Christianity/Islam Paper

write a 2-3 page paper comparing/contrasting Christianity and Islam. What are the central assumptions for each worldview/religion? How are they similar? How do they differ? This paper is informal, meaning that it does not require additional sources, and does not require formal language

Pantheism/New Age Paper

write a 2-3 page paper comparing/contrasting pantheism and new age thought. What are the central assumptions for each worldview? How are they similar? How do they differ? This paper is informal, meaning that it does not require additional sources, and does not require formal language.

Organizational Behavior

this is the Question : (3) Provide a detailed analysis of the situation using these course concepts.

I need one paper.

This should not be an historical account of a problem and the company’s solution.  Rather you will strive to focus your analysis by applying the concepts from the course.  While it is acceptable to incorporate several concepts from the course, your goal should be to aim for depth rather than breadth regarding the use of course concepts.  Your goal is to diagnose the mechanisms that are causing the problem or issue of concern in the organization. Initially, you may notice many symptoms (for instance, high turnover, seemingly low morale, low commitment, motivation etc.), but your task is to get to the underlying reason for these symptoms. Beware that sometimes the initial symptoms we think we see are not what they appear to be.

Network security 

Network security

A firewall is a network security device that screens approaching and active network traffic and chooses whether to permit or block explicit traffic dependent on a defined set of security rules. Firewalls have been the first line of protection in network security for more than 25 years. They set up a boundary among verified and controlled inner networks that can be trusted and untrusted outside networks, for example, the Internet. A firewall can be hardware, software, or both.

There are several types of firewalls such as:

Proxy firewall; An early sort of firewall gadget, a proxy firewall serves as the gateway from one system then onto the next for a particular application. Proxy servers can give extra usefulness, for example, content storing and security by keeping direct connections from outside the system.

Stateful inspection firewall; Presently thought of as a “customary” firewall, a stateful inspection firewall permits or blocks traffic dependent on the state, port, and protocol. It screens all activity from the opening of a connection until it is shut.

Unified threat management (UTM) firewall; An UTM device normally join, in an inexactly coupled way, the elements of a stateful inspection firewall with intrusion prevention and antivirus.

Next-generation firewall (NGFW); Firewalls have developed past straightforward packet sifting and stateful inspection. Most organizations are conveying next-generation firewalls to block modern dangers, for example progressed malware and application-layer attacks.

threat-focused NGFW; These firewalls incorporate every one of the capacities of a conventional NGFW and furthermore give propelled threat detection and remediation.

In its relevance to the network security, firewall plays the following roles:

Gives defense against outside dangers by declining unapproved connections to the router from potential attackers, for example, hackers.

It additionally shields the network infrastructure from inside. In other words, it blocks active connections from the router. It mitigates the spread of viruses, keyloggers, or malware that have sneaked past the router and on the network. Such malicious software may transmit confidential information back to the hacker, for example, passwords. Just a firewall can keep them from doing such by hindering their connection.


William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin (2003). “Google Books Link”. Firewalls and Internet Security: repelling the wily hacker

o 500-700 word, double spaced, written in APA format, showing sources and a bibliography

o Prepare a 15 presentation on your final topic



Describing the technology for defeating DDOS attacks would be a great presentation.

o 500-700 word, double spaced, written in APA format, showing sources and a bibliography

o Prepare a 15 presentation on your final topic

Lawsuit Recommendation Paper

Write a 750-1,000 word paper in which you explore the options for defending a lawsuit in court, going to arbitration, going to mediation, or structuring a settlement.

Scenario: A neurosurgeon is claiming injury and damages from a for-profit hospital that notified him that it had denied his hospital admitting privileges.

The physician claims the hospital used its peer-review process as a veil to deny access to the hospital and his subsequent ability to perform surgeries.

Shortly after, the neurosurgeon began performing surgeries at an academic medical center where he was also named as Chair of Neurosurgery.

The for-profit denies any misuse of its peer-review process and bases its decision on the multiple claims brought by other physicians and patients that the neurosurgeon was over treating patients in order to make more money for himself.

The options for resolving this issue include defending the suit in court, going to arbitration, going to mediation, or structuring a settlement.

  1. What are the advantages and      disadvantages of each resolution?
  2. When addressing the hospital board of      directors, what option would you recommend? Why is your recommendation the      best option?

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

Week 7 Community Assessment Windshield Survey

Prepare a 15- to 20-slide presentation

This windshield survey is a tool used by public health nurses to obtain basic knowledge about a given community. This survey can be conducted by traveling by car, walking, or taking public transportation to gather information on the health of a community and the members of that community. When conducting this survey, make sure to include all community participants, schools, police, fire, hospitals, clinics, etc. Also, please make sure to share your completed presentation with an identified entity in the surveyed community who might be interested in your findings.

For an example project, watch the Community Assessment Windshield Survey video at this link:

Clinical Field Experience D: Targeted Teaching Activities

Objectives, learning activities, and assessments are all aligned to a standard. It is important to align these components so teaching can be targeted to meet the students’ needs. The data collected from the pre-assessment drives the creation of targeted learning activities. As always, reflection on these practices is a key element in improving practices. Use the data collected from your pre-assessment to determine an appropriate targeted teaching activity to implement during this field experience.

Allocate at least 3 hours in the field to support this field experience.

Prior to teaching your targeted activity, discuss with your mentor teacher your objectives, activities, and assessments. Use any feedback to improve the targeted teaching plan. Implement the targeted teaching activity and related assessment with the same student you have been working with during your field experience. Then debrief the experience with your mentor teacher.

Use any remaining field experience hours to assist the mentor teacher in providing instruction and support to the class.

In a 250-500 word summary, discuss the results of your targeted teaching activity. Describe the conversation you had with your mentor teacher regarding the objectives, activities, and assessments. Reflect and explain how you designed, delivered, and assessed your targeted teaching activity. Indicate how you plan to implement what you learned in your future teaching practice.

APA format is not required, but solid academic writing is expected.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite.

Document the locations and hours you spend in the field on your Clinical Field Experience Verification Form.

Submit the Clinical Field Experience Verification Form to the LMS in the last topic. Directions for submitting can be found on the College of Education site in the Student Success Center.

The Famine That Happened In Ukraine 1932-1933 And Southern Sudan 1983-1993

it’s a final paper and I’ve had to work extra hours so I’m behind on getting started. I need it by Wednesday- 20 page paper on The Famine that happened in Ukraine 1932-1933 and southern Sudan 1983-1993.

I am attaching readings and few more documents which will help in writing paper also following are some sources i want you to use.

Week 10 (October 29): Genocide and the State: Famine: Ukraine (1932-33) and Southern Sudan (1983-93).

-Anton Weiss-Wendt, (2010). “The State and Genocide,” in The Oxford Handbook of Genocide Studies.

– David Marcus (2003). “Famine Crimes in International Law,” The American Journal of International Law 97(2)

-Edward B. Rackley (2000). “Displacement, Conflict, and Socio-Cultural Survival in Southern Sudan,” The Journal of Humanitarian Assistance.


-Timothy Snyder, (2015). Conclusion. Our World,” in The Black Earth.


-James E. Mace (2004). “Soviet Man-Made Famine in Ukraine,” in Century of Genocide.

-Timothy Snyder, (2015). “Hitler’s world may not be so far away.” The Guardian Wednesday Sept.16.


Digital Disconnect: How Capitalism Is Turning The Internet Against Democracy By Robert McChesney

1 What three topics does McChesney address in this book?

2 What is Political Economy? What is the most fundamentally important determinant in this theory?

3 Why is Political Economy a method better suited for his study than what the Skeptics and the Celebrants offer?

4 What is Political Economy of Communication? What is the relationship between communication, economic resources, and political power?

5 Summarize two examples, from Chapter 3, McChesney uses to explain the connection between communication, economic resources, and political power. You might consider selecting one historical and one contemporary example.

6 Summarize two examples, from Chapter 4, that address how the openness of the Internet was closed by powerful monopolistic interests from the pre-Internet age.

7 Summarize two examples, from Chapter 5, that address how the Internet has begat new emergent monopolistic interests in the digital age.

8 Why does the Internet, according to McChesney in Chapter 6, threaten the viability of valuable public debate in journalism and what effect does that have for political power?

9 Using two contemporary media industries we’ve studied in class, discuss how you would use political economy of communication to examine these media industries? What would your analysis tell us about the relationship of political power, economic resources, and contemporary media?

10 Conclude with a discussion of whether you agree or disagree with McChesney’s method and why you think his use of political economy works (or doesn’t work) for studying contemporary media.