Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.
I’m studying and need help with a English question to help me learn.
When you think about your life, what is your most vivid memory? Take a moment to reflect on that memory. Try to picture everything—where it took place, the people involved, even what you were wearing. How do you feel when you think about this memory?
Whether that memory is happy, sad, or somewhere in between, chances are it is so vivid because the experience taught you something about yourself or the world around you.
Often, authors choose to share life-altering moments from their lives with an audience. Memoir is a subgenre of nonfiction writing that focuses on capturing a specific memory of the author and revealing it through detailed writing filled with imagery. You will be introduced to several examples of memoirs throughout this unit.
For your portfolio assignment, you will draft a personal narrative, or memoir, of any memory you choose.
Ideas
4 The topic and details convey the experience powerfully to the intended audience
and fulfill the intended purpose.
3 The topic and details convey the experience to the intended audience
and fulfill the intended purpose.
2 The topic and details do not clearly convey the experience to the intended audience or fulfill the intended purpose.
1 The topicand details do not convey the experience. They fail to address the audienceor fulfill the purpose.
Organization
4 The introduction, body, and conclusion fulfill their purposes.
3 The organizationis mostly clear, but a few ideas seem out of place or transitions are missing.
2 Many ideas seem out of place and transitions are missing.
1 The organization is unclear. The narrative does not present, develop, or interpret the experience.
Voice
4 The voice sounds natural, engaging, and personal.
3 The voice sounds natural and personal.
2 The voice sounds mostly unnatural with exceptions.
1 The voice sounds mostly unnatural.
Word Choice
4 Words are vivid, specific, and rich in sensory images.
3 Words are specific and some appeal to the senses.
2 Some words are overly general.
1 Most words are overly general.
Sentence Fluency
4 Varied sentencesflow smoothly. Devices that promote coherence are used effectively.
3 Most ofthe sentences are variedand smoothly flowing. Transitions help coherence.
2 Some sentence patterns arenot varied and some sentences are choppy. Few transitions are present.
1 Sentencesare not varied and are choppy. There are very few transitions and little coherence.
Conventions
4 Punctuation, usage, and spelling are correct.
3 There are only a few errors in punctuation, usage, and spelling.
2 There are some errors in punctuation, usage, and spelling
1 There are many errorsand at least one failure to follow a Power Rule.Information system management
Help me study for my Management class. I’m stuck and don’t understand.
Lookup Functions
The purpose of this project is to practice and apply what you have learned about using the VLookup and HLookup in Excel. In this project, you will use and create spreadsheets that require VLookup or HLookup to complete several tasks. Download the Project 5 Excel file to use for this project.
Part 1
Requirements:
Download and open the P5-Data.xlsx workbook. Open the Part1 spreadsheet. This spreadsheet includes a information about a list of employees. Use the VLookup function to populate the table in columns H-L. You need to look up the email, department, and supervisor last name and supervisor first name for the five employees identified in column H.
The employee ID numbers are already provided for you in column H. You may add any additional columns or information you need to complete the task. You must use VLookup to populate all information in the new table except for the employee IDs in column H.
Part 2
Requirements:
Go to the Part2 spreadsheet in the same workbook. This spreadsheet shows a list of the most popular surnames in the United States in the year 2000. It also includes other columns of information with various statistics about the surnames. Columns G-L show the percentage of the racial makeup of those who have that surname. Choose five random surnames from the list of surnames and enter those five names in cells N2-N6. Use the VLookup function to show the Black, Asian, and Hispanic makeup of those who have those last names for each of the last names.
You may add any additional columns or information you need to complete the task. You must use VLookup to populate all information in the new table except for the surnames in column N.
Part 3
Requirements:
Go to the Part3 spreadsheet in the same workbook. This spreadsheet shows only the Sales persons from the list of employees in Part 1. However, it also adds the sales amount they achieved during the month. Additionally, the spreadsheet also adds columns for Commission Rate and Pay for the sales persons. Create a horizontal (rows) commission table to use to calculate the commission rate and pay for each of the sales persons listed in the spreadsheet. You will then need to use HLookup to look up the information in this commission table to calculate the pay for the employees.
The commission table must be horizontal. The commission table should include the following rates: <$50,000 = 5% commission rate, $50,000-$64,999 = 10% commission rate, $65,000-79,999 = 12% commission rate, $80,000-$99,999 = 15% commission rate, $100,000-$124,999 = 20% commission rate, >$125,000 = 25% commission rate.
Using HLookup and the commission rate table you just created, calculate the commission rate in column H for each of the sales persons. (Linda should receive 12% commission, Mary should receive 20% commission, and Jennifer should receive 5% commission.) Use a formula in column I to multiply the sales amount in column G by the commission rate in column H for each of the employees. This should give you the pay amount for each.
Format the Pay to be in currency with two decimal places.
When you are finished with the three parts, submit your Excel workbook with all three spreadsheets to Blackboard.CMIT 321 6385 Ethical Hacking: assignment help philadelphia
I don’t understand this Computer Science question and need help to study.
Penetration Test Proposal Details
For this assignment, you will play the role of a penetration tester for a fictional company, Centralia Security Lab. Your task is to develop a penetration testing proposal for your new client, Haverbrook Investment Group,
Welcome to Centralia Security Lab!
Centralia Security Lab has been hired by Haverbrook Investment Group to perform penetration testing on its systems. As a pen tester, you have been assigned to write the plan for what Centralia will do in the testing.
Your proposal should include the “rules of engagement” (agreement outlining the framework for the penetration testing) and outline how you would go through the five phases of hacking
Network Layout
Penetration testing involves a series of activities undertaken to identify and exploit security vulnerabilities. It helps to confirm the effectiveness or ineffectiveness of the security measures that have been implemented. According to EC-Council, the three phases of penetration testing include the preattack phase, attack phase, and postattack phase.
The Penetration Test Proposal consists of four related assignments that are submitted throughout the course. The submissions align with the five phases of ethical hacking.
The Penetration Test Proposal will be submitted in four one- to four-page deliverables. Then, you will submit a final deliverable with all the sections combined at the end of the course:
Rules of Engagement Reconnaissance Plan and Scanning Plan Gaining Access Plan Maintaining Access Plan, Covering Your Tracks Plan, and Final Report.
Deliverable 1: Rules of Engagement
The first deliverable of the Penetration Test Proposal is the rules of engagement (ROE) document, a formal document that outlines the objectives, scope, methodology, and overall test plan agreed upon by the penetration testers and client system administrators.
Penetration testing can cause complications such as network traffic congestion, system downtime, and may cause the same vulnerabilities and compromises it was designed to prevent. Due to the potential consequences of penetration testing, it is vital to agree on a comprehensive ROE before testing.
For your one- to two-page ROE deliverable, consider the following:
How will you identify Haverbrook Investment Group’s network characteristics, expectations, constraints, critical systems, and other relevant information? What are your preliminary engagement activities with regard to scheduling, scope, and key stakeholders? What will you use to establish a binding agreement between Centralia Security Lab and Haverbrook Investment Group? How will you determine the services, targets, expectations, and other logistics that will be covered during the Rules of Engagement section? How will you explain to Haverbrook that the tools and techniques to be used in the penetration test will not corrupt data, violate privacy, and are in compliance with industry standards and any applicable laws and regulations?
Use the Rules of Engagement Template below to record your work
Penetration Test Proposal Deliverable 1: Rules of Engagement
Name:
Course Number and Section:
Instructor:
Date:
Rules of Engagement
Overview
Include a brief description of the penetration test project.
Scope
Discuss the scope of the penetration test (pen test).
Checklist
Provide a list of the testing requirements.
Ethical Considerations
Describe how you will apply appropriate ethical principles throughout the penetration testing process.
References
Deliverable 2: Reconnaissance Plan and Scanning Plan
Your second project deliverable will be due in Week 3. It will be two to four pages in length and will contain a Reconnaissance Plan and a Scanning Plan.
Reconnaissance Plan
In one to two pages, identify the specific passive and active methods you would use to gather key information about Haverbrook Investment Group as part of structured and ordered methodology. Provide one to two references in your plan.
As you are developing your reconnaissance plan, keep these questions in mind:
As a malicious actor, how would you engage in a targeted attack against Haverbrook Investment Group while conducting passive reconnaissance techniques? What active reconnaissance techniques would you try? What techniques would you use for footprinting? How would you identify and explain the company’s presence on the internet? How would you find the company’s IP address range? How would you find the employees’ personally identifiable information (PII), such as email addresses and phone numbers? What potential impacts would your penetration testing techniques have on the confidentiality, integrity, and availability of the company’s private data as well as its networked systems?
Scanning Plan
In one to two pages, outline and discuss specific use cases to discover and enumerate information that could be used for potential exploitation. Some examples of information that you are gathering from Haverbrook Investment Group’s systems are usernames, machine names, shares, and services from a system. Identify any software, applications, or scripts that will be needed and provide a description of how this software will be used to gather information about Haverbrook’s systems.
As you are developing your scanning plan, keep these questions in mind:
How would you detect active systems? How would you determine the best attack vector you wish to exploit? How would you prioritize different targets of opportunity? What tools would you be using for scanning and enumeration of systems and vulnerabilities?
Be sure to identify any needed software and provide a description of how it will be used to gather information about the systems.To assist in completing Deliverable 2, refer to Chapters 2, 3, and 4 in the textbook.
Use the same template from delivery one to finish your deliverable
Deliverable 3: Gaining Access Plan
After collecting enough information about the target during Deliverable 2 (Reconnaissance Plan and Scanning Plan), you will describe how to use that information to gain access to Haverbrook’s systems. Your one- to two-page plan on gaining access should include:
details of the gaining access process in regards to the techniques commonly used to exploit low-privileged user accounts by cracking passwords through techniques such as brute-forcing, password guessing, and social engineering, and then escalating the account privileges to administrative levels in order to perform a protected operation. an implementation outline of any software that will be used in gaining access to the network(s) or system(s) You may include open source and commercial tools available to execute the actual exploit: Burp Suite, Cain and Abel, Core Impact, John the Ripper, Metasploit, and others. You can also use some programming languages, such as Javascript, Perl, Python, Ruby, or C++, if you choose to develop custom exploits.
As you are developing your Gaining Access Plan, keep these questions in mind:
How would you escalate your privileges? How would you establish a command and control communication channel?
Refer to Chapter 6 in the textbook for the different techniques that can be used to gain access to the system.
Use the Gaining Access Template below to record your work
Penetration Test Proposal Deliverable 3: Gaining Access Plan
Name:
Course Number and Section:
Instructor:
Date:
Gaining Access
Overview
Provide a summary of the Gaining Access phase.
Vulnerable Resources
Identify the resources where vulnerabilities can be located and include a brief description of those resources. Be sure to include a reference to the vulnerability, i.e., NVD.
Techniques and Software
Provide the techniques and any software, applications, or scripts that will be used in gaining access to the network(s) or system(s) along with a description of each technique. Refer to Chapter 6 in the textbook for additional information.
References
Deliverable 4: Maintaining Access Plan, Covering Your Tracks Plan, and Final Penetration Test Proposal
This deliverable includes three items:
the last two parts of the Penetration Test Proposal (Maintaining Access and Covering Your Tracks) the entire final proposal with all previously submitted sections
Maintaining Access Plan
For this one- to two-page deliverable, identify the techniques you would use to maintain access to Haverbrook’s target network and/or system, as well as provide a brief summary of each technique. Include any software that is required to maintain access in the network or system(s).
As you are developing your Maintaining Access Plan, keep these questions in mind:
Would you consider using a backdoor, a botnet, the reverse tunnel technique, polymorphic malware, or a toolkit as some examples to maintain access on the target network? What commercial tools would you use when pivoting to maintain and escalate control? How do you maintain access without causing damage to the system or network? How long do you stay in the system and/or network before the payload is released?
Covering Your Tracks
Some techniques attackers use to remain undetected are clearing the logs, updating firmware and using malicious programs such as backdoors or Trojans. Attackers also use tools such as Firmware Mod Kit, Firmalyzer Enterprise, and Firmware Analysis Toolkit to exploit firmware.
In one to two pages, provide a brief description of the methods, software tools, and any other means of avoiding detection and how each of these techniques would be used to hide your activities. To assist with completing Deliverable 4, refer to Chapter 6.
As you are developing your plans for maintaining access and covering your tracks, keep these questions in mind:
What critical system files would be replaced to hide an attacker’s presence in the system? How would steganography or tunneling be used in an attacker’s efforts to conceal his or her presence?
Final Proposal
Add your previous submissions, make updates and corrections based on the feedback received from your instructor and add your Maintaining Access and Covering Your Tracks plan.
So, your final proposal will include the following components:
Rules of Engagement (from Deliverable 1) Reconnaissance Plan (from Deliverable 2) Scanning Plan (from Deliverable 2) Gaining Access Plan (from Deliverable 3) Maintaining Access Plan (Deliverable 4) Covering Your Tracks Plan (Deliverable 4)
Use the format below to complete your final penetration test proposal
Penetration Test Proposal Deliverable 4: Final Penetration Test Proposal
Name:
Course Number and Section:
Instructor:
Date:
Rules of Engagement
Overview
Include a brief description of the penetration test project.
Scope
Discuss the scope of the penetration test (pen test).
Checklist
Provide a list of the testing requirements.
Ethical Considerations
Describe how you will apply appropriate ethical principles throughout the penetration testing process.
Reconnaissance Plan
Overview
Provide a summary of the Reconnaissance phase.
Reconnaissance Methods
Identify specific methods and demonstrate a structured and ordered methodology while gathering key information that could be used to penetrate the network and systems of Haverbrook Investment Group. Discuss in detail both passive and active methods of reconnaissance.
Scanning Plan
Overview
Provide a summary of the Scanning phase.
Tactics, Techniques, and Procedures
Outline and discuss specific use cases to discover and enumerate information that could be used for potential exploitation. Some examples of information that you are gathering from Haverbrook Investment Group’s systems are usernames, machine names, shares, and services from a system. Identify any software, applications, or scripts that will be needed and provide a description of how this software will be used to gather information about Haverbrook’s systems.
Gaining Access Plan
Overview
Provide a summary of the Gaining Access phase.
Vulnerable Resources
Identify the resources where vulnerabilities can be located and include a brief description of those resources. Be sure to include a reference to the vulnerability, i.e., NVD.
Techniques and Software
Provide the techniques and any software, applications, or scriptsthat will be used in gaining access to the network(s) or system(s) along with a description of each technique. Refer to Chapter 6 in the textbook for additional information.
Maintaining Access Plan
Overview
Provide a summary of the Maintaining Access phase.
Techniques and Software
Identify the techniques used to maintain network and/or system access. Provide a brief summary of each technique. Include any software, applications, or scripts that may be needed to maintain access in the network or system(s). Refer to Chapter 6 in the textbook for additional information.
Covering Your Tracks Plan
Overview
Provide a summary of the Cover Your Tracks phase.
Techniques and Software
Identify the methods, software, applications, scripts and any other means of covering your tracks. Provide a brief description of how each of these will be used to hide from the system administrator. Refer to Chapter 6 in the textbook for additional information.
ReferencesResearch and select a book that deals with one of the “Development” issues covered in class: my nursing assignment help
Need help with my Economics question – I’m studying for my class.
Guidelines for Book Review:
A full book review may concern only one book. Its length is about 1500-2000 words. It should give readers an engaging, informative, and critical discussion of the work. The selected book must not be a textbook——Economic Development, 12
th edition, by Todaro and Smith. Pearson. ISBN: 978-1292002972. The review should follow the Guidelines below.
The review should consider (please use as your outline):
The intended audience for the book and who would find it useful
The background of the author(s)
The main ideas and major objectives of the book and how effectively these are accomplished
The context or impetus for the book – – political controversy, implications of the book for research, policy, practice, or theory
A comparison with other works on this subject
Constructive comments about the strength and weaknesses of the book
The front page of your review should include:
Your first and last name
Your student id
Author(s) or editor(s) first and last name(s) (please indicate if it is an edited book)
Title of book
Year of publication
Place of publication
Publisher
Number of pages
Price (please indicate paperback or hard cover) if available
ISBNplease watch the video and write 350 words with reference
I don’t know how to handle this Management question and need guidance.
● Affirm the solution presented in the video
● Partially affirm the solution presented in the video
● Disagree or provide an alternative solution to the problem presented in the video
● Approximately 150 to 250 words in length (minimum of 2 paragraphs)
● Include the reference in APA format to properly reference your article
