Dr. keloki reborn only

Write anÿanalyticalÿessay based upon the prompt and set of documents below and upload completed work into Blackboard through the link below. Worth up to 100 points.Requirements:Must use evidence from ALL of the primary source documents below and may use evidence from other primary and secondary materials in Units 1 and 2. Any essay not making use of evidence from all of the primary sources will be assessed a one letter grade penalty..3 pages in length, 12 point type, double-spaced, 1 inch marginsAnalytical, rule of three, styleYou should have at least 9ÿfootnotesÿ(parenthetical cites are not allowed) in the modifiedÿTurabianÿstyle used in this course (see Guide to Citation Style). ÿAnyone not footnoting will loose from one-half to a full letter grade and may end up plagiarizing (at which point you will earn a 0 for the assignment and your work sent to Student Conduct (we are serious about plagiarism).Do not merely paraphrase other work (whether cited or not) as this is poor scholarship and does not reflect your thoughts and your analysis.PROMPTWrite an essay based upon the documents below (and any other sources from the course that you may wish to use) upon the following prompt:Analyze the role of Indians in the creation of the European colonies.Required Document 1: Don Juan de O¤ate, Letter from New Mexico to the ViceroyRequired Document 2: Samuel de Champlain, The Journal of Samuel de Champlain, (1609)from Topic 2Required Document 3: Remarks by Chief Powhatan to John Smith, (ca. 1609)from Topic 3Required Document 4: Bacon’s Declaration (1676)from Topic 4THE “RULE OF THREE” ANALYTICAL STYLEYou will need to use an analytical writing style in this class.ÿ The basic form of analytical writing utilizes the “Rule of Three.”ÿ Simply, the essay thesis should contain a minimum of three points you will develop more in the body of the essay. ÿEach of these pieces has its own paragraph with a thesis andÿat least three key points/pieces of evidence supporting your analysis.This is a 3-4 page essay length assignment.ÿ Your paper should begin with an Introduction paragraph which sets the prompt in the historical context, the LAST sentence of the intro paragraph is the thesis statement which lists the (minimum of) three points (X,Y,Z) that will be more fully developed in the paper.ÿ The first paragraph of the body (paragraph 2) would discuss key point X (this paragraph would have its own thesis as the first sentence, followed by three pieces of evidence/analysis in support), then a paragraph on Y, and finally one on Z.ÿ An essay ends with a conclusion paragraph – which sums up the argument you made and ties X, Y, and Z together.ÿ The conclusion is NOT the place to introduce new arguments or evidence.So Rule of Three means three key points in a thesis, a body with three paragraphs (one for each of your key points), each paragraph has a thesis supported by three key pieces of evidence. Followed by a conclusion. (If it sounds as if I keep repeating myself, I am. ÿI want you to remember the style you are to useÿin thisÿcourse)How the Assignment is GradedThe assignment is worth up to 100 points.ÿ The following factors are taken into account when I grade:THESISÿ- Do you have a well thought out and clear thesis for the whole essay in the introduction? Does each paragraph of the body have its own thesis statement?EVIDENCEÿ- You must have solid evidence for each point you raise in the thesis.ÿ Evidence is not simply a statement, there must be an explanation of how that evidence supports the thesis statement. You must provide a MINIMUM of THREE pieces of evidence in support of each key point of your thesis.Example:ÿ If you were writing a paragraph on the causes of the Cold War, you might use theÿBaruchÿPlan as an example.ÿ Simply writing “theÿBaruchÿPlan was a cause of the Cold War” in your paragraph would not be enough to make your point.ÿ However, the following sentences would make your point:”One cause of the Cold War was the failure of the United States and the Soviet Union to agree upon a plan for nuclear disarmament after World War II.ÿ TheÿBaruchÿPlan, presented by the US, would maintain the American atomic weapon advantage for the foreseeable future.ÿ This played into Stalin’s suspicions of the Americans’ true motivations toward the USSR.”You should have a minimum of three pieces of evidence in support of your thesis (each point of the thesis for the whole essay needs at least its own paragraph in the body and each paragraph of the body needs its own thesis with its own supporting evidence). ÿHISTORICAL ACCURACY, CLARITY, AND LOGICÿIs your argument clear and does it make sense?ÿ Is it historically accurate?ÿ Does your evidence prove your point?ÿPROPER CITATIONÿHave you properly cited? Have you used the format required in this course (Turabian/Chicago)? ÿYou must also FOOTNOTE.ÿ Parenthetical cites are NOT allowed.ÿGRAMMAR AND SPELLINGIs the essay up to college standards for grammar and spelling?Grade Scale:ÿA = 90-100 ÿ ÿ ÿExceptional in all aspects noted aboveB = 80-89 ÿ ÿ ÿ ÿAbove average in most of the aspects noted aboveC = 70-79 ÿ ÿ ÿ ÿAverage workD = 60-69 ÿ ÿ ÿ ÿBelow average workF = 0-59 ÿ ÿ ÿ ÿ ÿUnacceptable college level work

homework in two hours

Reader ResponseAirport Security Debate 60 points1. Read theÿarticles belowÿthat have differing viewpoints on using airport body scanners.ÿ2. Write a 1/2 page summaryÿfor each article, double-spaced, size 12 font, Times New Roman.ÿPlease include the title, author, and publication of the article in the summary.Give the Issue.Give the author’s conclusion. (“I believe” statement)Give the reasons to support the conclusion. (look for at least three)State the author’s value assumptions (How do they believe the world “should be”)What is the reality assumption regarding airport security? (How the world ?really is?.)Remember, if you are going to use the author’s words, YOU MUST PUT THEM IN QUOTES to give credit where credit is due. As much as you can, (staying true to the article!) put the summary in your own words. I don’t want to have a regurgitation of the article. I’ve already read it. 30 pts3. Write a « to one page response to the article, double-spaced, size 12 font, Times New Roman.The response should include your opinion about the articles. Which article did you agree with more? Why? Be specific. Use their arguments to support your thoughts.What are your value assumptions regarding this issue? Why? Have you always felt this way? Has your mind been changed?Make a connection with the topic to support your opinion. What have you experienced in airports? Friends? News stories? Again, be specific.Your response is very important. It is an indicator to me just how much you understood and can apply what you have read. 30 ptsARTICLESOur view on transportation security: Airport body scanners balance safety and privacyÿGet over squeamishness. With safeguards, imagers add protection.ÿBy: The USA Today Editorial BoardÿFliers, it seems, have more common sense than some of the legislators charged with protecting them from terrorists.ÿIn a USA TODAY/Gallup Poll last week, 78% of air travelers said they favor plans to install body scanners at airports. Last summer, by contrast, the House of Representatives voted overwhelmingly to bar the machines for primary screening because they can see through clothing, even if just opaquely.ÿIt’s a simple choice: safety over modesty, the same trade-off you make to get an annual physical. With the failed Christmas Day bombing plot fresh in mind, the Senate, which has yet to vote on the House bill, should do a better job of sorting priorities.ÿThanks to some technological improvements, the scanners aren’t all that invasive anyway, and they might have spotted Umar Farouk Abdulmutallab before he boarded his flight from Amsterdam to Detroit.ÿThe machines can reveal objects that metal detectors miss, such as plastic firearms, ceramics knives and, yes, possibly explosives hidden in a person’s underwear. But more than eight years after the 9/11 attacks, only 19 U.S. airports use them and then at only a few checkpoints. Scanners are also scarce in Europe, and none was at the checkpoints for Abdulmutallab’s flight.ÿThe U.S. government plans to deploy 300 more of the new scanners this year. All that stands in the way are the excessive concerns of privacy advocates that the scanners can reveal private body parts. When the technology was recommended in 2002, concerns about “virtual strip searches” were valid. But the devices’ invasive aspects have been toned down considerably since then. Now, software obscures images of body parts. Individuals can’t be identified. The operator who sees the image is in another room; if anything raises concerns, the operator contacts the agent performing the scan.ÿThese safeguards represent a reasonable compromise between safety and privacy. The Transportation Security Administration could assuage another valid worry ? that images might be stored and used later ? by being straighter with the public. Instead, the TSA has damaged its credibility with conflicting information.ÿAlthough the agency has proclaimed that the “technology cannot store, print, transmit or save the image,” internal documents from 2008 show that the TSA sought to buy scanners thatÿcanÿstore and send images when in a test mode. The best way to protect the public is for Congress to set out restrictions, perhaps allowing the images to be stored for a few hours for potential investigative purposes after a terrorist incident.ÿInstead, lawmakers have sought limitations that defy reason. In an unusual display of bipartisanship, the House voted 310-118 in June to restrict the use of scanners to secondary screening of suspicious passengers.ÿRep. Jason Chaffetz, R-Utah, who sponsored that measure, insisted after the Dec. 25 incident that Abdulmutallabÿshouldÿhave been on a watch list that triggered secondary screening, when fliers are either patted down or put through scanners.ÿAgreed. But that’s just the point: Airport screening is meant to provide additional layers of security to catch those who have slipped through other parts of the system. The scanning should be routine if it can be used as efficiently as metal detectors are now. In fact, it is already replacing some metal detectors in Albuquerque, Las Vegas, Miami, Salt Lake City, San Francisco and Tulsa.ÿCritics also portray body scanning as a knee-jerk reaction to the botched Christmas Day attack. Wrong again.ÿConsider this headline: “A New X-ray Scanner to Hinder Hijackers.” That’s fromÿFortuneÿmagazine ? in 1986. At the time, several foreign governments planned to deploy a precursor to today’s machines to scan for plastic pistols, then a new terrorism tool.ÿIt’s annoying that boarding an airplane has to be such an undignified experience. But it sure beats being on board with a bomber.ÿ(TSA photo via Bloomberg)ÿPosted at 12:22 AM/ET, January 12, 2010 in USA TODAY editorial | PermalinkOpposing view: Uniquely intrusive devicesÿ?Creepy and unnecessary? body scanners violate fliers? privacy By Marc RotenbergÿWith the understandable concerns about aviation security after the failed Christmas Day attack, many people are calling on the government to strengthen airport security. Improving watch lists, interviewing suspicious passengers and fixing the systemic intelligence problems would be a good start. But expanded use of body scanners is a bad idea and should not be pursued.ÿBody scanners, unlike other detection technologies, are uniquely intrusive. They capture detailed images of the naked human body, genitalia included. Some people may not object. But the screening can be degrading and humiliating for families, those with strong religious beliefs, travelers with medical conditions or sex operations, and anyone who just thinks it’s creepy and unnecessary.ÿThe Transportation Security Administration says it has handled privacy concerns by obscuring portions of the image and placing the TSA viewer in a separate room. Focusing on what the operator sees misses the larger picture. Body scanners are essentially digital cameras with X-ray vision, designed to peer through clothes and store and record images.ÿEven Rapiscan, one of the vendors, advertises that the images can be recorded and displayed on “any IBM compatible personal computer with color graphics.”ÿDocuments uncovered by EPIC, as a result of a Freedom of Information Act lawsuit, reveal that the TSA can adjust the scanners’ “privacy settings.”ÿIf body scanners are deployed in the nation’s airports, it might not be long before the record switch is turned to “on.” That’s why there must be a clear legal ban on recording images before any more devices are installed.ÿThe technology is also easily defeated.ÿMillimeter wave and backscatter X-ray screening devices are designed to detect dense material against the human body. They’ll find plastic guns and ceramic knives that might be missed by a metal detector. But liquid and powder explosives, of the type involved in the recent attack, are not so easily detected. Attackers know this, which is why they have favored materials that can get through the scanners. Explosives are also easily concealed in body cavities, diapers and tampons.ÿProponents say the technology doesn’t have to be perfect; it just has to provide a new layer of security. That policy approach ignores both cost and effectiveness. It turns passenger safety into “security theater.”We need smart strategies to respond to threats. Fixing intelligence failures and keeping terrorists off airplanes are smart. Throwing money at vendors of surveillance technology, for costly systems that strip Americans of their dignity and are easily defeated, is not.ÿMarc Rotenberg is president of EPIC, the Electronic Privacy Information Center.ÿPosted at 12:21 AM/ET, January 12, 2010 in USA TODAY editorial | Permalink

2 paper work

I need help about regulations in 2 papersÿ1st paper about (Monetary Control Act ? 1980)answer two questions:ÿ1.ÿÿÿÿ Did the regulations solve the problem(s)?ÿ How?2.ÿÿÿÿ Who were the major stakeholders?ÿ2nd paper about (Depository Institutions Act of 1982 (Garn-St. Germain) ÿanswer two questions:ÿ1.ÿÿÿÿÿDid the regulations solve the problem(s)?ÿÿHow?2.ÿÿÿÿÿWho were the major stakeholders?ÿwith refrences pleaseÿthank you

Security Strategy Recommendations document to defend the IT enterprise

This is a paper that is focusing on the Security Strategy Recommendations document to defend the IT enterprise. The paper also provides additional information to use in the writing of the assignment paper. Below is the assessment description to follow:,Security Strategy Recommendations document to defend the IT enterprise,Overview:,Now that the After Action Reports have been analyzed, the consultants must develop a plan for improving the security posture at Sifers-Grayson. This will be in a Security Strategy Recommendations document. The security strategy will be based upon multiple layers of policies, processes, and technologies that, when implemented, will be used to defend the Information Technology enterprise from both internal and external threats and attacks.,Note: see https://www.techrepublic.com/blog/it-security/understanding-layered-security-and-defense-in-depth/ for a discussion of the differences between these two security strategies: layered security and defense-in-depth. You will need this information for the Security Strategies section of your paper.,Two defensive security strategies have been chosen by the senior members of the team.,1. Defense Strategy #1: Build a DMZ for the R&D Center. The DMZ will host servers accessed by the engineers while teleworking and while reaching back to the R&D center from the test range. The DMZ will require the following: (a) business class routers, (b) business class firewalls, and (c) intrusion detection and prevention system.,Demilitarized Zone (DMZ). For definitions and diagrams see https://www.us-cert.gov/ics/Control_System_Security_DMZ-Definition.html and https://fedvte.usalearning.gov/courses/Security+_v401/course/videos/pdf/Security+_v401_D02_S04_T04_STEP.pdf,2. Defense Strategy #2: Implement Enterprise-wide Protective and Detective Measures to defend against both internal and external attackers. These measures will include (a) controlling access to software documentation and source code, (b) implementing enterprise-wide identity management, and (c) implementing either a Security Information and Event Management (SIEM) tool or a ,Unified Threat Management (UTM) tool,.,Remember, ensure that the pages are exclusive of the cover and the reference pages. Also, ensure that you include all the references you use in finding research for this assignment paper. References should be at least three for the paper. All references, citation, and writing should follow the APA formatting and styling guidelines. Finally, ensure you focus on the assignment topic in detail., ,.


Hello i need a good and positive comment related with this argument .A paragraph ÿwith no more 100 words.Re:Topic 5 DQ 1Assessment of the geriatric patient focuses on the promotion of quality of life, maintaining self-care, and preventing disease and its complications.ÿÿÿ Often there are chronic diseases that need to be addressed.ÿÿÿ Some of the major issues are weight and diet, activity, fall prevention and home safety.ÿÿÿ Pneumococcal and seasonal influenza immunizations are important for this populationÿ (Edelman, Mandle, & Kudzma, 2014, p. 616) .ÿÿÿ The comprehensive assessment of the geriatric patient incorporates physical and mental assessments, functional status, social and economic status, pain, and safety of environment.ÿÿÿ The goal is to identify the strengths and weaknesses to provide adequate interventions for promotion of independence and preventÿ decline (Jarvis, 2016, p. 831) .ÿÿÿÿÿ Functional status must be determined, it is one?s ability to live in society and function as they did in their younger years.ÿÿÿ The nurse can observe functional ability or ask questions of the patient or the caregivers.ÿÿÿ There are tools for assessing activities of daily living that can aid in this assessment.ÿÿÿ In the Lawton Instrumental Activities of Daily Living, contains assessment of eight items; use of telephone, shopping, meal preparation, housekeeping, laundry, transportation, self-medication, and management of finances.ÿÿÿ Final scoring does not matter as much as identifying strengths and needsÿ (Jarvis, 2016, p. 833) .The quality of life for an older person is closely linked to the social function.ÿÿÿ Social assessment focus is on family relationships, social groups, and community support.ÿÿÿ Is the person in pain?ÿÿÿ Assess pain right from the start, address the pain with medication and then move on to the assessment.ÿÿÿ Pain impairs the assessment.ÿÿÿ The geriatric patient will need more time for their assessment.ÿÿÿ Consider the feelings of the patient, they may be frightened if they cannot answer questions or perform physical function testing, they may be fearful of the consequences of the results ofÿ assessment (Jarvis, 2016, p. 843) .ÿÿÿ The assessment is multidimensional with many aspects to consider.ÿÿÿ Knowing the normal aging process and results of chronic disease will aid the nurse in this assessment.

The description of a story line of the movie/TV show

This is a paper that is focusing on the description of a story line of the movie/TV show. The paper also provides additional information to use in writing the assignment paper.,The description of a story line of the movie/TV show,Description, This is for my interpersonal communication class. Please use a well-known movie/tv show., 1. Firstly, describe the storyline of the movie/TV show., 2. Secondly, describe the communication that took place and the conflict involved., 3. Thirdly, identify and define what interpersonal communication is., 4. Fourthly, apply three concepts, terms, and/or theories [nonverbal communication, relational dialectics & emotion ( ex: emotion contagion, physiological changes during strong emotions, nonverbal behavior)], 5. Lastly, indicate what was learned related to conflict and how it can be solved in watching this movie/TV show. Also, note what could be helpful in future interactions to improve communication skills when it comes to conflict,FORMAT:, Capture the attention of the audience/paper reviewer., Provide an overview of the topic/concepts/theories that will be discussed in the paper., Define interpersonal communication.,Provide a purpose statement at the end of the introduction paragraph. (i.e. The purpose of this paper will be to ….), -Describe the movie/TV show (i.e. what is it about, who are the characters involved, what was the situation – make sure to include in-text APA formatted citations for the entire body of the paper)., -Identify the communication breakdown/conflict (i.e. what caused the issue in the relationship)., -Analyze and reflect on the example(s) from the movie/TV show. It may be best to first define the concept and follow up with an example of what you saw in the movie/TV show.,-Answer the “so what…” question, by explaining why it is helpful to analyze the episode with these concept(s). (i.e. what did you learn that could be helpful in your own relationships, resolving a conflict in the future)., -Conclusion (approx 1-2 quality paragraphs), Include an “In conclusion” statement at the start of the conclusion., Summarize/review your findings.,.

Business Responsibilities and Ethic Principles

Review both Milton Friedman’s “Traditional View of Business Responsibility” and Archie Carroll’s “Four Responsibilities of Business”, and develop an understanding of their ethical principles. You are also welcome and encouraged to research them using outside sources. You are to compare the two theories and create a PowerPoint presentation on your comparative study. Your PowerPoint presentation should include the following elements:

Assignment- Case Study Essay

Instructions: You are required to write an essay. In your essay you must identify and discuss the legal and ethical issues presented in the case study that follows. In your discussion you must address the questions posed at the end of the case study. You are expected to submit your essay with appropriate grammar, spelling, sentences, paragraphs and references. It should be structured using the following ?APA Level 2? headings: IntroductionLegal Issues Ethical IssuesConclusion

PB 1

The summary needs to be minimum of 250, APA format, intext citations and separate reference section Individually summarize the information provided to you from the Hadleyville Town Manager in Memo One. Anticipate challenges and opportunities you foresee with this project. The town of Hadleyville, Arizona is reeling from a recent shutdown of the Wilson Performance Automobiles Plant that employed more than 2,500 of the town’s population of 40,000. In addition, the recent economic strife has lead to decreases in retail sales tax, more job losses, and public utilities that are insolvent and unable to keep up with demand despite fee hikes in 2 of the past 3 years. The town budget has been slashed twice now with overall reductions approaching 12% in the previous fiscal year. With revenues continuing to decrease and no end to the economic woes in sight, the town budgeting process begins this fall.You will be provided with three briefings from the Town Manager via memo. The briefings will provide you with additional information needed to complete your proposal.This is a cumulative project ending with a proposal (fyi)?.Material ÿ(memo1)ÿ is attached below…

Essay Exam. International MGT

Please find in attachment the guidline to the required ESSAY.ÿYou will have to read the three relevent articles that I attached. And YOU WILL HAVE TO FOLLOW EVERY SINGLE POINT IN THE INSTRUCTIONS AND GUIDLINE.ÿDue in 24 hours.ÿIt has to be in Word doc.