see attached
see attached
As many of your might have experienced, learning to speak a second language can be quite difficult. This is especially true for adults. Even if we do learn some rudimentary version of a language that is not native to us, many adults do not become fluent. However, young children seem to learn multiple languages quite easily. For this discussion, please share any experiences you have had with learning a second language – whether it is from childhood, a high school language class requirement, immersion in another culture, or trying to learn it on your own. If you can fluently speak more than one language, share how you were able to do that. How old were you when you learned the second language? How was it taught to you?
If you haven’t become fluent (yet), why do you think that is? How could you have improved your success?
For those of you who have never tried to learn a second language, how hard do you think it would be to start to learn one right now? Why? How would you go about making sure that you were as successful as possible?
Provide your initial post by 11:59 pm on Sunday. Your initial post should be at least 200 words in length, excluding the discussion prompt and the references. Please use in-text APA citations within your post as well as full APA references at the end of your post.
text book: http://book.visualisingdata.com/chapter/6
Java code – foreman
User ID’s, passwords, and personal identification numbers (PINS) are a fact of everyday life in the information age. They are required for activities such as using ATM and debit cards, logging into Windows accessing wireless networks, social media and file sharing. Computer related security is primarily based on passwords associated with user IDs. The level of protection offered by a single-factor authentication depends on good password selection and management on the part of users. It is important to set a standard for creating, protecting, and changing passwords to ensure that they are strong, secure, and personal information is protected.
Declare an array. Gather your first and last name as string input (as all lowercase, with an underscore between first and last name) via scanf and store it in your array. Then, capitalize the first letter of both your first and last name and switch the underscore to a space character. Output the array to the screen before and after the capitalization change.
Use the DEFINE preprocessor directive to represent the size of your name array throughout the program.
Per assignment guidelines, the program should be written to work with any reasonable first name / last name combination.
Example:david_robeson “There is an underscore between the names if you can’t see it.”
David Robeson
The key to this paper is to demonstrate your understanding of the topics, not to re-word the text or reference material. Paper must be 100% original and not plagiarized.
Please complete the scenario below following these guidelines for your deliverable.
Scenario:
A) Create an introductory section where you clearly DEFINE RISK.
B) Research and Pick ONE organization that can you conduct a risk assessment on.
C) Identify the potential risks found in the organization and for it’s ability to function in it’s chosen business vertical (i.e. government, financial, commercial, industrial, shipping& logistics, etc.)
GUIDELINES:
Paper must be a minimum of 2 pages double spaced
Make sure you are using at least two (2) academic APA references.
This submission should be created following APA 6th edition guidelines.
The paper is to follow the APA style guide, Sixth Edition
Do a bit of research on JSON and AJAX.How do they relate to the the Same-Origin policy?Using WORD, write several short paragraphs on each. A total of 200-300 words. Use your own words and do not copy the work of another student.Attach your WORD document here.
need help with code
Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. what do each of these terms refer to: copyright, patent, trademark, trade secret?
2. Why is intellectual property entitled to legal protection?
3. Why did copyright laws become stricter and more punishing in the late 20th century?
4. What is the Fair Use doctrine?
5. Make an argument for legalizing the copying of music or software.
6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?
7. What was the 1984 Sony Supreme Court case about?
8. Was Napster responsible for the actions of its users?
9. Why did the court find in favor of Diamond in the Rio case?
10. What is Digital Rights Management?