Get help from the best in academic writing.

Discussion Board

Discussion Board. I don’t know how to handle this Health & Medical question and need guidance.

Traditional ideals of old age characterize retirement and this time in life as tranquility and disengagement. In your opinion, and based on your personal experience with elders that you know, would you say that this traditional view is still alive and well with current elders? If not, do you see examples of more modern thinking that older adults of today actively seek new meaning and purpose?

At least 200 words.
Simple sentences Please.
Thank you.
Discussion Board

PJM 6005 Boston Project Management Success Factors Team Project Scenario

PJM 6005 Boston Project Management Success Factors Team Project Scenario.

Assignment Format: Double line spacing between paragraphs but 1.5 spacing within the paragraph,12-point Times Roman,1-inch margins,Please use footnotes or end notes and citations,12 – 14-point font, bold headings and subheadings,Please adhere to APA 6th edition conventions. Question: The following template outlines common RMP sections: 1.Executive Summary In 1-page, write this Executive Summary on the key components of your RMP. 2. Project overview. In 2-3 paragraphs, briefly describe the purpose of the project for the readers that have not seen your Project Charter nor understands the project’s key business objectives.
PJM 6005 Boston Project Management Success Factors Team Project Scenario

De Anza College Food and Nutrition Value Discussion

research paper help De Anza College Food and Nutrition Value Discussion.

PART 1Select a Fast Food Restaurant or use dining commons menu•Ask for a nutritional information sheet for their menu (you can find some of this info on the menu itself or online)•Create the “healthiest” meal from the menu items•Create the least healthy meal from the menu items•Compare the 2 meals in terms of nutritional value including:1. Total Caloric Value from each meal2. Fat grams (list unsaturated, saturated and trans fats) and their sources from each individual meal3. Carbohydrate grams (list sugars and fiber) and their sources from each individual meal4. Protein (list grams) and their sources from each individual meal5. List sodium levels of each individual meal6. Comment on the serving size and how that could impact the choices, calories, AMDR calculations,etc.PART 2:Post this information to the discussion forum using information for the textbook, course resources and other scholarly sources to support your claims of healthy vs. unhealthy. Cite all sourcesPART 3:Respond to the post from at least one other student. Use information front the textbook, course resources or other scholarly sources to support your statement. Cite all sourcesstudent 1:The Habit1. The healthiest item at The Habit is their chargrilled ahi tuna sandwich (serving size 233g). The sandwich has a caloric value of 390g/serving, 10 grams of fat (unsaturated, saturated, and trans included), 40 grams of cholesterol, 2 grams of fiber, and 8 grams of sugar. It also contains 33 grams of protein, 860 grams of sodium. 2. The least healthiest meal is the Santa Barbara charburger on dough (serving size 341). The sandwich has a caloric value of 930g/serving, 69 grams of fat (unsaturated, saturated, and trans included), 150 grams of cholesterol, 7 grams of fiber, and 5 grams of sugar. It also contains 2360 grams of sodium, and 52 grams of protein.The ahi tuna sandwich is the healthier option because it has less fat that the Santa Barbara charburger (with 0G trans fat) and the sodium levels on the tuna sandwich are significantly lower.
De Anza College Food and Nutrition Value Discussion

Passive and Active Security Attacks

Ans :- The difference between active and passive attacks in case of active attack involve the updating upon the data means the active attack access the data and then perform alteration upon the data and than data transmit on the network but in case of passive attack the attacker just access the message and the contents of the message without any alteration upon the data means just type attack just involve to read and access the message the content mean just observe the message . The active attack easy to detect but not easy to protect but passive attack difficult to detect easy to prevent Examples of the Active attack Replay Message modification Denial of service Example of the Passive attack Traffic Analysis Q2. List and briefly define categories of security services. Ans :- The various type secure services are :- Authentication Access Control (Authorization) Data Confidentiality Connection Confidentiality Connectionless Confidentiality 4. Data Integrity Connection Integrity with Recovery Connection Integrity without recovery Connectionless integrity Non Repudiation Authentication:- the service of authentication concern with the validate to the user before receiving the data at the receiving end . Means this service provide the way to authenticate the receiving of data after confirming the data coming from the valid user. Access Control :- after authentication the next task is access control means when user request to access the specific data then after perform authentication just next task to check the privileges of user what type of task user can be perform and what type of Resources can be access by the user . user can capable to read the contents of the data and Data Confidentiality:- This service basically refer to provide the confidence the data receive by the receiver not be access and read by any other person during data transmission mean the content of the msg not view by any other person. The type of data confidentiality:- Connection Confidentiality:- Refer to protect the data of all the during from read the content of the data on the connection. Connectionless confidentiality :- Refer to providing the protection from accessing the data of all the user on the Block of data. Data Integrity :- Refer to sure that the data receive by the receiver not be updating during the transmission by any other unrecognized person . mean the data receive by the receiver the actual data that is send by the sender. The following the types of the data integrity: Connection integrity with recovery:-Provide the integrity upon the data during transmission on the connection if there is any updation detect then also recover the message from the alteration and convert into the actual contents. Connection integrity without recovery:- refer to providing the integrity upon the data but not providing the recovery upon the data. Connectionless data integrity:- provide integrity upon the block of data also prevent if any alteration performed but not recover the message. Non repudiation :- refer to provide confidence to the sender the data receive by the receiver is the actual receiver and also provide confidence in the receiver side the data send by the actual sender. Q3. Is there any problem with the one-time pad cipher? Discuss the Problems. Ans :- yes there is problem with one time pad cipher :- Despite Shannon’s proof of its security, the one-time pad has serious drawbacks in practice: it requires perfectly random one-time pads, which is a non-trivial software requirement secure generation and exchange of the one-time pad material, which must be at least as long as the message. (The security of the one-time pad is only as secure as the security of the one-time pad key-exchange). careful treatment to make sure that it continues to remain secret from any adversary, and is disposed of correctly preventing any reuse in whole or part — hence “one time”. See data reminisce for a discussion of difficulties in completely erasing computer media. Q4. Define types of attacks based on what is known to the attacker. Ans:- The following are the typed of on the based on the known to the attacker Cipher Text Only Known Plaintext Chosen Plaintext Chosen cipher text Chosen Text Cipher Text Only :- in this type attack the attacker only know the algorithm used to encrypt the message from plaintext to cipher text .and also known the cipher text and try to be convert the cipher text into the plain text by using the brute forte attack if the key length if too large than this attack to be used no possible then require to be use the crypt analytical way . Known Plaintext :- in this attack attacker know the algorithm , cipher text and also know having idea and some of knowledge of the plain text and upon the bases of the knowing plain text generate the cipher text and contain the key to be use to convert the message from plaintext to cipher text. Chosen Pain text :- in this attack attacker know the algorithm , cipher text and also also having some of the chosen plain text and also having the cipher text of the plain text with the key used to convert the plain text into the cipher text Chosen cipher text :- in this attacker know the algorithm , cipher text and also known the cipher text that to be chosen and also having the plain text and also the key that use to convert the cipher text into the plain text. Chosen Text:- in this type of attack attacker know the algorithm , cipher text , and also some of plain text and also conversion into the cipher text included key and also having the some chosen cipher text pain with also having the plain text of all the message and also having key information. Q5. Write a Program to implement Play fair cipher? Ans :- /* Program to implemencryptiont ppfair cipher */ #includecryption #includecryption void main() { char pp[5][5],encryption[10],decryption[10],data1[10],kk[10],str[26]=”abcdecryptionfghijklmnopqrstuvwxyz”; int i,j,k=0,m=0,l,flag=0,lencryption,onx,ony,twx,twy; char on,tw,temp1,temp2; clrscr(); /* Reading the plain text */ printf(“n encryptionter the data1 : “); gets(data1); /* Reading the kk */ printf(“n encryptionter the kkword : “); gets(kk); /* Implemencryptionting the algorithm */ for(i=0;i<(strlencryption(kk)-1);i ) { j=0; while(j{ on=kk[j]; j ; tw=kk[j]; if(on==tw) { while(kk[j 1]!=NULL) { kk[j]=kk[j 1]; j ; } kk[j]=NULL; } } printf(“n t modified kk is : “); puts(kk); for(i=0;i<5;i ) { for(j=0;j<5;j ) { if(kk[k]!=NULL) { pp[i][j]=kk[k]; k ; } else { pp[i][j]=NULL; } } } lencryption=strlencryption(kk); l=0; for(i=0;i<5;i ) { for(j=0;j<5;j ) { if(pp[i][j]==NULL) { flag=0; for(k=0;k{ if((str[l]==kk[k])

Economics homework help

Economics homework help. This is a paper that is focusing on the concepts of epidemiology and nursing research to communicable disease. The paper also provides additional information to use in the writing of the assignment paper. Below is the assessment description to follow:,Concepts of epidemiology and nursing research to communicable disease,Write a paper in which you apply the concepts of epidemiology and nursing research to a communicable disease. Refer to “Communicable Disease Chain,” “Chain of Infection,” and the CDC website for assistance when completing this assignment. Communicable Disease Selection Chickenpox Tuberculosis Influenza ,Mononucleosis, Hepatitis B HIV Ebola Measles Polio Influenza Epidemiology Paper Requirements 1. Describe the chosen communicable disease, including causes, symptoms, mode of transmission, complications, treatment, and also the demographic of interest (mortality, morbidity, incidence, and prevalence).,Is this a reportable disease? If so, provide details about reporting time, whom to report to, etc. 2. Describe the social determinants of health and also explain how those factors contribute to the development of this disease. 3. Discuss the epidemiologic triangle as it relates to the communicable disease you have selected. Include the host factors, agent factors (presence or absence), and also environmental factors. Are there any special considerations or notifications for the community, schools, or general population? 4.,Explain the role of the community health nurse (case finding, reporting, data collection, data analysis, and also follow-up) and why demographic data are necessary to the health of the community. 5. Identify at least one national agency or organization that addresses the communicable disease chosen and describe how the organizations contribute to resolving or reducing the impact of disease. 6. Discuss a global implication of the disease. How is this addressed in other countries or cultures? Is this disease endemic to a particular area? Provide an example. Additionally, a minimum of three peer-reviewed or professional references is required. Prepare this assignment according to the guidelines found in the APA Style.,Attachments,Click Here To Download,Economics homework help

Essay Writing at Online Custom Essay

5.0 rating based on 10,001 ratings

Rated 4.9/5
10001 review

Review This Service