What role did/do special interests play in the implementation of this policy?

Write 2 pages with at least 2 sources on the following: Based upon this week’s readings, analyze an article published 60 days prior to 10/3/16 that deals with globalization or trade policy. Pay special attention to winners and losers. What role did/do special interests play in the implementation of this policy?

The article referenced must be within the last 60 days.

2 page minimum length

At least 2 sources referenced in APA format.

In what ways did Americans seek to maintain these older traditions of work, and how successful were they?

As the industrial revolution developed in the United States, traditional patterns of work were disrupted and replaced by more ridged, structured, factory-based workplaces. The older notion of the “Artisan Republic”—in which craftsmen could aspire to the status of a master within their given field—was threatened. American workers resisted this change. In what ways did Americans seek to maintain these older traditions of work, and how successful were they?

Write a 5 page paper that addresses the question posed above. In your response, be sure to base your claims on materials read in the assigned readings (you do not need to read additional sources for this assignment.)

The main idea or the general idea is why and how Music in 20th century reflects on the American culture .

Length: Expected around 4 – 7 pages.

The mean idea or the general idea is why and how Music in 20th century reflects on the American culture .

Q: 1-Describe the development and journey of American music to its present form. Specific composers, works, and the musical characteristics (instruments, sounds, etc.) should be included.

2- Also include in this discussion, some comments about the role music currently plays in society (church, censorship, etc.). Present both sides and make an argument for where you stand.

Research one incident of a hate crime committed against a religious or ethnic group in your community or in the nation.

Research one incident of a hate crime committed against a religious or ethnic group in your community or in the nation. It is suggested you begin by researching local or national news websites for recent incidents reported by the media.

Write a 350- to 700-word paper describing the incident and that investigates the group further.

Include responses to the following in your paper:

  • What occurred and what resulted from the hate crime?
  • How does your selected group differ from other groups, such as in their beliefs, worship practices, values, ancestry, language, or culture?
  • After careful consideration of your course materials, what do you think is the cause of this type of discrimination?
  • How has your chosen group contributed to American culture?
  • Has your perception of this group changed as a result of your research?

Format your essay according to appropriate course-level APA guidelines.

note: must have references 

Company strategies cannot be executed well without a number of support systems

Company strategies cannot be executed well without a number of support systems to carry on business operations. Search for recent articles that discuss how a company has used real-time information systems to aid the cause of effective strategy execution.  Explain their use of the information and how it relates to our coursework from this week.  Based on our readings from this week, what one enhancement or addition would you recommend the company make and why? – 500 Words with references APA format – Attached chapter 11 this week reading for reference.

You must have at least one course and one non-course scholarly/peer reviewed source in your initial posting 

Cyber security questions | Computer Science homework help

1. Calculate the timing of password-guessing attacks:

(a) If passwords are three uppercase alphabetic characters long, how much time would it take to determine a particular password, assuming that testing an individual password requires 5 seconds? How much time if testing requires 0.001 seconds?

(b) Argue for a particular amount of time as the starting point for “secure.” That is, suppose an attacker plans to use a brute-force attack to determine a password. For what value of x (the total amount of time to try as many passwords as necessary) would the attacker find this attack prohibitively long?

(c) If the cutoff between “insecure” and “secure” were x amount of time, how long would a secure password have to be? State and justify your assumptions regarding the character set from which the password is selected and the amount of time required to test a single password.

  2. Describe each of the following four kinds of access control mechanisms in terms of (a) ease of determining authorized access during execution, (b) ease of adding access for a new subject, (c) ease of deleting access by a subject, and (d) ease of creating a new object to which all subjects by default have access.

• per-subject access control list (that is, one list for each subject tells all the objects to which that subject has access)

• per-object access control list (that is, one list for each object tells all the subjects who have access to that object)

• access control matrix

• capability

3. Design a protocol by which two mutually suspicious parties can authenticate each other. Your protocol should be usable the first time these parties try to authenticate each other.

4. List three reasons people might be reluctant to use biometrics for authentication. Can you think of ways to counter those objections?

  5. If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by email but sometimes it sends you your old password by email. Compare these two cases in terms of vulnerability of the website owner.

  6. Defeating authentication follows the method–opportunity–motive paradigm described in Chapter 1. Discuss how these three factors apply to an attack on authentication.

  7. Suggest a source of some very long unpredictable numbers. Your source must be something that both the sender and receiver can readily access but that is not obvious to outsiders and not transmitted directly from sender to receiver.

  8. Humans are said to be the weakest link in any security system. Give an example for each of the following:

(a) a situation in which human failure could lead to a compromise of encrypted data

(b) a situation in which human failure could lead to a compromise of identification and authentication

(c) a situation in which human failure could lead to a compromise of access control.

 9. Explain why hash collisions occur. That is, why must there always be two different plaintexts that have the same hash value? 

10. What property of a hash function means that collisions are not a security problem? That is, why can an attacker not capitalize on collisions and change the underlying plaintext to another form whose value collides with the hash value of the original plaintext?

Post an explanation of at least two strategies for including academic activities and accomplishments into your professional development goals.

In the realm of marketing, a successful branding strategy is one of the most important contributors to organizational success. A solid branding strategy can help add visibility and credibility to a company’s products.

Similarly, nurse-scholars can build a personal brand to add visibility and credibility to their work. You can begin building your brand by developing and maintaining an academic portfolio. Such an activity can help share the results of your efforts and contribute to your success. This Module’s Discussion asks you to consider and share strategies for building your portfolio.

  • Reflect on strategies that you can pursue in developing portfolios or portfolio elements that focus on academic achievements.
  • Review one or more samples from your own research of resources focused on portfolio development.

 Post an explanation of at least two strategies for including academic activities and accomplishments into your professional development goals. Then, explain how those goals may align with the University’s emphasis on social change. Be specific and provide examples. 

Briefly describe the process of computing a corporation’s taxable income

1.Briefly describe the process of computing a corporation’s taxable income assuming the corporation must use GAAP to determine its book income. How might the process differ for corporations not required to use GAAP for book purposes?

2.In general terms, identify the similarities and differences between the corporate taxable income formula and the individual taxable income formula.

McGraw-Hill’s Taxation of Individuals and Business Entities, 2017 Edition, Ch. 16

Corporate Income Tax Formula

KELLY OLEARY ,

1.What is the formula used to determine a corporation’s income tax liability?

McGraw-Hill’s Taxation of Individuals and Business Entities, 2017 Edition, Ch. 17

Deferred Taxes

KELLY OLEARY

1.What are deferred taxes?

2.Why must an organization take these into consideration?