Get help from the best in academic writing.

Sathwik and sai nithin-CS-Discussion replies

Sathwik and sai nithin-CS-Discussion replies. I need help with a Computer Science question. All explanations and answers will be used to help me learn.

please read below student posts and reply each in 125 words.Please check the names to differentiate the posts.
Ajay – Malware is mainly computer software or a program, which is designed to damage the computer system without the interference of the users. The criminal entities are majorly creating this malware; the main reason behind using this malware is to steal confidential data and information from a large organisation or a government entity. In recent year, the hackers are able to create different types of malware for example, worms, viruses, Trojan horses, key loggers, spyware and others (Wibowo & Ali, 2016). Additionally, every time a malware attacks the computer system, it is quite impossible and difficult to resolve the issue.
In many ways a malware attacks a computer system, moreover, this malware is not responsible for creating single damage. In recent years, organisations are implementing various methods to deal with malware attacks. In an organisation, every time a noxious program attacks, the information technology department remakes the entire host approach, however, this process is not always effective (Li et al,. 2018). Moreover, the prime flaw in this approach is, it does not make the organisation aware of the future threats.
The organisation first needs to enable a full assurance security system, which helps to create protection against every web-based attack, vulnerabilities, suspicious files and their behaviours, mutating malware and others. It is always the best option to resist the malware than fighting them and to do this, and the systems need to follow some rules in order to avoid malware attacks. The organisation needs to update the system’s antivirus on a regular basis, and for any new computer installing the latest version is safest. In many cases, due to the old versions of the malware attack systems. The management body needs to restrict the network usage of the employees; further checking on their software is also essential (Brundage et al,. 2018). Further, restricting the web-browser can also be helpful for mitigating malware threat on a machine.
priyanka – The three different terms web 2.0, social networking and mashup are intertwined with the new internet era, this is so-called as online world second phase evolution. Web 2.0 is raised to provide with the thinking changes about how applications should be developed in the future. Even the web 2.0 existence in the internet these applications were already in used for software blocking. There are many applications and services with web 2.0 influences, google AdSense, RSS web feeds, Wikipedia and there are thousands of mashups which are in existence.
Mashup is related to the web-based application which combines the functionality and content from different sources which are utilizing the technologies RSS and AJAX (Lu, P. C., 2008). Mashups doesn’t require any programming language, so everyone can adapt this concept.
Social Networking is more popular in Myspace.com, which is an online community and utilized between the user and marketers.
Web 2.0 has got lot of changes to the new internet era and became the catch phrase for describing the websites with the static information broadcasting. In the world of web 2.0, web servers are used as platform for all people to create and share the content of their own from the online web blogs, photos or videos. RSS is incorporated by many websites which provides with the news headlines interest’s summary. By utilizing this platform as user-friendly, people can visit them often, can post or review the comment. Popular social networking sites, video sharing sites, are taken up and employed by the web 2.0 technologies to adopt their technology advantages by utilizing the internet without any attacks and security concerns. Hence web 2.0 technologies brought counter measures to avoid possible threats which were caused.
Babi – Remote Backups
Remote means to control something from a different location. Remote backup is one offsite backup whose function is in which one can use, start restoring or start the reserves while situated at your origin station. Remote backups come in different varieties like: “subscription backup services provided by commercial data centres and backup to an offsite FTP server” (WANG & SONG 2018). Remote backups protect data from natural calamities such as earthquakes as compared to local backups. It eases administration as it is not necessary for one to move to the sever. However, remote backups are more costly compared to local backups. The reserve can’t be used for emergency purposes as it takes time to back up or restore data.
FTP Backup
The type of backup that is done through the File Transfer Protocol (FTP) on a network connection to an FTP server. The commercial data centre houses the server stationed separately from the original data in the process of being backed up. A form of “FTP” maybe like: “once you have organized an FTP server that you can use, you need to install a backup software utility that supports the FTP backup. You would need to specify the web address of your FTP server (like ftp://ftp-backup/), your login username and password so the backup utility can execute the backup” (Courtes, Hamouda, Kaaniche, Killijian & Powell 2017). The offsite backup being of FTP makes it efficient in the protection of data from natural calamities. FTP also provides room for the data to be readily available to the user. The name cloud identifies the backup storing facility gotten via the network connection. Cloud back up backs up data to a facility networked to the primary origin via a network connection. It can be used on different devices in a network connection between them, with all proper login details.
References:
Babi – One of the most important things is to learn the usefulness and importance of the backup systems thus appreciating each and every backup strategy for its capabilities to perform its respective function.it is quite evident that the primary role of backups strategies is to safely store date from corruption, theft or even loss from deletion by mistake or natural calamities. Backups prove to be of more use to its users as compared to its disadvantages that can be coped up with such patience in waiting for data to restore or upload the backup.
When backing up data, we create a copy of the original data to be produced at the moment of loss of the original data. This clarifies that such copies could be made in significant numbers, thus ensuring maximum insurance of the data being stored and protected. With devices that are internet-enabled, even with the occurrence of a natural disaster, one can be able to access the backed up data and restore it back. This phenomenon makes backs up strategies very unique and useful as they are a variety hence provide different options of backing up, thus reliable to users.
For successful results, backups are regularly updated to ensure maximum assurance of protection of the data been kept safe. Data backups are the best solution to problems that come with data loss, data corruption, interference by viruses or malware interference. Such problems often occur on a frequent basis to individuals who handle data; hence the use of backup strategies eases the tension of occurrence of such risks and also come along with its remedies.
Mounika – Practising the security measures from day one would be better to protect a system. The issues may be severe if it is not maintained correctly. Such as loss of data or information may be a considerable loss to any individual. Various regular practices that an individual need to follow to protect the system are as follows:
Make sure the device is connected to only the authorized networks that are provided by the organization. Try not to connect USB, Pendrive, and other devices that are affected by the malware. If in case it is an emergency or compulsory to connect devices to the system, verify if the tools are free from malware. Operating system hardware should be strong enough to withstand the malware attacks.
There are new viruses that are developed daily to access distinct persons’ confidential information. So try to have an antivirus application on the system such that it would take care of the viruses on the network. Set the antivirus application such as you to get regular updates of antivirus applications and update regularly. Be careful when you are accessing the websites. Verify the website address correctly and only then access to those websites.
Whenever you access the emails, try to read very carefully and then answer the emails. Do not reply unnecessarily to the mails as they may confirm the email address and then send many exciting offers to attract the individuals. Ensure to have strong passwords for security purposes. Set the passwords such that no one would easily access the files or the information. Have a password which is a composition of different characters and don’t share it with the others (Amro, 2017).
divya – Web 2.0 has benefits that helps the organizations where individuals can be able to create their own blogs and act as host in various platforms. The main feature that attracts the users is the concept that has combinations in the technologies where customers has ability to interact with information. The one such example is Facebook where millions of users can interact and exchange data. Every technology will have its pros and cons and in web 2.0 the critical part to discuss is privacy and security. There are many security concerns with web 2.0 applications and below are a few privacy and security concerns.
· The applications of web 2.0 has ability to demand the products of governments and organizations making them transparent.
· Web 2.0 has open nature that challenges with the enterprise approach to mitigate properties that is sharing the information.
· In the blogs and wikis, there will be risk of losing the information that is shared by the users where some will happen without their knowledge. The poor-quality nature of web 2.0 has this concern which is not so authorized and prone to malicious activities.
· The freedom of information legalities is the main challenge in web 2.0 for any organization as it has open access in sharing the data.
Sathwik and sai nithin-CS-Discussion replies

Health Sciences homework help. This is a paper that is focusing on the DMAIC Project Management research paper. The paper also provides additional information to use in writing the assignment paper.,The DMAIC Project Management research paper,Overview,You are required to submit a research paper on one of the project management topics listed below. The intent of this paper is for you to delve deeper into a particular topic, analyse and synthesize the material in a concise manner, and demonstrate critical thinking. It is about you ADDING VALUE to course content, not repeating it. Think of it as a mini literature review with an organizational example included to consider the usefulness of scholarly work. This is primarily about reporting back on what the literature says–it is not an opinion piece. You are encouraged and expected to critique the literature (what you think of it), but you must FIRST talk about the theories and the constructs, then you can offer your opinion on it and how it applies to you.,The following are a suggest of Project Management Topics area for the Individual Paper;,DMAIC Project Management, PRINCE2 Project Management, Waterfall Project Management, Critical Chain Project Management (CCPM), Capability Maturity Model, Organizational Project Management Maturity Model (OPM3), ,Systems Development Life-Cycle (SDLC), New Product Development,Instructions,Firstly, the paper is to follow APA rules and guidelines., Secondly, you must have at least 4 academic sources, maximum two of which can be the course textbooks; the remaining must be peer review articles., Thirdly, the paper is to be 2500 (+/- 10%) words in length., The paper must have a title page and a separate page for references at the end. It is expected that the introduction comprises no more than 10% of the paper, the research body is to be roughly 70% of the paper, and the remaining 20% to be conclusion with application/reflection. Structure the paper such as to have titles and also subtitles that reflect the content of the paper., Evaluation,Analysis Paper will be a mark in its entirety out of 100. The following rubric indicates the criteria students are to adhere to, and their relative weights to the assignment overall.,Attachments,Click Here To Download,Health Sciences homework help
Oakwood University W4 General Motors Leadership Innovation Change Case Study.

Complete Case 6.1: A Question of Communication? A Change Project in a Local Government Agency in New Zealand (Pages 221-223) and address the following directives:Carefully READ the entire CASE first, and review again the chapter(s) pertaining to the case(s). Take time to critically think about all of the aspects of the case(s).Write a brief Overview/Summary of the case in your own words describing the nature and/or background information pertaining to the case. (Minimum 1/2 -1 page)In your opinion, what were some Critical Aspects in the case that were identified? What were some Critical Aspects that you perceived to be very vital? (Minimum 1 page)How were you able to make those Assessments of selecting the critical aspects or components for the case author/writer and for yourself? (Minimum 1 page)Identify and/or list some of the Outcomes, Solutions and/or Resolutions you extrapolated from the case. (Minimum 1 page)Write a Reflection on what you learned from the case pertaining to global leadership. (Minimum 1 page)Make sure your paper format is outlined with the above: (1) Cover Page Sectional Headings; (2) Overview/Summary; (3) Questions and Answers; (4) Critical Aspects and/or Assessments; and (5) Reflection page.General Expectations for All Written Assignments:Papers should follow current APA guidelines in terms of type, margins, and citations and address the following areas:Address the actual assignment topic. Consult the instructor for additional information or clarity on assignment instructions.Cover the assignment topic in sufficient detail and depth with scholarly sources to support claims.The content should reflect ample use of required readings and other course materials.The Case Study Analysis Rubric provides grading guidelinesCase 6.1 Page 221-223Managing Change, Creativity & Innovation 3rd edition BY: Dawson – Andriopoulos
Oakwood University W4 General Motors Leadership Innovation Change Case Study

Historical Changes in the Employment Laws in US Essay

Chronology of employment laws The Clayton Act was enacted in 1914, with the intention of establishing legal protection for organized labor. There was a need to assert the position of labor in the face of antitrust legislations, and this is what the law was intended to achieve. In 1926, the Railways Act was passed. It was meant to encourage collective bargaining among employers, and prohibit discrimination against unions. The Davis-Bacon Act was passed by Congress in 1931, to address the problem of wage payment in the construction industry. Its provisions required a contract for construction into which the federal government entered, to specify the minimum wage to be paid to laborers employed under that contract (Federal Labor Laws, n.d). In order to increase protection for union activities and collective bargaining, Congress passed the Norris-NaGuardia Act in 1932. The Act legalized strikes and other collective ways of dealing with labor issues, and also prohibited the enforcement of ‘yellow dog’ agreements or contracts through the courts of law. The National Industry Recovery Act was enacted in 1933, and congress intended to set standards of ‘fair competition’, by regulating regular working hours and wages (Federal Labor Laws, n.d).. The National Labor Relations Act-1935 was passed by Congress in order to regulate labor relations among employees whose activities affected interstate commerce, except those in the agricultural sector. The Act also established the NLRB, through which labor disputes would be handled, and prohibited employers from engaging in any of the prohibited unfair practices. In 1936, Congress enacted the Walsh-Healy Act, whose intention was to restrict the regular working hours, establish minimum wages and regulate the employment of children and ex-convicts (Federal Labor Laws, n.d). In order to introduce some limitations to the rights enjoyed by trade unions, Congress enacted the National Labor Relations Act in 1947. The Act introduced measures to delay or avert ‘emergency strikes’ and prohibited the discriminative ‘closed shop’ practices of trade unions. The Equal Pay Act was passed by congress in 1963 to prohibit the act of paying different amounts of money to male and female employees, only because they were male or female. This law was also enacted in order to protect employees from retaliation, if they filed complaints against their employers. Get your 100% original paper on any topic done in as little as 3 hours Learn More The Civil Rights Act of 1964, was enacted to protect the rights of individuals, and to prohibit various actions by employers that the law classified as discriminatory (Federal Labor Laws, n.d). This list is not exhaustive, and many more employment laws exist in the US. In the recent past, there has been a marked increase in the calls for equality and protection from discrimination at the work place. Legislations such as The Americans With Disabilities Act of 1990, Civil Rights Act of 1991, and the Genetic Information Nondiscrimination Act of 2008 all prohibit different types of discriminations. These legislative efforts have led to the reduction of discrimination at the work place, as these laws prescribe heavy penalties for the commission of prohibited acts by employers and their agents. Scenario Discrimination at the workplace on the basis of sex is prohibited by employment laws in the United States (EEOC, n.d). There are several options that an aggrieved party can pursue in order to have his/her grievance addressed. These options include; internal dispute resolution procedures at the workplace, filing a complaint with the EEOC, or litigation among others (EEOC, n.d). If an employee files a complaint against the employer, he/she is protected from retaliation by the law. Smith has a case against the company for retaliation, since the law prohibits retaliatory acts by the employer against an employee who files a complaint against it. The remedies available to a victim of retaliation include; compensatory damages for expenses or losses that he/she may have incurred as a result of the retaliatory act, and punitive damages to punish the employer especially where the act was malicious or reckless (EEOC, n.d). Before he can recover, Smith will have to prove; that he exhausted the internal dispute resolution mechanisms laid down by the company before proceeding to the EEOC, and that he suffered damage or loss as a result of the retaliatory act. He will also have to establish the company’s vicarious liability for the acts of the offending party in order to recover against it. We will write a custom Essay on Historical Changes in the Employment Laws in US specifically for you! Get your first paper with 15% OFF Learn More References EEOC. (n.d.). Sex-Based Discrimination. Retrieved from https://www.eeoc.gov/laws/types/sex.cfm Federal Labor Laws. (n.d.). Web.

PLLEASE ANSWER THX GUYSSS

assignment writing services PLLEASE ANSWER THX GUYSSS.

y varies inversely with x.  Write the equation for the inverse variation.x = 5/6 and y = 12
PLLEASE ANSWER THX GUYSSS

Animal Experiments and Inhuman Treatment Research Paper

Table of Contents Introduction Analysis Conclusion Works Cited Introduction Science is constantly developing, and new methods of research are being discovered on a daily basis. However, there are still some barbarian approaches used in laboratories that have no right to exist. Many research projects involve the use of animals as experimental material. Although the results of such a laboratory may bring answers to many questions in medicine, genetics, and other vital spheres, it is frequently a case that the treatment of such animals is inhumane and cruel. Analysis The first issue to consider is the ethics of experiments based on animals. No one obtains the creatures’ consent to become the objects of research. Also, they are deprived of freedom and are subjected to pain and suffering (“Cruelty to Animals). When putting experiments on animals, scientists may go further than depriving them of freedom. Frequently, researchers may develop a disease in an animal to try a method of curing it (“Cruelty to Animals”). Another drastic fact about laboratory work is the issue of such animals’ end of life. In his article, Cressey examines the ways of getting rid of laboratory animals (130). The very existence of a variety of such methods sounds abominable. Cressey does mention that there is a need for finding “humane” methods for killing lab animals (130). However, the information presented in his study presupposes that too many animals are killed, and this fact is highly unethical. The second major argument against using animals in research is that such studies tend to lead to financial losses because they are frequently ineffective. Scholars confess that the rate of positive findings of animal-based experiments is not as high as expected. Therefore, such studies cannot be considered as the most advantageous approach to finding ways of dealing with medical issues. Another proof of this argument is that there are not enough systematic reviews on animal-based studies, which leads to the unnecessary repetition of some experiments (Van Luijk et al. 256). According to Van Luijk et al., systematic reviews could prevent scientists from performing similar studies and thus eliminate the unnecessary pain and harm caused to animals (256). Without resolving the issue of wasted resources, animal-based experiments cannot be regarded as a useful contribution to research. Probably the only positive thing about using animals in labs is that such experiments may bring benefits for people who suffer from incurable diseases. Due to a number of similarities between human and animal organisms, it is a common belief that the treatment approaches checked on animals will be useful for people. However, research indicates that this opinion is not completely true. Pound and Bracken remark that animal-based experiments have many limitations (g3387). Firstly, such research does not have the appropriate level of quality. Secondly, the validity of these experiments is not sufficient (Pound and Bracken g3387). Thus, it is not possible to justify animal-based research by its merit for humans. Conclusion Taking into consideration these arguments, it should be forbidden to use animals in experiments for research purposes. The use of animals is unethical, immoral, and not justified from the point of view of scientific value. The main arguments against animal-based studies are that they cause too much harm to animals and usually do not lead to significant benefits for humans. Thus, scientists should work on the development of less cruel and more efficient methods of research. Works Cited Cressey, Daniel. “Best Way to Kill Lab Animals Sought.” Nature, vol. 500, no. 7461, 2013, pp. 130-131. “Cruelty to Animals in Laboratories.” PETA, n.d., Web. Get your 100% original paper on any topic done in as little as 3 hours Learn More Pound, Pandora, and Michael B. Bracken. “Is Animal Research Sufficiently Evidence Based to Be a Cornerstone of Biomedical Research?” BMJ, vol. 348, no. may30-1, 2014, pp. g3387-g3387. Van Luijk, Judith, et al. “Towards Evidence-Based Translational Research: The Pros and Cons of Conducting Systematic Reviews of Animal Studies.” ALTEX-Alternatives to Animal Experimentation, vol. 30, no. 2, 2013, pp. 256-257.

UNIT V JOURNAL

UNIT V JOURNAL. Paper details Based on your experience, what is the goal of performance feedback? Describe a performance evaluation where the supervisor had room for growth and development. What could he or she have done differently? Your journal entry must be at least 200 words in length. No references or citations are necessary. UNIT V JOURNAL