6. Using time value of money tables (Exhibit 1-3 or Chapter Appendix tables-Pages 40-43), calculate the following:
a. The future value of $550 six years from now at 7 percent.
b. The future value of $700 saved each year for 10 years at 8 percent.
c. The amount that a person would have to deposit today (present value) at a 5 percent interest rate in order to have $1,000 five years from now.
d. The amount that a person would have to deposit today in order to be able to take out $500 a year for 10 years from an account earning 8 percent.
7. If you desire to have $10,000 for a down payment for a house in five years, what amount would you need to deposit today? Assume that your money will earn 4 percent.
8. Pete Morton is planning to go to graduate school in a program of study that will take three years. Pete wants to have $8,000 available each year for various school and living expenses. If he earns 3 percent on his money, how much must be deposit at the start of his studies to be able to withdraw $8,000 a year for three years?
9. Carla Lopez deposits $3,000 a year into her retirement account. If these funds have an average earning of 7 percent over the 40 years until her retirement, what will be the value of her retirement account?
10. If a person spends $10 a week on coffee (assume $500 a year), what would be the future value of that amount over ten years if the funds were deposited in an account earning 3 percent?
ÿÿ
Chapter #2
PROBLEMS (p. 65-66)
1. Based on the following data, determine the amount of total assets, total liabilities, and net worth.ÿ
Liquid assets, $3,870 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿInvestment assets, $8,340
Current liabilities, $2,670 ÿÿÿÿÿÿÿÿÿHousehold assets, $87,890ÿ
Long-term liabilities, $76,230
ÿÿ
a. Total assetsÿ
b. Total liabilities
c. Net worth
2. Using the following balance sheet items and amounts, calculate the total liquid assets and total current liabilities: Money market account $2,600 Medical bills $262
Mortgage $158,000 Checking account $780
Retirement account $87,400 Credit card balance $489
a. Total liquid assetsÿ
b. Total current liabilitiesÿ
ÿ3. Use the following items to determine the total assets, total liabilities, net worth, total cash inflows, and total cash outflows.
Rent for the month, $650 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿMonthly take-home salary, $2,185 ÿÿÿ
Spending for food, $345 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCash in checking account, $450
Savings account balance, $1,890 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿBalance of educational loan, $2,160ÿ
Current value of automobile, $8,800 ÿÿÿÿÿÿÿÿÿÿÿÿTelephone bill paid for month, $65ÿ
Credit card balance, $235 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿLoan payment, $80
Auto insurance, $230 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿHousehold possessions, $3,400
Video equipment, $2,350 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿPayment for electricity, $90
Lunches/parking at work, $180 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿDonations, $160
Personal computer, $1,200 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿValue of stock investment, $860
Clothing purchase, $110 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿRestaurant spending, $130
ÿÿ
a. Total assets =ÿ
b. Total liabilities =ÿ
c. Net worth =ÿ
a. Total cash inflows =ÿ
e. Total cash outflows =ÿ
ÿÿ
4. For each of the following situations, compute the missing amount.
ÿÿ
a. Assets $65,000; liabilities $18,000; net worth=??
ÿÿ
b. Assets $86,500; liabilities=?? net worth $18,700.
ÿÿ
c. Assets $34,280; liabilities $12,965; net worth=??
ÿÿ
d. Assets=?? liabilities $38,345; net worth $52,654
5. Based on this financial data, calculate the ratios requested: (Page 51) Liabilities $7,800 Net worth $58,000
Liquid assets $4,600 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCurrent liabilities $1,300
Monthly credit payments $640 ÿÿÿÿÿÿÿÿÿÿÿTake-home pay $2,575
Monthly savings $130 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿGross income $2,850
ÿÿ
a. Debt ratioÿ
b. Current ratio
c. Debt-payments ratioÿ
d. Savings ratio
ÿÿ
10. Fran Powers created the following budget and reported the actual spending listed. Calculate the variance for each of these categories, and indicate whether it was a deficit or a surplus.
ÿÿÿÿÿ
Item ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿBudgeted ÿÿÿÿÿÿÿÿÿActual ÿÿÿÿÿÿVariance ÿÿÿÿÿÿÿDeficit/Surplus
ÿ
Food ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ$360 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ$298 ÿÿÿÿÿÿÿÿÿÿÿ
ÿ
Transportation ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ320 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ334 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ
ÿ
Housing ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ950 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ982 ÿÿÿ
ÿ
Clothing ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ110 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ134 ÿÿ
ÿ
Personal ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ275 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ231 ÿ
ÿÿ
Note: A deficit in one category means that another category will have to make up the difference.
ÿÿ
Chapter #3
PROBLEMS (p.100-101)
2. If Samantha Jones had the following itemized deductions, should she use Schedule A or the standard deduction? The standard deduction for her tax situation is $6,350.
Donations to church and other charities, $3,050
Medical and dental expenses exceeding 10 percent of adjusted gross income, $450ÿ
State income tax, $920
Job-related expenses exceeding 2 percent of adjusted gross income, $1,450
3. What would be the average tax rate for a person who paid taxes of $6,435 on a taxable income of $40,780?
5. If $4,323 was withheld during the year and taxes owed were $4,122, would the person owe an additional amount or receive a refund? What is the amount?
9. Using the tax table in Exhibit 3?5, determine the amount of taxes for the following situations:
a. A head of household with taxable income of $62,525.
b. A single person with taxable income of $62,001.
c. A married person filing a separate return with taxable income of $62,365.
10. Wendy Brooks prepares her own income tax return each year. A tax preparer would charge her $75 for this service. Over a period of 10 years, how much does Wendy gain from preparing her own tax return? Assume she can earn 3 percent on her savings. (LO 3.3)
11. Julia Sims has $30,000 of adjusted gross income and $5,000 of medical expenses. She will be itemizing her tax deductions this year. The most recent tax year has a medical expenses floor of 10%. How much of a tax deduction will Julia be able to deduct?
ÿÿ
***Tax Law Change: Medical and Dental expenses that can be itemized have changed over the years from 7.5% to 10%, back to 7.5% You will be told in all problems whether to use 7.5% or 10% for your calculations.
ÿÿ
14. On December 30, you decide to make a $3,000 charitable donation. (LO 3.4)
a. If you are in the 28 percent tax bracket, how much will you save in taxes for the current year?
b. If you deposit that tax savings in a savings account for the next five years at 8 percent, what will be the future value of that account?
MGT 317 Rules of Experimentation Discussion
SOURCE: Interactive: Entrepreneurship: The Practice and Mindset Interactive eBookby: Heidi M. Neck; Christopher P. Neck; Emma L. MurrayChapter 7!!Case StudyMarissa Mayer, Yahoo Inc. CEOIn 2013, Fortune magazine listed Marissa Mayer in the #1 slot on their prestigious 40 Under 40 list, ahead of well-known Internet tycoons such as Mark Zuckerberg (Facebook), Ben Silberman (Pinterest), and Kevin Systrom (Instagram). In 2014, Fortune magazine listed Mayer as #14 on its Most Powerful Women in Business list, and #18 on its Most Influential Women in the World list. Yet, by 2015, her star quality seemed to be getting tarnished.Hailing from the farmland of central Wisconsin, Marissa Mayer had a typical small-town American upbringing. In high school, she was active in extracurricular activities, where she demonstrated leadership abilities as captain of her school?s successful debate team and pom-pom squad. She continued in her upward trajectory of success at Stanford University, where she initially studied to become a doctor but earned both a bachelor?s and master?s degree in computer science.Mayer?s successes coming out of college opened many doors of opportunity. Despite receiving 14 different job offers from a variety of prestigious organizations, Mayer chose to accept an offer with a computer startup company called Google, which at the time was still in its infancy. When Mayer joined Google in 1999, she was only the 20th person hired by the company, which had been incorporated just a year previously.An entrepreneur at heart, Mayer made contributions to Google in the early days of the company that were prominent, far-reaching, and in many ways foundational to the overarching success the company has enjoyed. She started out as a programmer writing code. Over time, however, she became increasingly involved in leadership roles that allowed her to experiment with policy strategies that proved highly successful. For example, her leadership and example led to clearer communication between executives and floor-level employees, and to the development of a mentoring program that has since been replicated at numerous other tech companies.During her decade-plus stint with Google, Mayer became known for ?her work ethic, eye for detail and vision? (Marissa Mayer Biography, 2016). Her perfectionism led her to experiment and research until she had found design, market, and policy solutions that met her unusually high standards. For example, Mayer once ?wanted to test out 41 shades of blue for the toolbar on Google pages to see which one appealed the most to the user.? While such fastidious decision-making processes have surely caused anxiety among some of her colleaguesover the years, they seem to have ultimately served her?and the companies she has worked for?very well.Like all entrepreneurs, Mayer has always kept her eyes open for new opportunities.In a 2008 interview . . . she seemed to [already] be looking ahead to her next act. ?I helped build Google,? Mayer said, ?but I don?t like to rest on [my] laurels. I think the most interesting thing is what happens next (Marissa Mayer Biography, 2016).What happened next caught the attention of Silicon Valley and the rest of Corporate America in unprecedented fashion. In July 2012, Yahoo Inc.?the search engine giant and competitor of Google?hired Mayer to be its new CEO. With the hire, Mayer became one of only 20 female CEOs in the Fortune 500. And at only 37 years of age, Mayer became the youngest of all Fortune 500 CEOs, male and female.Yahoo hired Mayer for her entrepreneurial vision hoping she could turn around a troubled company that was facing ?a lack of innovation? and ?a culture problem.? Innovation and culture building were two things Mayer had excelled in at Google, and she immediately went to work. Her immediate shake-up of Yahoo included a line of executive firings and several new hires to replace them.With her new leadership team in place, Mayer began leading Yahoo in a series of substantial investments and acquisitions. However, one decision made before she came on board was the sale of over $7 billion dollars of Yahoo stock to the Chinese e-commerce giant Alibaba in order to increase Yahoo?s cash reserves. With added capital for experimentation and expansion, Mayer spent her first year on the job overseeing the acquisition of over 20 smaller companies. The company?s highest profile, and most expensive, move was to acquire the hugely successful microblogging company Tumblr for a price of just over a billion dollars. Ever willing to demonstrate her entrepreneurial capacity for flexibility and experimentation, Mayer pioneered a new path for Yahoo with her nod to acquire Tumblr?a move that ?analysts hailed . . . as a shift in industrial strategy? (Riggins, 2014).After only 22 months at the helm, Mayer was able to announce an 84% profit rise from the previous year. Observers commented that Yahoo?s decision to place its future in the hands of a young and gifted math and science whiz from Upstate Wisconsin had been touched by King Midas. And Marissa Mayer, worth an estimated $300 million, was goldenly compensated for her leadership as well.Given such accolades, it was a shock to many when, in the summer of 2014, Mayer was forced to announce Yahoo?s lowest quarterly earnings in a decade. By the end of 2014, analysts were questioning not only Yahoo?s financial viability but also Mayer?s leadership.She may be a woman of power, but she?s been heavily criticised [sic] for her lack of support in helping other women break through the glass ceiling of her industry?s heavily male-dominated hierarchy. Meanwhile, her cold, calculated style has continued to chase some of Yahoo?s most talented engineers into the arms of rivals like Google and Facebook. (Riggins, 2014)No stranger to ambition and audacity, Mayer was known for following a personal working style that includes the following two principles: ?a) work with the smartest people she can find, and b) go for a challenge that makes her feel like she?s in over her head.? As impressive as it is for a woman under the age of 40 to have taken over one of the most prominent tech companies in the world, Mayer faced the risk of being blamed for Yahoo?s demise. Nevertheless, if the company were to be sold, she would take with her a severance package valued at over $150 million.Critical Thinking QuestionsMarissa Mayer?s early successes were rooted in her proficiency as a student in math and science. Why are subjects like math, statistics, logic, and critical thinking essential to product experimentation and market hypotheses?How might you apply the ?Rules of Experimentation? to discovering and developing your own entrepreneurship and leadership skills?Data generation is critical to market research and product experimentation. What ?Data? might you begin collecting to better prepare yourself for a career in entrepreneurship (journal writing, subscribing to a professional journal or blog, asking questions of entrepreneurial role models, seeking out a mentor, etc.)?Marissa Mayer?s executive opportunity at Yahoo came about because of her outstanding work at Google, and skilled marketing of her own career along the way. In what ways are you currently expanding or contracting future opportunities for yourself based on your present performance as a student, employee, entrepreneur, networker, friend, and human being. Secondly, how are you marketing your own career to achieve future success?
Aspen University Renewable Solar Energy for Homes
5 SOURCES10 pages The topic of the research paper must be about renewable solar energy for homes and it must be written from a Christian perspective. The thesis statement must include the problem, possible approaches or solutions, and the writer?s proposed approach must be expressed in this statement. I would like the thesis statement to be based on the following: eliminating our usage of fossil fuels to generate energy by implementing and utilizing renewable solar energy that provides energy (free-of-charge) to anyone having the necessary equipment to capture it?thus reducing the need of electric public utility companies and creating incentives for people everywhere to stop using them (both the public utility companies and the fossil fuels which pollute and contaminate our environment). The research paper should analyze the data gathered from various sources and reach a conclusion on an issue or problem that has been raised in the thesis statement. I want the conclusion of the research paper to mention that solar energy is the best of all the renewables since every single person on this planet having sunlight, in every climate, location, etc. is able to capture and utilize it using solar panels, an inverter, and store the energy using batteries. With this energy at hand, people are able to charge their electric cars, power their homes, etc. and in some countries they are even able to sell excess energy/feed it back into the national power grid. I also want the conclusion to mention that as stewards of God?s creation, we need to care for and protect the environment with which we have been entrusted and make the first step in ensuring that our planet will be environmentally clean for us and future generations. Please also do mention the recent advancements in solar panel technology and the types that are currently available. The audience of the research paper should be that of the average person, so everything must be written in an understandable manner, and all terms that are unfamiliar must be defined. Please pay special attention to the Outline Guidelines 1-3 that I have uploaded and follow the instructions carefully. A final revision of the general outline should be made to accurately reflect the proper order of the material covered in the final draft of the paper. The final revision would be the detailed outline. It should contain a thesis statement and three main sections (headings) that include subheadings and supporting details. When taking notes, incorporate or delete certain ideas in the outline. In this way you will be able to determine areas you may have neglected or overemphasized. After you have established the accuracy of the general outline, make sure that the points are in the best order. The work must flow logically, and orderliness is a vital aspect. I have uploaded a sample research paper (Sample RP 1-11) to show you the exact way the research paper must look like, and some instructions on the MLA style (MLA-Style Guidelines 1-7 & MLA-Style Guidelines for I.S. 1-2). Please note that the uploaded instructions regarding the MLA style are not exhaustive, so please refer to MLA Handbook for Writers of Research Papers, Sixth Edition (2003) or visit the MLA website at for any questions that might arise. Photocopies of relevant pages from Internet articles or Webpages, articles, books, periodicals, journals, etc. that are cited in the research paper need to be provided. Include only pages that have been cited in the paper, not entire articles or whole sections from books. Words that have been quoted or ideas otherwise cited need to be highlighted in these copies (without these required copies of the source materials?the whole research paper is useless to me). The ?Works Cited? page must contain at least five sources, including two hard copy books, periodicals, or journals. Only one of the five sources may be an encyclopedia. Please note neither Wikipedia nor any film may be used as a source. Please do NOT plagiarize or inspire yourself from another research paper. The writing must be original and unique and all inspiration needs to come from the sources themselves. My school has a zero-tolerance policy for plagiarism even if the plagiarism is not word-for-word. My school considers plagiarism to be the using of ideas from other published researched papers. So please use parenthetical documentation when making a direct quotation, summarizing, paraphrasing, or simply reiterating someone else?s thoughts. If a quote is more than forty words, put it in a block quote and ident one-half inch from the left margin. Please ensure that the paper is clear and flows logically from one paragraph to the next, all thoughts are organized, all parts are in the proper order, each part has been developed at an appropriate length in proportion to its importance, and there are no foggy concepts, weak arguments, or problem areas. The phrases also need to be examined for the appropriate figure of speech and expression of idiom. Please avoid jargon, trite phrases, and wordiness or redundancies. Please check to see that the verbs are bright and alive, and that the nouns are specific and direct. Proofread every word, phrase, sentence, and paragraph for proper usage: spelling, clarity, oneness, cohesion, stress, order, grammar, and mechanics. Please ensure that ALL uploaded and written instructions are carefully read, as well as the sample research paper before the writing process begins. Once this research paper is completed and done to the standards described, I will purchase another one using the same instructions; so please do pay careful attention to all details. If you have any questions, please contact me. Thank you