paraphrase cyan highlighted paragraphs 1

Can someone help me out in paragraphing this essay? The paragraphs in cyan blue needs reworded to pass any plagiarism checker, thanks if you could make it easy words on paragraphing not sophistatic words because this is for my 11 grader in highschool it would be greatly appreciated thanks in advance

code of ethics 26

After reading the National Association of Social Workers “Code of Ethics” article, discuss one of the six major principals emphasizing its meaning, significance and implications for practice. What struggles might you see in the practice of this principle? Reply in 250-300 words

issc421 vpn discussion response

Hello,

I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.

  1. Briefly list and explain the technology you will recommend using to setup the VPN.
  2. List the best practices you intend to use.
  3. Explain any potential threats and exploits, and what precautions will be taken to prevent them.

Student one:

Hello Class,

Briefly list and explain the technology you will recommend using to setup the VPN.

When setting up a VPN, now that we have the budget to do so, I would setup a hardware VPN. While a hardware VPN does not allow for scalability and it is more expensive, it has its own processor and all traffic will be routed through it, providing better protection and the processing power will be used by the VPN versus a separate software server that was setup. When considering the hardware VPN though it is crucial to determine what your network needs are, and if you are going to grow. Because there is no scalability with a hardware VPN, it is more financially beneficial to go bigger than to get what you think you need, just to have to upgrade it later which would in turn just be costing more money; plus the time to reconfigure the new VPN!

List the best practices you intend to use.

I would place the VPN in a DMZ. This would allow the web servers (if there were any) to have access to the internet without a VPN, but then the firewall would protect the VPN as well as the connections past the VPN into the corporate network.

Explain any potential threats and exploits, and what precautions will be taken to prevent them.

I think the biggest threat to the company are the users. Whether advertently or inadvertently, users cause the biggest threats to a network. Between checking personal emails, clicking on random attachments, clicking on random links, or visiting potentially dangerous websites, users are what bring in the threats and exploits. To combat this I would make sure that every employee gets a statement of understanding so they know what they can and can not do on the network, with consequences if they were to do what they are not allowed to do including a counseling making them resign the statement of understanding. To include this I would also have monthly or quarterly training that everyone must attend to review the policies as well as if there are any changes.

Eric

Student two:

Greetings Class,

The following recommendations ensure VPNs are implemented with a focus on protecting Confidentiality, Integrity, and Availability.

According to Network Security, Firewalls, and VPNs by Michael Stewart, VPN deployments should include strong authentication, strong encryption, and the VPN should be protected by a firewall (Stewart, 2015) to protect against modern threats and exploits. The book states, strong authentication ensures only authorized clients connect to the VPN server while strong encryption protects from man-in-the-middle attacks and ensures confidentiality of data transmitted over the internet. Lastly, putting the VPN behind a firewall protects it from internet based attacks such as Distributed Denial-of-Service (DDoS) (Stewart, 2015).

For this reason, to protect against threats and exploits I recommend IPsec. According to the article, what is IPsec by Josh Lake, IPsec works by establishing an encrypted point-to-point connection between the VPN server and client. IPsec uses Security Associations (SAs) to establish the parameters and encryption algorithms of the tunnel. IPsec then uses Encapsulating Security Protocol (ESP) and Authentication headers (AH), to encrypt the payload (lake, 2019). The primary drawback of IPsec is it requires a VPN client to be installed on the client workstation. This is not a requirement on other implementations such as Secure Socket Layer (SSL).

Additionally, the VPN should be placed in a De-militarized zone (DMZ) configuration. This ensures the VPN is located behind the firewall and protected from internet attacks (Stewart, 2015).

Other implementations include point to point tunneling protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), & Secure Socket Layer (SSL) for implementing VPN authentication and encryption.

Regards,

-Stephen

References

Stewart, J. M. Network Security, Firewalls and VPNs. [VitalSource Bookshelf]. Retrieved from https://online.vitalsource.com/#/books/97812841077…

Lake, Josh (2019). What is IPsec and how does it work. Retrieved from https://www.comparitech.com/blog/information-security/ipsec-encryption/

case study tiffany s writing development

To complete this assignment read the case study overview/rubric, then follow the steps to develop assignment.

  • Read the Children’s Writing Progression Sample to help you in analyzing Tiffany’s writing progression.
  • Carefully read the case study.
  • Compare Tiffany’s writing progress to that in the Children’s Writing Progression Sample.
  • Analyze Tiffany’s writing progress in a 2-3 page, double-spaced APA style paper and support your conclusion with references to the text and other course materials.

Rubric:

Analysis of stages of writing development: Exemplary: A 2-3 paragraph highly articulate overview is provided of Tiffany’s and stages of writing development using thoughtful connections to the course materials. (4pts)

Evaluating of writing progression: Exemplary: A 2-3 paragraph highly articulate overview is provided evaluating Tiffany’s writing progression using thoughtful connections to the course materials. (4pts)

Support of conclusion: Exemplary: A scholarly 1-2 paragraph succinctly articulates Tiffany’s knowledge about print concepts and the function of print. Conclusions are well-supported through thoughtful connections to references and resources. Exemplary APA formatting employed throughout the summary. (2pts).

Course videos

Word Study in Action: Making words lesson

https://www.youtube.com/watch?v=7nxljktf-Hw&feature=youtu.be

Five Predictors of Early Literacy

https://www.youtube.com/watch?v=HqImgAd3vyg&feature=youtu.be

Chapter 4 from the textbook: Bear, D. R., Invernizzi, M., Templeton, S., & Johnston, F. (2015). Words their way: Word study for phonics, vocabulary, and spelling instruction (6th ed.). New York, NY: Pearson.

write a memo to wilson watson explaining the costs that probably make up these fringe benefits

The director of the art department at an advertising company, Wilson Watson, wants to hire new office staff. His boss tells him that to do so he must find in his budget not only the base salary for this position but an additional 30% for “fringe benefits.” Wilson explodes: “How in the world can there be 30% in fringe benefits?” Write a memo to Wilson Watson explaining the costs that probably make up these fringe benefits.

Required:

  • Length should be 1-2 pages
  • 1 inch margins all around
  • Double Space
  • Use 12 point font and left justify all text. Use a professional font (Arial, Times New Roman, Courier).
  • MLA or APA Format
  • Save as a Word Document
  • Reference page (should be

what was the most significant thing you learned in sociology 1

what was the most significant thing you learned in Sociology 1?

We talked about many topics this quarter. You can choose one of them to write about.

1. The reason why we should go to college.

2.social norm

3.race

4.gender

racial disparities

Introduction

Race is not an easy topic of discussion. It often sparks strong feelings and emotions. When examining race in the context of disparities in the criminal justice system, there are grouping themes. Some maintain that the disparities are the result of the system operating as a giant sieve to differentiate offenders and, as such, more men of color are placed under correctional authority because they commit more crime. Others maintain that the sieve is racist, with the system treating men of color more harshly in comparison to the way white men are treated. A third group maintains the criminal justice system operates within the broader context of societal racism and represents a mechanism for its expression.

Regardless of the reason, racial disparities are an area of importance in criminal justice. Let us look more closely at the issue.

In your initial discussion post:

  • Determine the impact of high minority incarceration rates on minority communities.
  • Analyze the implications of high minority incarceration rates on the effectiveness of the criminal justice system.
  • Correlate the close relationship between politics and criminal justice policy, and issues of race and punishment.
  • Lay out two important steps for reducing racial disparities in punishment.

researching a proposed bill 1

Researching a Proposed Bill

For this assignment you will pick an area of social welfare that you are interested in (e.g., Child welfare, mental health, disability, substance abuse, health care, criminal justice, etc.). Next, you will find a Bill that is being proposed and voted on at the Federal Level (Congress) or State Level (any state you choose) and write a short paper 2 pages about the 1) write one paragraph summary of what the bill is about. 2) general social issue that bill addresses, 3) the purpose or intent of the Bill, and 4) your opinion about it (would you support or oppose the Bill and why?). (Use A.P.A citation)

first step: you can researching on this website: https://www.house.gov

Second step: find and click on the bill& report. type the topic you want to research it.

Third step: choose one bill article and read it through all

Forth step: write the short paper by following the questions:1) write one paragraph summary of what the bill is about. and attach the article you searched about in the end 2) general social issue that bill addresses, 3) the purpose or intent of the Bill, and 4) your opinion about it (would you support or oppose the Bill and why?).

please answer the following questions you will need to read the chapter s to adequately answer these questions 2

You need to read 6 files that I attached first and then please answer follow questions.

Answers are expected to be written in full sentences and be thoughtful.

You are to type your responses underneath each question in this document.
Please make sure there is a space between the question, your response, and the next question.

you don’t need to write cover page for this assignment.

before answering the question, please read carefully all of the 6 files.

just need short two or three paragraphs for each question.

thank you

Please answer the following questions completely.

Chapters 8-10

Question 1 (10 points) (Chapter 8)

Explain the process of market segmentation, market targeting, and market positioning.

Question 2 (10 points) (Chapter 9)

Use a product from the hospitality or travel industries to explain the following terms (provide an example in your explanation): a) facilitating product; b) supporting product; c) augmented product.

analyze reflect connect essay

this first Analyze/Reflect/Connect assignment asks you to analyze the Code of Hammurabi–one of the most important surviving documents from ancient Mesopotamia–and reflect on what it can tell us about the civilization in which it was produced. (A translated copy of the Code is attached, along with a brief introduction from another book. As you read over the many laws, watch for clues about different aspects of ancient Mesopotamian life and society, both direct and indirect.

Your essay should address the following:

(1) Analyze/reflect: What can we learn about ancient Mesopotamian civilization from the code of Hammurabi? In your response, cite at least three specific laws as examples, using the assigned numbers in the document. This section should comprise most of your response (at least two-thirds).

(2) Connect: How do our laws today reflect our own changing society and values? Give at least one specific example of a law adopted or changed to reflect our changing society/values.