Short and Long term goals opportunities to leverage ePortfolio

Short and Long term goals opportunities to leverage ePortfolio

This essay entails a research paper on Short and Long term goals and different opportunities to leverage ePortfolio to achieve a set porpose. Short and Long term goals  are set in two different ways to cover up for the whole session of life and achieve.

Short and Long term goals opportunities to leverage ePortfolio

Firstly, follow these assignment parameters in your presentation: Identify 3 short-term goals and 3 long-term goals related to your professional aspirations. You may also include a 5-year plan. These goals should be reasonable within the time frames presented. Describe how you plan to meet your professional goals: What steps will you take? What milestones will you set? (How will you know you are making progress?)

Secondly, how will you use your strengths to meet your goals? What challenges do you foresee, and how will you overcome them to succeed in meeting your goals? Include opportunities to leverage your ePortfolio and other resources to meet your goals. Explain how this nursing program and specific courses or assignments within it impacted your goals (goals met and goals still to achieve). Identify specific achievements during your program (e.g., a goal GPA, an attendance goal, certificates, improved writing skills)

Also, self-evaluate your success at meeting the program outcomes and essentials. Identify memorable assignments or courses, epiphanies, or moments when your course work directly impacted your professional work. Describe your current nursing philosophy and reflect on how it supports your goals and aspirations.

Thirdly, be sure to include an introduction (introduce yourself briefly) and a conclusion to your presentation. Your presentation should be between 7 and 12 minutes long. Your presentation must include both audio and visual components and be professional in nature.

Lastly, for this assignment, read four credible research articles and then write a one- to two-paragraph summary of each article. The first two articles are provided for you. Find two additional credible articles that relate to mobile device security and summarize them a swell.

Problems between the US Government and the scientific community

Problems between the US Government and the scientific community

This paper assignment involves problems between the U.S. Government and the scientific community. Please choose any example in the news from the past couple months that demonstrates some sort of rift.

problems between the U.S. Government and the scientific community

Firstly, This paper assignment involves problems between the U.S. Government and the scientific community.

Secondly, Please choose any example in the news from the past couple months that demonstrates some sort of rift.

Thirdly, Discuss this news, in the context of the sometimes contentious relationship between scientists and government officials.

What is government science?
A government scientist is a scientist employ ed by a country’s government, either in a research-driven job (for example J. Robert Oppenheimer on the Manhattan Project), or for another role that requires scientific training and methods. In some countries other terms such Technical officers is also used for scientists.
How do politicians use science?
The politicization of science is the manipulation of science for political gain. It occurs when government, business, or advocacy groups use legal or economic pressure to influence the findings of scientific research or the way it is disseminated, reported or interpreted.
The U.S. government-science relationship, which help ed win World War II, put a man on the moon, unravel the human genome, and nurture economic growth, is trouble d. Money is one reason. However, far more than funding, the tensions between government and science are about politics and policy management.

Many scientists and their allies argue that the Bush administration has crossed the line separating appropriate control of information from political interference. That is, there has been a “politicization of science.” This essay examines the current debate about politicization in historical context; discusses the tensions among scientists, politicians, and administrators; and suggests possible ways to strengthen the government-science partnership in the future.

 

Database SQL- tips or best practices for developing queries?

Database SQL- tips or best practices for developing queries?

This assignment is on Database SQL. Research and explain what are some tips or best practices for developing queries? Explain, in your own words, the differences between an inner join and full outer join.

Database SQL-tips or best practices for developing queries?

1. Research and explain what are some tips or best practices for developing queries?

2. Explain, in your own words, the differences between an inner join and full outer join.

 

More details on this assignment;

Here are some tips and best practices for any SQL development project.

Firstly, THINK ABOUT RELATIONSHIPS.

Secondly, Always Consider Performance, Even If the Query Seems Simple.

Thirdly, USE TABLE ALIASES FOR EASIER READING.

Fourthly, Be Specific in Your SELECT Clauses.

Fifthly, Use NOCOUNT for Large Batch Queries.

Also, Avoid Dynamic SQL.

Furthermore, Don’t Forget Object-Level Security.

How can I improve my SQL skills?
Here are the seven essential skills you will master:

Firstly, Learn to structure a database.

Secondly, Author SQL statements & clauses.

Thirdly, Manage a SQL database.

Fourthly, Work with popular database systems like MySQL and PostgreSQL.

Fifthly, Master PHP.

Furthermore, Learn technical SQL data analysis for marketing.

Lastly, Create a database using WAMP and SQL.

What are the SQL commands?
SQL commands are grouped into four major categories depending on their functionality: Data Definition Language (DDL) – These SQL commands are used for creating, modifying, and dropping the structure of database objects. The commands are CREATE, ALTER, DROP, RENAME, and TRUNCATE.
Inner Joins and Full Outer Joins

Inner joins result in the overlapping part of the Venn diagram of two data-sets, whilst for full outer joins the outer parts of the Venn diagram will also be returned. For an inner join, only the rows that both tables have in common are returned.

What do you mean by database?
A database is a data structure that stores organized information. Most databases contain multiple tables, which may each include several different fields. These sites use a database management system (or DBMS), such as Microsoft Access, File-Maker Pro, or MySQL as the “back end” to the website.
What are the three types of database design?
If what you mean is relationships, there are 3 classic types; one-to-one, one-to-many, many-to-many. There are two models of database design; logical and physical.

Canonical religious stories Inuit Tradition and Buddhism

Canonical religious stories Inuit Tradition and Buddhism

This essay entails a paper on the canonical religious stories from the bible including the  Inuit Tradition and Buddhism. canonical religious stories expain what happened and relates them to the current life history and current occurences.

canonical religious stories Inuit Tradition and Buddhism

Firstly, you Must include at least one source from Hinduism, Inuit Traditions, and Buddhism.
Types of Sources: Source must allow you to analyze and reflect on gender and/or sexuality in your tradition.
May include, quotation from canonical religious text, traditional stories (especially for Inuit), visual art, liturgy /
prayer, images of ritual objects or traditional dress.Secondly, this is the Goal of the Assignment. Identify, locate and cite primary sources that are relevant to the study of gender and sexuality in Hinduism, Inuit Tradition and Buddhism.
Furthermore, Describe a primary source and its historical context. Demonstrate comprehension of relevant required readings. Reflect on the primary source in terms of its significance for contemporary communities.

Each primary source journal entry should include:

Thirdly,  Primary source excerpt(s) or in full (whatever you are working with) if text, or reproduction of image. Do not
count this in length of the assignment. Cite your source fully here. Description: Detailed description of the primary source. Give minimum of 5 details about form and content.

Furthermore, Historical context: In addition to where and when this source is from, discuss its context to help us understand
the source and how and why it became important to this community in terms of gender and sexuality.

Next, give minimum of 5 facts about origins, significance and reception.

Also, you must use relevant course materials for this discussion. Depending on the primary source you choose, you may need to do outside research if this information is not already in required course materials.

Eventually, if you are choosing a contemporary primary source you must find a way to connect it to historical traditions, sources etc. in order to meet this requirement. Contemporary Context: Reflect on how this source is understood today by this community.

Forthly, that traditional or conservative interpretations apply? Are there any radical reinterpretations? How does this source help us
understand gender and sexuality in this community? Give minimum of 2 facts about contemporary context.

Fifthly, you will almost certainly want to use insider as well as scholarly sources for this section to gauge popular reception
in the contemporary context.

Lastly, you must use relevant course materials for this discussion. Depending on the
primary source you choose, you may need to do outside research if this information is not already in required course materials. Also, you may find both scholarly and insider sources useful here. Be clear about what type of
source you are using.
In conclusion, a Minimum of two references to required course readings

John Locke’s ideas influenced the US Declaration of Independence

John Locke’s ideas influenced the US Declaration of Independence

Which ideas of John Locke’s influenced the U.S. Declaration of Independence, U.S. Bill of Rights and the Declaration of the Rights of Man and the Citizen?

ideas of John Locke’s influenced the U.S. Declaration of Independence

Firstly, Which ideas of John Locke’s influenced the U.S. Declaration of Independence, U.S. Bill of Rights and the Declaration of the Rights of Man and the Citizen?

Secondly, Incorporate Locke’s Second Treatise of Civil Government and the contexts of the American and French Revolutions into answering this question.

Thirdly, The assignment must be 4-5 typed pages in length including footnotes, plus a cover page and Bibliography page, in Chicago Manual of Style.

More details:

What influence did the ideas of John Locke have on the Declaration of Independence?
Firstly, John Locke had the idea of natural rights and social contract.
Secondly, Thomas Jefferson used the idea of natural rights (life, liberty and property), and changed them into life, liberty and pursuit of happiness.
Thirdly, The purpose of government to Locke was to protect the natural rights.
How did John Locke influence Bill of Rights?
John Locke

Firstly, In his Second Treatise of Government, Locke identified the basis of a legitimate government. If the government should fail to protect these rights, its citizens would have the right to overthrow that government. This idea deeply influenced Thomas Jefferson as he drafted the Declaration of Independence.

What were the 3 main arguments in the Declaration of Independence?
Firstly, The Declaration of Independence included these three major ideas: People have certain Inalienable Rights including Life, Liberty and Pursuit of Happiness. All Men are created equal. Individuals have a civic duty to defend these rights for themselves and others.

How did natural rights affect the American Revolution?

In the Declaration of Independence, Thomas Jefferson wrote about American’s natural rights to “life, liberty, and the pursuit of happiness.” These ideas came from the Enlightenment, the ideals led towards the American Revolution soon after (Fisk).

Forms of corporate fraud and its distinction employee and management

Forms of corporate fraud and its distinction employee and management

This is an assignment that discusses the definition of fraud and its distinction to  employee and management. The paper also demonstrates the understanding of the fraud triangle.

Definition of fraud and its distinction to  employee and management

Assignment
“When a company has a strong internal control structure, stockholders can expect the elimination of fraud. Further management and auditors are required by Sarbanes-Oxley Act of 2002 to consider IT application controls as well as physical human controls.” (Hall, 2019, p 133). Assignment question: (a) Explain fraud and distinguish between employee fraud and management fraud. (b) Using the fraud triangle theoretical framework show how fraud is committed in multinational companies. Provide recent corporate scandal involving fraud/accounting misconduct as an example to support your answer. (c) Critically discuss the statement that, when a company has a strong internal control structure, shareholders can expect elimination of fraud. (d) In this age of high technology and also computer-based information systems, why are accountants concerned about physical (human) controls? (25 marks for each question. 25marks X 4 = 100marks)

Evaluation

Your evaluation could include the following:

1) Firstly, a clear demonstration of understanding of fraud and the difference between management fraud and employee.

2) Secondly, a clear demonstration of understanding of the fraud triangle with recent examples from multinational company involving fraud/accounting misconducts

3) Thirdly, a clear demonstration of understanding of the COSO internal control framework.

4) Then, show understanding of IT application controls such as flowchart process and input validation.

5) Identify internal control measures which could be put in place to prevent fraud in a given situation.

6) Clear practical examples and applications from companies or firms that have been victims of fraud like in this instance to score well is a good recommendation.

7) Finally, demonstrate excellent work will suggest some remedies.
Lastly, here possible, in all aspects of your answers, you should illustrate your discussion with appropriate and relevant examples from issues in particular company or companies. You are also to cite all the resources used in the pursuit of the assignment.

Research methods results analysis discussion recommendations

Research methods results analysis discussion recommendations

Create a report based on the research question, who am I? Your goal is to discuss yourself, your family lines or something within your family history that helps to define your identity.

Create a report based on the research question, who am I?

Create a report based on the research question, who am I? Your goal is to discuss yourself, your family lines or something within your family history that helps to define your identity. For example, in my family, a blood clotting disorder is common. It is rare, but could kill those affected by it. My father and both sisters have it. It can be traced all the way back on my father’s side to the early 1800s. This is something that I now have to think of because
I have a child. I could research this and then discuss how it has played a part in my family’s identity.

You could do this with a number of diseases or disorders such as anxiety, depression or something happier like twins.

You could also simply look at your race or ethnicity. Surprise me! Have confidence to do something unique.

You can use “I” throughout this piece.

 

The Setup: IMRAD

Introduction:

Firstly, Introduce the focus of this piece.

Methods:

Firstly, Describe the methods you used to find research.

Secondly, Where did you go?

Thirdly, What types of documents were searched and found?

Further, What challenges did you face?

Results:

Moreover, Summarize your findings. That is, what did your research say?

Analysis:

Lastly, Analyze your results.

Discussion:

In this section, try to connect what you found to your understanding of identity.

For example, if you researched a genetic disorder, how does that information serve as a part of your identity?

Format:
You must adhere to CSE rules, especially the Cited References list at the end of the text. This style includes using endnotes that connect to the citations in the text of the article. The in-text citations are noted with a superscript number in the order of citation (1, 2, and 3). The endnotes are listed in the order referenced in the text. Additional citations to the same source use the same number as its first citation. PLEASE do not use any other style.

Utilitarianism Duty Ethics and the Revelational Christian Ethic

Utilitarianism Duty Ethics and the Revelational Christian Ethic

Thread: In this course you have spent a considerable amount of time studying metaethics, examining various ethical theories that promise to provide you with a methodology for determining right from wrong.

Thread: In this course you have spent a considerable amount of time

In this course you have spent a considerable amount of time studying metaethics, examining various ethical theories that promise to provide you with a methodology for determining right from wrong. These included a simple “list” metaethic, Virtue Ethics, Natural Law Ethics, Ethical Egoism,
Utilitarianism, Duty Ethics, and the Revelational Christian Ethic, as well as related metaphysical views such as Social Contract Theory, Moral Realism,
Divine Command Theory, and Divine Nature Theory.

Now it is time for you to decide for yourself how you are going to distinguish what is moral from what is immoral. Utilizing one or more of the theories that we studied (excluding moral relativism, which we have already determined is false). Please construct your own metaethical theory and present it to the class.

In a post of 500 to 600 words, systematically describe what you think is the best way to approach ethics.

Secondly, Your goal is to explain how we can know what makes an action moral or immoral. In doing this you must interact with the ethical theories that you have studied in class. Either adopting one of them or combining several of them that you believe to be complementary.

You may add additional elements that you have come across in your research from other assignments/readings. Be careful that you do not adopt theories that contradict one another.
In your thread, explain your theory and give a rationale for why you think yours is the best approach. Your argument(s) for your approach must be carefully-considered, logical arguments, not just “I feel like that would be best” or “that’s what I was raised to believe.”

Further, Do not stray into a lengthy discussion of applied ethics. Be sure that this assignment focuses strictly on metaethics. Save applied ethics for your next Discussion Board.

Additionally, Be sure to carefully define your terms. Also, You are to support your position with rational arguments, fitting examples, and expert sources. Any quotes or information used from sources other than yourself must be cited using footnotes in current Turabian format and will not count towards the total word count.

 

Penetration Testing and Vulnerability Assessments

Penetration Testing and Vulnerability Assessments

This paper is on CYBS 7355 Penetration Testing and Vulnerability Assessments. In Unit 4, you completed “Lab #4: Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation” and were able to compromise a remote Linux host using the VSFTP_234_backdoor vulnerability.

CYBS 7355-Penetration Testing and Vulnerability Assessments

1. 100 Points – In Unit 4, you completed “Lab #4: Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation” and were able to compromise a remote Linux host using the VSFTP_234_backdoor vulnerability. Follow the steps below to complete this exam question:

Firstly,  Re-start Lab #4 and then open/re-do your Nessus Vulnerability Scan report submitted in Section 2, Part 2. This vulnerability report identified several “High” severity vulnerabilities, which could allow a hacker to gain remote access.

Secondly,  Repeat the steps in Part 3 (ignore Part 1 and Part 2!) of Lab #4 to search Metasploit for a new High exploit associated with an additional vulnerability (there are at least six!)

Thirdly, Exploit a new High vulnerability to gain remote access and compromise the remote Linux target again (NOTE: Do not use the same
VSFTP_234_Backdoor exploit! You already demonstrated that in Unit #4!!!)

Fourthly,  Provide a screenshot proving you have gained “root” access (prove using if configure, who am I or user id command.) All screenshots must show date/time.

Further, IMPORTANT NOTE: Getting “root” access on the local VM you are logged into locally to launch the attack from is not considered success. You must gain access to the remote target!

Moreover,  You will need to conduct research to find the answer. The tools and methods you use to research are your own, I care only about the result.

Extra Credit:  Also, 10 bonus points if you can get a Meterpreter session onto the remote machine (screenshot with timestamp required)

Extra Extra Credit: Lastly, 15 more bonus points if you send me a .txt file of the password hashes from the remote machine! (Upload to Unit 6 folder with exam)

CYBS 7355-Penetration Testing and Vulnerability Assessments

2. 50 Points – Penetration testing requires a very deliberate approach, to provide a thorough and safe result. Your textbook describes one methodology/framework, but there are several more widely used methodologies such as the Open Source Security Testing Methodology Manual
(OSSTMM), Penetration Testing Execution Standard (PTES), and MITRE’s increasingly popular Adversarial Tactics, Techniques, and Common
Knowledge (ATT&CK) framework. Select either OSSTMM, PTES, or ATT&CK and explain the importance of using a formal testing methodology.

Finally, Clearly define what occurs in each phase of your selection and the significance of each phase.

 

CYBS 7355-Penetration Testing and Vulnerability Assessments

3. 50 Points – During the last 5 weeks, you have been exposed to numerous testing tools, as well as the phases in which the tools would be used.
Research the following five (5) tools below that could be using during a penetration test:
A. Nmap
B. Wireshark
C. John the Ripper
D. Maltego

E. Recon-ngFor each tool, answer the following questions:

Firstly, What does the tool do?

Secondly, Why is the tool favored by attackers for badness?

Thirdly,  How can the tool be used by a Defender for good?

Fourthly,  What risk does the tool present if used incorrectly on the organization?

4. 50 Points – The University of Dallas’ Chief Information Security Officer (CISO) has asked that you use your extraordinary Google skills to assist him. He’s concerned about two things:

A. The UD Banner Web AppDev team system may be creating unnecessary risk for the university. He has asked you use Open Source Intelligence
(OSINT) to see if you can find any public information regarding the non-production TEST and DEVL databases for both Banner Forms and the Banner
Web (4 items in total). Find the URLs of these items (provide screenshots of URLs) and any other information you can. (**CAUTION: Use only OSINT, and do not attempt to exploit any sites!**)

B. He’s also concerned that his boss, the CIO, wanted him to attend the 2017 Tower Awards and to report about what was said concerning the UD
Cyber security program. He missed the event and desperately needs your help.

Lastly, Can you find the press release from event and identify the recipient who spoke regarding the University’s cyber security program, and provide the specific cyber security quotes from the speech?

Inferences population variances concepts and terminologies

Inferences population variances concepts and terminologies

This is an assignment that discusses the inferences and population variances concepts and terminologies. The paper also demonstrates the concepts and techniques in course readings.

Inferences and population variances concepts and terminologies

The purpose of this assignment is to:
Explain various concepts and terminologies related to making inferences about population variances.
Compute estimations and test for a population variance.
Compute estimations and test for comparing two population variances.

Synopsis

In this assignment, you are to demonstrate your understanding of concepts, tools, and/or techniques covered in the course readings and class activities for this week. You will demonstrate this through completion of selected practice exercises at the end of assigned chapter readings. Additionally, you will work on the problems within your group by discussing and sharing your thoughts about each problem, but you have to submit your own individual assignment. You will also submit your peer evaluation form with your assignment.

You are to be thorough in your responses. As you do this, constantly ask yourself (and reflect) on how you would apply the same statistical concepts and techniques to any other project or to your upcoming dissertation. Even if the questions in the exercises are worded as yes/no questions, you are expected to provide an explanation and justification for your answers. As a doctoral student, you are also expected to provide evidence and explanation for your responses and claims, and show supporting work for all your answers.
Note: You may also utilize Smarthinking tutoring to help you with this assignment.

Overview

1.   Make sure that you have also accessed all resources in the Week 3 Preparation object before starting this assignment.
2.   View this video tutorial on how to import an Excel file into SAS studio.
3.   You can post questions regarding this assignment or other Week 3 assignments in the Week 3 Doctoral Dialogue learning object.
4.   As a group, you will work on the weekly Practice Assignments, but you will submit your own individual submission. Also, you will evaluate each other’s participation to the group dynamics using the rubric provided.
5.   Make sure to be thorough in your responses.