Get help from the best in academic writing.

# If \$5000 is borrowed at a rate of 4.75% interest per year, compounded quarterly,

If \$5000 is borrowed at a rate of 4.75% interest per year, compounded quarterly,.

If \$5000 is borrowed at a rate of 4.75% interest per year, compounded quarterly, find the amount due at the end of the given number of years. (Round your answers to the nearest cent.)(a)      5 years\$  (b)      7 years\$  (c)      9 years\$
If \$5000 is borrowed at a rate of 4.75% interest per year, compounded quarterly,

The Comparison of The Daodejing and The Holy Bible.

Analyze the genre of the Daodejing and compare it to The Holy Bible. What are the essential cultural distinctions or similarities in the two works?The following research paper must be (1800 words or more), and would need to be complete by tomorrow, November 28th, 12 PM noon. I have included an outline that can help give a general idea of my hypothesis, etc. of this paper; however, feel free to use your own structure and style, as long as these key points are answered in some type of way. I also have to include at least three academic, scholarly sources from a database. Quotes from the Daodejing and Holy Bible can help reinforce some points around the hypothesis. Thank you in advance!
The Comparison of The Daodejing and The Holy Bible

provide replies to student posts each in 150 words. I’m trying to study for my Computer Science course and I need some help to understand this question.

Main que :What are essential elements of a firewall policy?
sru-
Essential Elements of a Firewall Policy
The security policy that focuses on the deployment and implementation of firewalls in an IT organization’s infrastructure. The first essential step in implementing a firewall is building a firewall policy. We need to come up with a proper plan since the firewall policy is one of the most important factors an organization needs to have upfront. Stewart (2014) mentioned that a firewall policy that is written provides various purposes and acts as a guide for the installation and configuration of the firewall. This makes the job easy and simple. The written plan can also be treated as a tool to assist in troubleshooting and guideline to hunt the changes and differences. We need a written plan to ensure consistency in filtering across the different firewalls.
The firewall policy should be able to address specific issues like configurations, versions, technical specifications to be fulfilled by the firewalls. The first important element is defining and allocating the security zones. These security zones are different for every other network. Clear descriptions of each subnets functionality, its level of risk and trust helps the firewall policy. This helps to develop a basic firewall deployment strategy. The policy should also define what type of firewall is needed for the organization since firewall types include static packet filtering, proxy, stateful inspection. A complete rule set should be defined for the firewall and make sure each rule is explained in detail with the support of justifications and reasons why these rules are stated in the policy (Stewart, 2014).
The policy should also address several answers for the questions like – What to log, how logging happens, where to store and how often to review log files, etc. Every firewall policy should contain details of every aspect of firewall design, implementation, management, repairing, recovery, troubleshooting, and monitoring (Stewart, 2014). The firewall policy can be drafted at the first but it can be reviewed and improved from time to time to make a better policy.
Ven-
Firewall policy is a software or hardware network security system that monitors inbound and outbound network traffic by analyzing data packets and deciding whether or not they can be fair, based on the applicable regulations. Due to the growing threat of network attacks, the firewall has become a more important element in protecting our data from unauthorized attacks on the network. Its task is to filter out unwanted network traffic or secure network access. The filtering decision is based on a firewall policy based on a set of ordered filtering requirements defined by the pre-defined security policy requirements. (Thwin, L. W. (2018))
Firewall security effectiveness is to provide network administrators with policies / tools that allow policy administrators to analyze, clean, and verify the correctness of written firewall rules. Most companies use a firewall to securely connect internal network to the Internet, although can also use a firewall to protect internal network from another. Firefighters provide a single point of contact between secure and trusted network. Firewall is a network security system based on security rules that control and control incoming and outgoing network traffic. Firefighters typically establish a barrier between a trusted internal network and an un trusted external network, such as Internet walls. They are often classified as network-based or host-based firewalls. Network firewalls filter traffic between two or more networks and run network hardware. Hosting-based firewalls run on host computers and control network traffic on and off of these machines. (Chinnappan, J. (2017))
Essential elements of a firewall policy :
A firewall is a collection of hardware and software that, when used together, prevent unauthorized access to a portion of a network. A firewall consists of the following elements :
Hardware : Firewall hardware typically consists of a separate computer or device dedicated to running the firewall software functions.
Software : Firewall software provides a variety of applications. In terms of network security, a firewall provides these security controls through a variety of technologies:
Internet Protocol (IP) packet filtering.
SOCKS server.
Proxy servers for a variety of services such as HTTP, Telnet, FTP, and so forth
Mail relay services.
Split Domain Name System (DNS).
Logging.
Real-time monitoring. (Khavasi, A. A. (2016))
provide replies to student posts each in 150 words

## Tree Trimming Project case CPMGT 303 Due Oct 8

Tree Trimming Project case CPMGT 303 Due Oct 8.

Read the Tree Trimming Project case in Ch. 13 of Project
Management. ( attached below)
Write a 350- to 700-word paper that thoroughly answers the
following questions based on the case study:
Is Wil over, on, or below schedule? Explain.Is Wil using earned value? Explain.How can Wil set up a schedule and cost variance?What method can Wil use to control any changes in scope
to the project, such as change in shape of shearing from his customers?What alternatives are available to Wil to accelerate
the completion of the tree trimming project?
Format your paper consistent with APA guidelines.
Due Oct 8Tree Trimming Project.docx
Tree Trimming Project case CPMGT 303 Due Oct 8