Environmental Science Discussion

Discuss the interrelationship between sea otters, sea kelp, and sea urchins. Be sure to include in your answer the concept of what a keystone species is and which species of the three is the Keystone species. What keystone species was reintroduced into Yellowstone Park and what was the impact? (12 points) Discuss the difference between a native species, an introduced species, and an invasive species? What impact do introduced and invasive species have on food webs? (8 points) What are evolution and natural selection? Describe how species adapt to the environment? How do humans use artificial selection? (15 points) How does biodiversity enhance stability in an ecological community? How are humans impacting biodiversity? Why is suburban landscape dominated by lawn so bad for biodiversity?  

CU Computer Science Wannacry Attack & Damage Caused Essay

Computer Science question. All explanations and answers will be used . Conduct some Internet research on any malware, virus or DOS attack. Summarize your findings and be sure to include a link to your reference source. Explain this occurrence in your own words (do not just copy and paste what you find on the Internet).Include the following information:1. Name of the Malware or Virus2. When this incident occurred (date)3. Impact it had or explanation of the damage it caused4. How it was detected5. Reference.

Economics Market Failure & Allocation of The Goods Discussion

Market failure is a situation in which a given market does not efficiently organize production or allocate goods and services to consumers. Overcoming market failure is a significant challenge for the government, which is not easy to accomplish and may require intervention. In this Discussion, you will consider what the government can do to regulate market inefficiencies.Submit  a response that addresses the following:

CU War Of Ideas And Terrorism Reflective Essay

Develop and describe a strategic communication campaign designed to influence others in the War of Ideas.ISIS and other terrorist organizations are doing very well in the War of Ideas through their use of social media. Write a reflective essay to address the following questions:Justify and support your answer using your experience and source support from the assigned readings. (Attached) 

Economics Monopoly Price Relationship to Demand Elasticity Discussion

for my Economics course and I need some help to understand this question. Recalling what you have learned about elasticity, what can you say about the connection between the price a monopolist chooses to charge and whether or not demand is elastic, unitary, or inelastic at that price? (Hint: Examine the marginal revenue curve of a monopolist. The fact that marginal revenue becomes negative at low prices implies that a portion of the demand curve cannot possibly be chosen.) Please include an example with your posting.  

Cuyamaca College Mind is from a Psychology Perspective Discussion

The Mind  This chapter is an introduction into what we think the Mind is from a Psychology Perspective. You have to make a post before you can see the other posts! Video to watch –  Rebecca Saxe – TED talk (Links to an external site.)1) Please ask 2 people outside of the class what they think the mind is and post it here.  Bring Something to the class that is not in the course content!! 2) Using the following vocabulary form Chapter 1 –   can you find examples of these terms in the TED TALK – False-belief testMirror neuronsTheory of mindVisual perspective taking3) Give an example of the terms from your own experience. 

EDGR 506 Concordia University Portland Character and the Ethics of Leadership Case Study

Leadership Case StudyAnnabeth is frequently on her cell phone, as are most kids her age. Her teacher has warned her that if the phone comes out in class, it will be taken away. Annabeth cannot resist. The phone vibrates during class. She tries to hide it behind her books, but the teacher sees it and holds out a hand for her to give up the phone. Annabeth tries to slide it into her bag quickly, but the teacher insists. Annabeth tells the teacher it was an urgent text from her mother and that she had to check it, or her mother would be upset, but the teacher takes the phone and slides it into his desk drawer. He quickly forgets about it and moves on with class.Annabeth knows the teacher?s rule is that she cannot have the phone back until her parent comes in with her to retrieve it. She leaves class in tears, and no more is said. The next afternoon after school, Annabeth shows up parent to retrieve the phone. When the teacher opens his drawer to retrieve it, the phone is not there. You are the principal at this school and the teacher, parent, and student all come rushing into your office with emotions running high. ll three standing in your office expecting you to solve the problem, what is your next move?

Cuyamaca College Psychology Affective Neuroscience Discussion

Affective Neuroscience –  I have a very old video of someone getting brain surgery while they are wide awake – Not horror movie stuff – but cool neuroscience  – Search for  – “brain surgery while awake” on YouTube and you can see a few different ones – share what you find!!!Here is the one I have Please watch this TED Talk about vision and other parts of the brain   (Links to an external site.)and this amazing youtube clip  (Links to an external site.)- Can you connect it to the First Chapter?Look for the words Occipital LobeParietal LobeFunctional Magnetic Resonance Imaging (fMRI)Temporal LobeHypothalamusDrive stateHomeostatic set pointHypothalamusShare what you found!!  

EDGR 506 Concordia University Portland Character and the Ethics of Leadership Discussion

Public Sector Case StudyThe U.S. military needed a way to communicate information quickly and securely in the rapidly changingenvironment of a battlefield. Wired communications, while secure and robust, had significant drawbacks.Communications lines could easily be severed and military personnel were limited to only communicating with fixedlocations. Radio and wireless communications removed the threat of cut lines, and extended the range ofcommunications, allowing military personnel to communicate with mobile units, but only to a fixed range. Stationaryinstallations were still needed as base stations, and throughput degrades the further units were from the base station.That led the military to turn to a new type of wireless networking called wireless mesh networking.Wireless mesh networks are based on a distributed network mesh topology. Each node in the network connects tomultiple nodes; each node also acts as a router for the nodes it connects to allowing traffic to hop along multiple pathsto a destination. This allows for a very robust and flexible network. The loss of one node will not hurt the network, andnodes can be added at will. Range of the total network is also massive because nodes don’t need to be close to a centralpoint. They just need one other node to function. An example of a mesh network can be seen in Figure 6-2.While a wireless mesh network solved part of the military’s requirements, security remained a major concern. Tomake sure the communications were secure the military implemented both physical and logical access controls on thenetwork.For the physical security of the communications, the military uses frequency hopping on the radios connected to thenetwork. The radios are constantly changing frequencies. This allows them to avoid jamming and eavesdropping.For logical security the mesh network relies on MAC addressing to identify all of the devices in the network. A list ofall allowed Media Access Control (MAC) addresses is generated and each device knows whom it talks to. A MACaddress can be faked, so they also utilize a shared secret style encryption key to handle security. When devices in thenetwork first link together, they will authenticate each other utilizing public key infrastructure (PKI) then develop ashared key, which will get renewed periodically to handle encryption. Now any communications between nodes can bevalidated with that key. These two network access controls methods give the military the ability to secure theirwireless communications.submit a case study on Public sector.