Write an essay about the history of the criminalization of undocumented immigrants in the United States. Your essay should include a discussion of the 1921 and 1924 Immigration Acts that Mae Ngai writes about in “The Strange Career”; why and when ICE was created, how and why Trump “radicalized” it (Franklin Foer); and how it operates today, including 287G, for-profit detention centers, and refugee policy and practice (“Immigration Nation,” New Yorker Radio Hour, and “On the Media”). Your essay should include a discussion of historical continuity. While it may be tempting to say that everything changed once Trump (or Biden) became president, we have learned that there is often more continuity than change. For example, while the Immigration Acts of 1921 and 1924 do represent structural change in immigration law (as does 9/11) what does the historian Tom Wong say in the OTM podcast (2nd link below) about immigrants seeking asylum at the border?
Discussion 3
Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter’s 6 & 7 (Jamsa, 2013).Chapter 6 topics:
- Define and describe a SAN.
- Define and describe NAS.
- Describe how cloud-based data storage works.
- Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
- Many users do not yet feel comfortable storing data within the cloud. Discuss some steps you can take to reduce their concerns.
- Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
- List the pros and cons of cloud-based data storage.
- List the pros and cons of a cloud-based database.
Chapter 7 topics:
- Define collaboration.
- Define and describe cloud-based collaboration.
- The CIO of Ace Accounting Services suggests that the company can save considerable money using VoIP for phone calls. Define and describe VoIP. Then present three companies that provide VoIP offerings. Compare and contrast each company’s offering. Also, discuss whether or not you agree with the CIO and justify why.
- List the questions one should consider when evaluating a cloud-based collaborative solution.
Network Defense and Countermeasures on Property Management Systems (PMS)
Final Paper Class of Network Defense and Countermeasures
Read this article: https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/hosp-pms-project-description-draft.pdf
Answer these questions:
1. What is a Property Management Systems (PMS) system?
2. Use a case study about a hotel chain?
3. What components of a Property Management Systems (PMS) system should be patched first? Why?
Paper formatting:
No cover page or running header is needed (in fact, the running header requirement is eliminated in APA V7). Watch out plagiarism on content.
5 pages double spaced. You should be able to easily fill these pages with a well-written findings document. Use double spacing, Times New Roman 12 pitch font.
You will include an introduction and/or conclusion but do not inflate your word count by padding those sections excessively.
You need (5) references included website URL example (www.tech.com/networkdefense ), sources from a journal or case study or white paper no more than 3 years old and at the end of the paper and cited appropriately in the body of the paper. You may include more if you want.
Need this by 3:00pm EST on December 16, 2021
Access and Optimization of Technology
- Please discuss the following
- How is evaluating an organization’s Capability Maturity Model Integration (CMMI) level associated with governance, and why should IT leadership be concerned with the CMMI?
- How will the Virtuous Business Model impact governance in the organization?
3. Universal Principles of Governance for Biblically and Nonbiblically Normed Institutions
minimum 550 words and three references
PowerPoint_2G_Orientation
PowerPoint_2G_Orientation
#PowerPoint 2G Orientation
Project Description:
In the following project, you will format a presentation that is shown to Sensation Park Entertainment Group employees on their first day of a three-day orientation.
Open the file Student_PowerPoint_2G_Orientation.pptx downloaded with this project.
On Slide 1, format the subtitle—New Employee Orientation—as WordArt using the last style in the first row.
Select the picture and then Crop the image from the left side so that the center-left crop handle aligns with the left half of the horizontal ruler at 5 inches.
Change the picture Height to 3.5 and then apply a Glow: 8 point; Turquoise, Accent color 1 picture effect to the image. Use the Align Selected Objects command to apply Align Middle to the title and the picture.
On Slide 2, remove the bullet symbol from the paragraph, and then change the Shape Fill to, under Theme Colors, in the third column, the second color, and the Shape Outline to under Theme Colors, in the second column, the first color.
On Slide 3, convert the bulleted list to the Hierarchy type SmartArt graphic—Hierarchy List. Change the color to Colorful Range – Accent Colors 3 to 4, and then apply the 3-D Inset style.
On Slide 4, change the two bulleted lists to Numbering.
On Slide 5, change the bullet symbols to Filled Square Bullets, change the Color to under Theme Colors, in the third column, the fourth color, and then change the Size to 100.
On Slide 5, in the placeholder on the right, insert an online picture by searching for fire alarm and then insert a picture of a fire alarm with a background.
Note—alternatively, insert the image p02G_Alarm.jpg downloaded with the data files for this project.
If the option is available, remove the background from the picture, and then apply the Glow: 18 point, Bright Green, Accent color 3 picture effect.
On Slide 5, insert a Text Box below the content placeholder on the left side of the slide. In the text box, type All employees will be tested on park safety procedures! Using the Align to Slide option Align Center the text box and apply Align Bottom.
On Slide 6, from the Shapes gallery, under Basic Shapes, insert a Diamond of any size anywhere on the slide. Resize the diamond so that its Shape Height is 6 and its Shape Width is 8.
Using the Align to Slide option, apply Align Center, and Align Middle to the diamond shape. Apply the Moderate Effect – Bright Green, Accent 3 shape style.
In the diamond, type Sensation Park Entertainment Group Welcomes You! Change the Font Size to 28, and then apply the Round Convex Bevel effect to the diamond shape. Note—this effect may be called Art Deco on some systems.
Insert a Header & Footer on the Notes and Handouts. Include the Date and time updated automatically, the Page number, and a Footer with the text 2G_Orientation
Display the document properties. As the Tags type orientation.
Save and close the file, and then submit for grading.
Computer Science
Assignments:1
Learning About OWASP
Visit the OWASP website.
Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP.
See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.
Safe Assign is software that verifies the originality of your work against on-line sources and other students.
Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.
To improve Safe Assign score, submit references in a separate document or paste in the text section.
Attach your WORD doc and then hit SUBMT.
Assignment:2
Learn About creating good password security.
An IT Security consultant has made three primary recommendations regarding passwords:
1. Prohibit guessable passwords
o such as common names, real words, numbers only
o require special characters and a mix of caps, lower case and numbers in passwords
2. Reauthenticate before changing passwords
· user must enter old pw before creating new one
3. Make authenticators unforgeable
· do not allow email or user ID as password
Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations. Do you agree or disagree with these recommendations. Would you change, add or delete any of these? Add additional criteria as you see necesarry.
Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.
To improve Safe Assign score, submit references in a separate document or paste in the text section.
Attach your WORD doc and then hit SUBMT.
Assigment:3
Do a bit of research on JSON and AJAX.
How do they relate to the the Same-Origin policy?
Using WORD, write several short paragraphs on each. A total of 200-300 words.
Use your own words and do not copy the work of another student.
Attach your WORD document here.
Assignment:4
You are the web master of a college website. You share a server with other school departments such as accounting and HR.
Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.
Write your answer using a WORD document. Do your own work and use your own words. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.
You have three attempts.
To improve Safe Assign score, submit references in a separate document or paste in the text section.
Attach your WORD doc and then hit SUBMT.
Assignment:5
Do a bit if research into File Inclusion Vulnerability.
- What is it?
- Why is is dangerous?
- What is the difference of low and remote inclusion?
- What methods can me employed to prevent a security breach?
- What programming languages are vulnerable to this type of attack.
Post between 100-300. Use your own words. Do not copy the work of another students.
Assignment:6
You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:
· Who is likely to attack your site?
· When are attacks likely to occur?
· What sort of attacks might take place?
· How can you best minimize attacks and protect the integrity of your site?
Write between 200-300 words.
DISCUSSION DUE 5/25
- Select one of these major cloud service models: IaaS, SaaS, or PaaS.
- Describe key issues when configuring and operating security for your selected cloud service model.
- Be sure to support your response with examples based on your research and experience.
- Provide a full citation and reference
C# Programming (Classes and Objects)
1. Start a ( Console App (.NET Framework) ) project in Visual Studio 2019.
2. Name it “Classes and Objects”.
I attached the main assignment instructions as photos.
Please write Without plagiarism and submit. Thank you!
Cloud computing-Fintech's case study- 5 pages- No plagiarism
For this module your assignment is to consider the offerings of each provider, Amazon, Google and Microsoft. Then, in a 4 – 6 page paper identify specific risks, and offer specific suggestions for launching, running, and managing the proposed new service if that provider is chosen.
IT202 Assignment 4
Describe the purpose of a computer operating system (OS) and tell methods and utilities to keep the OS running well.
Submit one to two pages in APA format.