Discuss the mother/daughter relationship in “Girl.”

The intent is to write an analytical discussion of a work of fiction.
You should write a traditional paper with a structure that includes an introduction, body, and conclusion. The introduction should include brief background information about the writer. The Literature book does provide some information about the writers, but additional information can be found on the internet or in the library. Brief biographical information will not require documentation. Analytical or interpretive statements about the writer’s work do require documentation, but this paper does not require researched statements. The introduction also needs to include some general opening statements about your specific selection, leading to a thesis indicating the specific analytical approach of this paper.
Critical Analysis – Fiction – 5 paragraph minimum

The intent is to write an analytical discussion of a work of fiction. You should choose a story we discussed. In addition, you are allowed to write about “A Modest Proposal” which would really be classified as more of a satirical essay than a work of fiction.

You should write a traditional paper with a structure that includes an introduction, body, and conclusion. The introduction should include brief background information about the writer. The Literature book does provide some information about the writers, but additional information can be found on the internet or in the library. Brief biographical information will not require documentation. Analytical or interpretive statements about the writer’s work do require documentation, but this paper does not require researched statements. The introduction also needs to include some general opening statements about your specific selection, leading to a thesis indicating the specific analytical approach of this paper.

Analytical approaches might include, but are not limited to the following;

Discussion of the use or significance of a particular literary element within the story, such as setting, point-of-view, symbolism, plot structure, language, or imagery.
Character analysis which could include detailed, specific analysis of a single character or a comparison of characters within the same story. Character analysis could focus on personality, motivations, goals, development, ethics, or other character traits.
Discussion of major thematic ideas.
These papers are based on your interpretations; however, back up your views. Refer to situations in the story, and use them to support your opinions. You should not have to do additional research in order to complete this paper. You may quote from the stories or refer to scenes in the stories without documentation.

How can different Modelling methods be used for creative development of period architecture in a movie

How can different Modelling methods be used for creative development of period architecture in a movie

Clearly define the data transfer rates within the system to provide appropriate levels of aggregation.

An UK wide enterprise in taxation management with its head office in Leatherhead SURREY is looking to enhance its computer systems and reduce its complexity to improve its business processes.

The Enterprise has various offices throughout the United Kingdom.

The Enterprise has grown significantly in recent years and some of its data systems and supporting networking infrastructure has become dated, which may potentially result in security and resilience risks. Additionally, through Brexit concerns they have just acquired SMEs in France, Germany and Spain undertaking similar business operations.

The enterprise sees this as an opportunity to develop/enhance present staffing, enhance business operations and ensure compliance with various regulatory requirements such as GDPR.

A Security Operations Centre (SOC) may form part of this development. – SOC service

The enterprise you work for offers Security Operations Centre (SOC) services and are looking to develop a SOC focused against supporting and providing security services to the Manufacturers.

You as a security operations and assurance consultant have been asked to provide an initial report against such an undertaking to ensure a robust system for future stability, resilience and confidence by all stakeholders. (allowed to make assumptions as this is a fictitious scenario)

Within your considerations the following needs to be considered:

Security considerations for the life cycle of the system i.e. various stages of development, implementation, operational, maintenance and final disposal perspectives.

Against organisational resilience provide critical considerations for business continuity, back-up and disaster recovery of the system.

Provide details of security incident response practices against such a system.

Provide details of expected security assessment and testing with reasoning against such a system.

The proposed system must support the following core aspects: (Network design scope)
• Inter centre communications
• Facilities for remote access to services and databases etc.
• Web and content servers and email systems
• Converged services
• Appropriate bandwidth and servers for streaming video, audio, etc
• Support service flexibility and especially research activities
• Provide management capability with some level of resiliency and disaster recovery with 24×7 operation in ideal conditions

Management concerns (Business objective) (pay more focus on this)
• A need for simplicity in the implementation and management.
• The highest degree of functionality at the lowest possible costs.
• Arrangements that support network and server expansion.
• The impact that failure of the services (server and network equipment) could cause
• The risk of virus and hacker attack to the whole organisation
• Costs of alternative network arrangements for resiliency and availability.
• Maintenance/support considerations.
• Effective communication mechanisms.

Some issues (pay more focus on this as well)
The following list highlights some of the issues that should be considered. These are not necessarily in order of importance and are not comprehensive.
• Assess the technical and functional requirements of the Data centre and network required
• Propose appropriate types of network/s that could be used to meet the requirements.
• Propose appropriate network communications equipment to be deployed.
• Clearly define the role and operation of the network communications equipment.
• Consider the protocol suites to be used and their likely future development
• Identify the service and server requirements.
• Propose strategies for data backup etc.
• Define appropriate system/network software for the Enterprise network to be deployed.
• Clearly define the data transfer rates within the system to provide appropriate levels of aggregation.
• Propose baseline security arrangements.
• You could provide comparative costs in broad terms where possible (detail not required).

How can open source media analytics help detect and monitor regional security events and how could these platforms be used to enhance corporate capability to enact crisis response plans in high threat environments?

Identify where open source media analytics could be used to enhance corporations’ capability to look after their assets in high threat areas and make practical and realistic recommendations that could be implemented in corporate security plans. These would not be costed.

What open source media analytics programmes are available and what sort of open source media do they focus on?

How are these used to detect and monitor regional security and how effective are they?

What sort of security challenges do corporations face whilst operating in high threat foreign nations/environments?

What processes do they use to conduct threat identification and analysis and what processes do they use to enact crisis response?

Where are the gaps in the capability to react quickly or efficiently to crisis?

How can open source media analytics help detect and monitor regional security events and how could these platforms be used to enhance corporate capability to enact crisis response plans in high threat environments?

How would you use the principles of leadership and management to create a shared vision, empower others, foster collaboration, and guide decision making in order to support those policies and programs?

  • Based on both the arguments made by Bollyky, what political, social, and/or economic policies and programs would you advocate for in relation to COVID 19 (How Bollyky talks about in this book is the different paths to progress or combating a disease)
  • How would you use the principles of leadership and management to create a shared vision, empower others, foster collaboration, and guide decision making in order to support those policies and programs? For example (Leadership and Management, there is a specific difference between being a leader and being a manager)

A significant role of Government is to protect the lives of its citizens. The Government should achieve this by aiding its people in emergencies like the outbreak of coronavirus. For instance, different governments worldwide should set emergency funds to assist citizens in acquiring the best treatment of the virus (Bollyky 63). The Government should also ensure that nobody is going to lose life because of a lack of funds. The governments should prioritize saving the lives of citizens from contracting the disease and curing the people who have it. It should enact laws and enforce them to ensure that all people follow them, such as wearing face masks and keeping social distancing.

Different social policies can be put in place to deal with coronavirus. Social aid programs should be designed to ensure that the most vulnerable people of society are helped. These policies are non-contributory interventions, and in this regard, the Government and other agencies should cater to their payments. The guidelines should assist people and families in coping with abject poverty because poor people have many challenges in fighting the virus (Bollyky 67). Some other practices that can aid in handling the virus include offering cash transfers for the vulnerable, offering food aids, school feeding programs, and non-contributory social pensions.

Various economic policies should be embraced to deal with the coronavirus. Governments should protect citizens from the economic impact of the pandemic. The people affected by the virus should not go bankrupt due to the effects of the epidemic. One of the authorities’ steps to help citizens economically is to increase and extend transfers in cash and in-kind for vulnerable people (Bollyky 69). The leaders can achieve this by paying at least something to the unemployed people and giving free interest loans to the people who lost their business due to the virus. The administration should also offer tax relief for the individuals and firms who can’t afford to pay.

By applying the principle of leadership management, I would ensure that the political, social, and economic policies are embraced to cater to this virus. For instance, I would encourage all the people to come together and aim to fight a common enemy through a shared vision. I would ensure all public and healthcare providers acquire enough finances to achieve a common goal that is fighting the virus. I would also ensure that all healthcare workers are empowered through, for instance, getting personal protective equipment for protection. Given all the requirements and freedom to deal with the virus as a leader, I will also ensure that all the healthcare employees, the public, and the other stakeholders collaborate to offer different skills to defeat the pandemic. Being a leader, I will gather the information regarding the virus from additional quotas and use the information to make a wise decision about eradicating the virus. Coronavirus can be eliminated through the efforts of all people because it can affect any person.

 

 

Work Cited

Bollyky, Thomas J. Plagues and the Paradox of Progress: Why the World Is Getting Healthier in Worrisome Ways. MIT Press, 2018

Describe in detail the Quantitative Finance or Fintech topic you are considering including its main ideas and applications.

Write a report about the topic that incorporates the following components:
— Describe in detail the Quantitative Finance or Fintech topic you are considering including its main ideas and applications.
— Address the purpose and function of the topic you selected; in the case of Fintech
topics, discuss what traditional financial technology the Fintech topic is designed to
replace as well as the pros/cons of each solution.
— If applicable, construct a dataset associated with your topic, implement it, and
construct associated examples. Feel free to create related graphics/plots.

Explain what expenses and costs facing today’s air industry.

In 2-3 pages (not counting cover and references), explain what expenses and costs facing today’s air industry. In addition, evaluate what the current fuel costs do to the

Explain what expenses and costs facing today’s air industry.

and how they affect the ticket prices and the patrons’ flying occurrences.

Evalute selected financial factors by analyzing financial data over at least the last five years.

In a 4–5 page paper, use the Financial Trend Monitoring System to identify financial factors affecting the financial solvency of a state, local, or nonprofit agency. You may choose a new agency to analyze or use one of the agencies you looked at in a previous assignment. Using the financial factors from Table 7.1, pick 2–3 factors and conduct a trend analysis.

Evalute selected financial factors by analyzing financial data over at least the last five years. Title this section Trend Analysis.
See Table 7.1 Factors Affecting Financial Condition for a list of financial factors.
Create a table/chart with each factor indicating the direction of the trend. Title this section Data Analysis.
Justify your table/chart for each factor by writing a brief evaluation of the trend. Title this section Trend Evaluation.
Develop and explain a policy statement based on your findings to manage areas of concern. Title this section Policy Statement.
Your assignment must follow these formatting requirements:

Include an Introduction and Conclusion in the 4–5 page count. Your cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, the date, and the reference page are not included in the required assignment page length.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

Why is a DoS so serious and how can we defend against it?

There are many ways to conduct a DoS attack. While seemingly innocuous at first glance, successful DoS attacks can wreak real havoc on their victims. Why is a DoS so serious and how can we defend against it? Is it important to understand the type of DoS in order to most effectively defend against it? Why or why not?

Design three different databases using relational, document, and key-vale data models. Start with a relational database with a minimum of 3 tables.

Students must design three different databases using relational, document, and key-vale data models. Start with a relational database with a minimum of 3 tables. The nature of the data can be of the student’s choosing (business, sports, music etc).

Each table should have a minimum of three columns, using the data types, nvarchar, datetime, and integer. Tables may optionally have more than three columns that use other data types.

The database design must include at least one of each of the following elements: foreign key, primary key, default and check constraints.

Each table must be populated with a minimum of three data rows.

The database must contain two views. One view must be defined using an aggregate function. The other view must contain a JOIN statement.

The database must also include a stored procedure that allows a user to modify the data in one of the tables.

The project proposal is due in Week 3, and must include a one-paragraph summary explaining the design of the database and the tables. The proposal must also include an entity relationship diagram (ERD) of the database.

After finishing the relational database, transform the relational database to a document and a key-value database, respectively. The completed project is due at the end of the course, and must include the SQL and NoSQL code to implement the project requirements.