Get help from the best in academic writing.

Please respond to each students discussion posts. Student 1(Nebras): Define inventory and discuss why inventories are maintained. What are

Please respond to each students discussion posts.

Student 1(Nebras):

Define inventory and discuss why inventories are maintained. What are the Inventory Models

Inventory is defined as any goods or assets among the business which are available for future sale to customers (Keller

Discuss the three messages of 2nd Isaiah (Isa. 40-55). In what ways are these similar/different than the messages of 1st Isaiah (Isa. 1-40)? Can the messages of 1st and 2nd Isaiah be used by scholars to determine that there were two different authors?

Discuss the three messages of 2nd Isaiah (Isa. 40-55). In what ways are these similar/different than the messages of 1st Isaiah (Isa. 1-40)? Can the messages of 1st and 2nd Isaiah be used by scholars to determine that there were two different authors?.

7. Discuss the three messages of 2nd Isaiah (Isa. 40-55). In what ways are these similar/different than the messages of 1st Isaiah (Isa. 1-40)? Can the messages of 1st and 2nd Isaiah be used by scholars to determine that there were two different authors?

8. Discuss at least 4 visions of Zechariah. In what ways are Zechariah’s visions similar or different from the other prophets discussed in class? How are Zechariah’s visions to be interpreted? 9. Compare the reforms of Nehemiah and Ezra. Are there any specific reforms that overlap between the two? What is the main focus of each of these two prophets? How are their focuses similar/different? 10. Discuss the three key themes of Joel. Compare these to the three key themes of Malachi. In what ways are these similar/different? Do Joel and Malachi both prophesy about the same things? 11. Using the lens of trauma, choose 3 prophets that we have read for class and discuss how trauma can be used as an interpretive lens. In what ways does the lens of trauma illuminate new understandings of the text in question? For this question you may also use the readings posted under the trauma and exile module. Writings 1. Discuss at least four different types of Psalms. Use examples of each of the types in your discussion. How do each of the types discussed function? Are there similarities between the four types you chose? If so, what are they? 2. Discuss four ways that Job’s friends embody traditional wisdom. Discuss the four ways that Job attacks traditional wisdom. In what ways does Job embody a new way to understand theodicy? Does Job’s understanding of wisdom “defeat” his friends’ understanding of wisdom? 3. Discuss at least four key themes of Proverbs 1-9. Compare these to at least four key themes from the “proverbs of Solomon” (Prov. 10:1-22:16; 25:1-29:27). Are there any themes which transcend both sections? What are the differences in the themes, and are they major or minor differences? 4. Discuss the Megilloth. What are the contents of the Meggiloth? What are the themes of each of the books? Are there any similar themes between these books? Why are these books called the Meggiloth? 

Essay Help “>Essay Help

https://onlinecustomessaywriting.com/

readings from OWASP Testing Guide (Chapter 4: Input Validation, Chapter 4 Business Logic, and Chapter 5 Reporting) as a baseline provide the following test and analysis descriptions or discussions. This assignment has 6 parts which must be completed and documented according to the rubric. Please review the attached documents, including the rubic for more guidance.

Please respond to each students discussion posts. Student 1(Nebras): Define inventory and discuss why inventories are maintained. What are Overview: This homework will demonstrate your knowledge of testing security controls aligned with Input validation and business logic. You will also use the recommended OWASP testing guide reporting format to report your test findings. Assignment: 1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)  The OWASP site list multiple approaches and examples for blackbox testing reflected XSS vulnerabilities. In your own words, describe Reflected Cross Site scripting. Then, List and describe 4 different examples that could be used for testing. Be sure to conduct additional research for each example to provide your own unique test example. This most likely means you will need to conduct some research on Javascript to make sure your syntax is correct. 2. Testing for Stored Cross site scripting (OTG-INPVAL-002)  The OWASP site list multiple approaches and examples for blackbox testing Stored XSS vulnerabilities. In your own words, describe Stored Cross Site scripting. Then, List and describe 2 different examples that could be used for testing. Be sure to conduct additional research for each example to provide your own unique test example. This most likely means you will need to conduct some research on Javascript to make sure your syntax is correct. 3. Testing for SQL Injection (OTG-INPVAL-005)  SQL Injection remains a problem in applications yet could easily fixed. The following SQL statement is in an HTML form as code with the $ variables directly input from the user. SELECT * FROM Students WHERE EMPLID=’$EMPLID’ AND EMAIL=’$email’ Would a form or application that includes this code be susceptible to SQL Injection? Why? What specific tests would you perform to determine if the applications was vulnerable? How would you fix this problem? Be specific be providing the exact code in a Language of your choice. (e.g. Java, PHP, Python …) 4. Test business logic data validation (OTG-BUSLOGIC-001)  While reviewing some Java code, an analysis provided the following code snippets that contain logic errors. For each example, describe the issue and provide code that would fix the logical error: a. int x; x = x 1; System.out.println(“X = ” x); b. for (i=1; i d) ; { System.out.println(“Z is bigger”); } d. String m1=”one”; String m2=”two”; if(m1 == m2) { System.out.println(“M1 is equal to M2”); } e. The formula for the area of a trapezoid is: A = (b1 b2)/2 * h The following Java code is the implementation. Fix the logical error double area; double base1 = 2.3; double base2 = 4.8; double height = 12.5; area = base1 base2/2.0 * height; Demonstrate your fixed code work as anticipated with a couple different test cases. 5. Test integrity checks (OTG-BUSLOGIC-003)  Conduct some additional research on Business Logic errors related to OTG-BUSLOGIC-003. In your own words describe and provide 2 unique examples of integrity checks. For your examples, provide specific testing methods for each case. 6. Test defenses against Circumvention of Work Flows (OTG-BUSLOGIC-006)  Conduct some additional research on Business Logic errors related to OTG-BUSLOGIC-006. In your own words describe and provide 2 unique examples of circumvention of work flow. For your examples, provide specific testing methods for each case. You should document the results for the tests and your comments, and recommendations for improved security for each security control tested in a word or PDF document. Discuss any issues found and possible mitigations. Deliverables: You should submit your document by the due date. Your document should be well-organized, include all references used and contain minimal spelling and grammar errors.

Fatigue in Aviation

Fatigue in Aviation.

Write annotated bibliography for 10 resources. Sources are already given in extra file. Please check it.

 

Essay Help “>Essay Help

https://onlinecustomessaywriting.com/

Concept paper on building the wall.

Concept paper on building the wall..

Concept paper on why the wall should be built. First paragraph- need or statement of problem 2nd paragraph- purpose or goal statement 3rd paragraph- Methodology 4th paragraph- Timeline 5th paragraph- Benefits and outcomes 6th paragraph- needed support and costs Include several in text citations

Essay Help “>Essay Help

https://onlinecustomessaywriting.com/

Case Study MGT323

I’m working on a management project and need support to help me learn
No Plagiarism, No Matching will be acceptable.
All answers must be typed using Times New Roman (Size12, Double-space) font.
No pictures containing text will be acceptable and will be considered plagiarism.
proper examples and explanations for each questions.
– No short answer as it’s not acceptable for this assignment
the answer should be sufficient
References are very important to put them under the solution
I want the solution on the same page of the questions that I attached, under the word answer

Management Question

1- I have an assignment in Quality management.
2- In the file there are all requests to solve the assignment.
3- You need to Access the program page https://www.vision2030.gov.sa/v2030/vrps/qol/.
4- I uploaded the textbook in case you need to search from it.
6- I want new project what mean no one have done it before.
THANK YOU

An Introduction to Sociology?

Reading Reflections – If referencing the textbook is requested in the prompt, please include citations such as page numbers from the reading to support your statements. If you include references to external works, like research articles or scientific textbooks, these must also be properly cited.
Chapter 1: An Introduction to Sociology
Answer the following questions:
1-What do you think C. Wright Mills meant when he said that to be a good sociologist, one had to develop a sociological imagination? Please use the textbook to support your opinion.
2-Which theory do you think better explains how societies operate – structural functionalism or conflict theory? Why? Please use the textbook to support your opinion.
3-How do you think taking a sociology course might affect your social interactions?
This criterion is linked to a Learning OutcomeIntroduction to Sociology Chapter 1 Reading ReflectionOverall clarity and legibility – Did the student answer the questions in a clear and thoughtful manner?
7.5 pts
This criterion is linked to a Learning OutcomeIntroduction to Sociology Chapter 1 Reading ReflectionArgument structure – Did the student concisely address the assigned questions, with the minimum number of sentences, clear connections and citations to the reading, and relevant personal argumentation?
7.5 pts
Total Points: 15

Guidelines Solutions and Technologies for supporting IPv6

Guidelines Solutions and Technologies for supporting IPv6.

Guidelines, Solutions, and Technologies for supporting IPv6

Let’s consider that you’ve been appointed as the IPv6 transition manager at a relatively small branch of a government agency (e.g., a branch of the Social Security agency in a medium-size town). Your main responsibility is to produce a plan with a timetable for achieving compliance with the IPv6 mandate. The plan should specify the guidelines, solutions, and technologies for supporting IPv6 throughout the agency branch. The plan should include the following, among other things: Summary of the applicable government IPv6 mandate Brief description of the networking facility at the branch (LANs, servers, routers, etc.) Summary of the main IPv6-related RFCs that pertain to the IPv6 support Cooperation with ISPs and equipment vendors to implement IPv6 support Summary of the solutions and technologies to be employed in implementing IPv6 (e.g., dual-stack, tunneling, translation) Timetable for completion of IPv6 transition Plan for testing the IPv6 compliance in expectation of an audit by the government

Essay Help “>Essay Help

https://onlinecustomessaywriting.com/

assignment, you will discuss what you have learned in Unit III and Unit IV by creating a 12-slide PowerPoint presentation that addresses the case studies below. Based on your reading of the case study “Is Business Ready for Wearable Computers?” on page 181 of the textbook, address the prompts below.

For this assignment, you will discuss what you have learned in Unit III and Unit IV by creating a 12-slide PowerPoint presentation that addresses the case studies below. Based on your reading of the case study “Is Business Ready for Wearable Computers?” on page 181 of the textbook, address the prompts below. Discuss at least three examples of wearable technology. Discuss how wearable technology could change the way the company you work for or a company you are familiar with conducts business, and provide an example. Discuss at least one advantage and one disadvantage to wearable technology. Discuss how business intelligence (BI) systems are used for reporting and data analytics. Based on your reading of the case study “How Reliable Is Big Data?” on page 246-248 of the textbook, address the prompts below. Explain the term big data in your own words. Discuss how the music service Spotify used big data to better serve its customers. Discuss how New York City used big data to reduce crime rates. Discuss at least one ethical or security issue that big data can pose to individuals. Based on your reading of the case study “Google, Apple, and Facebook Battle for Your Internet Experience” on page 290-292 of the textbook, address the prompts below. Explain what is meant by mobile technology. Discuss how telecommunications and mobile technology networks are vital to companies and how they are fundamentally changing organizational strategies. Discuss the mobile strategy used by Google, Apple, and Facebook. Discuss at least two challenges posed by the Internet and networking. Based on your reading of the case study “How Secure Is the Cloud?” on page 324 of the textbook, address the prompts below. Discuss at least two security threats to cloud data. What should companies do to protect cloud data? Discuss why both the company and the cloud vendor are responsible for security. Discuss at least one security control that companies can use to increase security. Explain why data management has a tremendous impact on an organization’s survival. In formatting your PowerPoint presentation, do not use the question-and-answer format; instead, use bullets, graphs, and/or charts in your slides to identify important points, and then discuss those points in the speaker notes of each slide. Your PowerPoint presentation must be at at least 12 slides in length (not counting the title and reference slides). You are required to use a minimum of three peer-reviewed, academic sources that are no more than 5 years old (one may be your textbook). All sources used, including the textbook, must be referenced; all paraphrased material must have accompanying in-text citations. One source must be from the CSU Online Library. For tips on creating an organized and visually pleasing presentation, view the PowerPoint Best Practices tutorial. You can access the transcript for the tutorial by selecting the Notes tab on the right side of the tutorial.

Quality and Tech in the Workplace:Operational Excellence Strategic Improvement Plan

Week One you wrote a paper shared your observations regarding your organization’s position on operational excellence and the workplace environment. Twelve weeks later, we ask you to develop a strategic improvement plan for operational excellence acknowledging the entire operational continuum from supply chain to end user. The purpose of this final paper is to apply all your learnings from this course: tools, methods, and concepts synthesized with your thought leadership.
Focusing on your organization or an organization of your choice, develop a strategic plan for operational excellence acknowledging the entire operational continuum from supply chain to end user. Your paper should include the following content:
Introduction – State the intention of the paper.
Organization overview: Name, location, industry, size, revenue. Describe your organizational culture.

Process Choose a process and document it from supply chain to end user. Documentation can be as simple as photographed handwritten process map.
Within that process identify one opportunity for improvement and support your managerial decision with evidence.

Tools Explain which continuous improvement tools you will use to close the perceived performance gap. Be clear on timeline and execution.

Sustainment: Provide your sustainment strategy to maintain the gain from your process improvements. Including but not limited to recognizing existing sources of data, and recommending specific KPIs, measurement methods.
Change management techniques

Conclusion – summarize your plan restating your hopeful outcome and expectationsChange management techniques
Your paper should be 7-8 pages long. Incorporate a minimum of three peer-reviewed sources to support your position. All written assignments must include a coverage page, introductory and concluding paragraph, reference page, and proper in-text citations using APA guidelines