Literature

 

The bonds between siblings are among the strongest. May-Lee Chai describes the relationship between two sisters in her short story, “Saving Sourdi.” 

After reading “Saving Sourdi,” discuss the following questions in 3–5 paragraphs:

  1. The story begins with a strong revealing statement from Nea, the narrator. How do you think Nea feels about her sister Sourdi based on this information? How does what happens at the beginning of the story foreshadow what happens later?
  2. This story is told from Nea’s point of view. How do you think the story would change if it were told from Sourdi’s point of view? Do you feel closer to the character than you would if this story were told in third person?
  3. Nea briefly mentions an experience she and Sourdi had in a minefield when they were younger. What impact do you think this had on the relationship between the sisters?
  4. Nea’s family is not originally from the United States. What are some clues the author gives to describe the origin of their ethnicity? Give 2 examples of characters who say things that are racially offensive, and discuss how this makes you feel about those characters. Can you relate to these experiences?
  5. How does the author describe Duke and Mr. Chhay? Do you get a sense of who these characters are based on these descriptions?
  6. As the story progresses, how does the relationship between Nea and Sourdi change? Why do you think it changes?
  7. What does the mother value, based on how reaction to updates she receives from Sourdi? Why do you think she might feel this way?

NETWORK SEC

  

Instructions: Answer all questions in a single document. Each response to a single essay question should be 150 words. 

1. Software development is a complex task, especially as technology changes at the speed of light, environments evolve, and more expectations are placed upon vendors who want to be competitive within the software market. This complexity also makes implementing security more challenging. Given this environment, what suggestions for secure software development best practices would you suggest to improve software security? 

2. In addition to application development, databases are another area that needs to have a focus on security within their design. Describe the database concepts of View-based access control, Polyinstantiation, Data warehousing and data mining, and Online Transaction Processing (OLTP)? 

3. In a database, to control security, lock controls are implemented and tested using the ACID test. Explain the following terms for each letter within the ACID method: Atomicity, Consistency, Isolation, Durability. 

Create a presentation

 

File submission: Lab – Create a presentation 

 
Objective of the activity  Through this activity the student will develop a presentation with the following characteristics:  Use different “layouts” (additional to Title Slide “and Title and Content” Apply a “Theme” Include images and integrate audio or video Apply transition movements to slides and animation movements in text and images .

 
Instructions  The purpose of this activity is for the student to develop a presentation using MS Power Point. 

 
What are we going to do?  The goal is to creatively construct a presentation that carries the message in an attractive way.  Visit the Ciudad Seva page of the writer Luis López Nieves. In the poems section, available at https://ciudadseva.com/biblioteca/indice-alfabetico-poemas/ (Links to an external site.), Select the poem of your preference. 

 

How are we going to do the activity?

Read the instructions and the evaluation criteria.

Access the application to create presentations.
Create templates with the text given for each one. Remember the 10/20/30 and 1/7/7 rules.
Apply "background" to the entire presentation.
Add graphics (images and / or photos).
Apply transition movements in the "slides" and animation movement in text and graphics.
Once the presentation is developed, save the final document on your computer with the title of the selected poem. The name of the document must include your name, for example: To my daughter - Maria Olivero.

Check that your presentation meets the evaluation criteria stated in the rubric.

Before doing the exercise, access the resources, including the tutorials. This activity is graded only once.

 
Deliverable  Submit your presentation through this virtual space within the stipulated date. The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of contents (now Urkund). 

 
Basic review resource  Microsoft. (2019). Tips for creating and presenting an effective presentation. Retrieved from https://support.office.com/es-es/article/sugencias-para-crear-y-realizar-una-presentaci%C3%B3n-eficaz-f43156b0-20d2-4c51-8345-0c337cefb88b 

Intro

Write 400 words on below subjects 

1)Access Control (200 words)

2)Business Intelligence(200 words)

Writing assignment

Week 2 Discussion

Consider, in 500 words or more, how business processes as services can improve efficiency. This discussion is about business process as a service and security. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

Write a program to provide the following tasks for a Dictionary object

Write a program to provide the following tasks for a Dictionary object:

  • Create and print a dictionary
  • Accessing items in a dictionary
  • Looping items through a dictionary
  • Change a value in a dictionary
  • Check if key exists in a dictionary
  • Print a dictionary length
  • Adding Items to a dictionary
  • Removing Items in a dictionary

Requirements:

  • Maximum four to five pages in length is required.
  • You must include program code and results.
  • You must include an explanation about how the program works.
  • You must show your work for full credit.
  • You must include a minimum of three credible sources. Use the Saudi Electronic Digital Library to find your resources.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.

diss (WS&F)

 

1) What type of device or system did you select to conduct your forensics investigation?

2) What tool did you use for the data capture? 

3) What did you learn from the experience?

Your response to the DQ must be a minimum of 400 words. You must provide references for your response (APA format). You will need to reply to two (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.

How To Handle Application Scalability (5 pages)

 

Competency

Summarize cloud applications scalability concepts

Scenario

You are a software developer for a retail company that sells mobile phones via the web. Your company has deployed the entire website onto the public cloud. The mobile manufacturing company launches a new mobile every year. Your company’s website gets ten times the traffic during the new mobile launch. Customers often complain about the timeout and slow website performance. Some of them are even moving to other competitor’s websites, directly impacting your annual profit.

The public cloud provides various options to handle website scalability. Your manager has asked you to investigate various alternatives and walk through the best possible cost-effective solution. The goal is to handle the scale-up of the application during the pick load and scale down during the less load.

The public cloud company also provides a cost calculator to estimate the approximate cost to host the solution.

Instructions

In a Microsoft Word document of 5-6 pages, provide a step by step walk through to your manager and discuss the following points.

  • The public cloud vendor you have selected.
  • A description of the public cloud architecture for your web application.
  • A description of the components that are required for your public cloud and their functionality.
  • An explanation of how scale up and scale down will work.
  • How security will be enhanced.
  • A description of the benefits of deploying to multiple cloud regions.
  • An overview of serverless architecture and the benefits provided.
  • The approximate cost to host your design on the cloud.

Be sure use a professional tone and check grammar and spelling.

References

Include a minimum of 5 scholarly resources.

Resources

Requirements to pass (Rubrics)

Word document is 5 or more pages in length.

Public cloud vendor is selected.

Full, robust, and detailed description of public cloud architecture.

Full, robust, and detailed description of the components and functionality 

that are required for your public cloud selection.

Full, robust, and detailed explanation of how scale up and scale down will work.

Full, robust, and detailed explanation of how security will be enhanced.

Full, robust, and detailed explanation of the benefits of deploying to multiple cloud regions.

Full, robust, and detailed overview of serverless architecture and the benefits provided.

Full, robust, and detailed explanation of the approximate cost to host your design on the cloud.

Spelling and grammar are correct; professional tone used.

5 scholarly references provided; documented correctly.

Please write 350 words essay on the following with references?

 Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.

Select one of these compromises and explain how it could be avoided.