History of western arts

AA.4: Each student curator is required to produce a formal research paper for their particular “room.” This is much like a museum catalog paper art historical researchers write specific research arguments about the exhibition to add to a catalogue .  These individual research papers must form specific arguments connecting the choice of artworks to the theme utilizing academic research to support all arguments made.This paper is not a guide to the exhibit and stands alone. Thus, you will want to avoid listing artifacts or making direct reference to the digital exhibition space. Write the paper as if the exhibit does not exist and create the exhibit to emphasize the points made in the paper.                                  The paper should begin with an introduction to the theme being considered and rationale for selecting works. A strong thesis statement will lead the paper into discussing works of art, analyzing them in connection with the theme that you have chosen, supporting your argument. The paper must then include a conclusion and must have proper citations throughout in MLA format.The paper should be between 5-7 pages. This paper may be incorporated into the exhibition, but you must consider the method of delivery as 5-7 pages of text is unlikely to be read by the average museum-goer. If you wish to combine this with your museum project, consider cutting out bits of useful information to display with the works that you have chosen.Due on the last day of the term.

What constitutional guidelines must the investigator be cognizant of while on the scene, interviewing witnesses, interviewing suspects, and processing the crime scene?

For the Written Exercise in this module, read the Constitution, and then list two major areas that you feel impact and/or restrict the forensic investigator in his/her task of conducting a forensic investigation at a major crime scene. What constitutional guidelines must the investigator be cognizant of while on the scene, interviewing witnesses, interviewing suspects, and processing the crime scene? In your response, discuss how you would need to keep in mind the Saint Leo core value of integrity as you perform your job as an investigator. Refer to the Written Exercise Guidelines and your syllabus for further instructions.      

National Budget Simulation and Paper (qli15)

The above link will take you to a simulation of fiscal policy and the national budget in which you are the economic advisor to the President of the United States. Follow the link and read the instructions for the simulation.

You can launch the simulation by clicking on this link:http://www.econedlink.org/national-budget-simulator.php

Lab -LAMPZap

For this Lab please do make sure to include a word document to use called williamclementsSDEV300Lab9 attached. Please format it so it is a professional report including APA Style references for how you fix the 2 separate ZAP Reports attached which are the vulnerability reports I had already ran. So please be well-organized and include a table of contents, page numbers, figure and table numbers. The writing style should be paragraph style with bullets used very sparingly to emphasize specific findings. In other words, this should be a professional report and demonstrate mastery of writing.Those two reports are week7 local host website that was created last week and a local host site that was given to evaluate this week. After documenting all the issues and how you fixed them, send those two files two me as a zip file separately attached so I can run the files again and be sure there are no more vulnerability issues for any of the 2 different local lost websites. Below is what is required!  Include your full name, class number and section and date in the document.  UMUCTutorLamp.zip (supplied local host site by teacher).  answer_2.0.zip (My website created).ZAP Scanning Report for week7 Lab.docx (should open in a word document with the vulnerability report for the site).  williamclementsSDEV300Lab9.dox (Please use that for the report as mentioned above and send back along with the zip file edits).

week 1 written business law

Week 1 written business law and ethical behaviorIt is obvious that, objectively speaking, there is no ethical bright line test for society to follow. Whether dealing in Business, Law, Journalism, etc. no two realms have the same ethical guidelines. What is accepted in one faction of society is not always accepted and/or ethical in another faction. Moreover, what is accepted in one situation is not always then again accepted in a subsequent similar situation. What then is the bottom line? The bottom line is – there is no accepted bottom line. We all come to our own ethical make-up based on the positions we hold, the religions we hold ourselves out to be and the experiences we have live through. What is your ethical make up?In a 2-3 page paper, analyze how to ethically guide your life. Do so through determining a set of standards to live by. Furthermore, differentiate where those standards derived from. Finally, conclude how you know these standards are right and/or wrong.Please be sure to give at least five examples of ethical standards in which everyone should live by.

System and its vulnerabilities

Chapter 11. Distinguish between vulnerability, threat, and control.2. Theft usually results in some kind of harm. For example, if someone stealsyour car, you may suffer financial loss, inconvenience (by losing your mode oftransportation), and emotional upset (because of invasion of your personalproperty and space). List three kinds of harm a company might experience fromtheft of computer equipment.3. List at least three kinds of harm a company could experience from electronicespionage or unauthorized viewing of confidential company materials.4. List at least three kinds of damage a company could suffer when the integrityof a program or company data is compromised.5. List at least three kinds of harm a company could encounter from loss ofservice, that is, failure of availability. List the product or capability to whichaccess is lost, and explain how this loss hurts the company.6. Describe a situation in which you have experienced harm as a consequence ofa failure of computer security. Was the failure malicious or not? Did the attack target you specifically or was it general and you were the unfortunate victim? Chapter 2 1. Describe each of the following four kinds of access control mechanisms interms of (a) ease of determining authorized access during execution, (b) ease ofadding access for a new subject, (c) ease of deleting access by a subject, and (d)ease of creating a new object to which all subjects by default have access.• per-subject access control list (that is, one list for each subject tellsall the objects to which that subject has access)• per-object access control list (that is, one list for each object tells allthe subjects who have access to that object)• access control matrix• capability2. Suppose a per-subject access control list is used. Deleting an object in such asystem is inconvenient because all changes must be made to the control lists ofall subjects who did have access to the object. Suggest an alternative, less costlymeans of handling deletion.3. File access control relates largely to the secrecy dimension of security. Whatis the relationship between an access control matrix and the integrity of theobjects to which access is being controlled?4. One feature of a capability-based protection system is the ability of oneprocess to transfer a copy of a capability to another process. Describe a situationin which one process should be able to transfer a capability to another.5. Suggest an efficient scheme for maintaining a per-user protection scheme.That is, the system maintains one directory per user, and that directory lists allthe objects to which the user is allowed access. Your design should address theneeds of a system with 1000 users, of whom no more than 20 are active at anytime. Each user has an average of 200 permitted objects; there are 50,000 totalobjects in the system.6. Calculate the timing of password-guessing attacks:(a) If passwords are three uppercase alphabetic characters long, how muchtime would it take to determine a particular password, assuming that testingan individual password requires 5 seconds? How much time if testingrequires 0.001 seconds?(b) Argue for a particular amount of time as the starting point for “secure.”That is, suppose an attacker plans to use a brute-force attack to determine apassword. For what value of x (the total amount of time to try as manypasswords as necessary) would the attacker find this attack prohibitivelylong?(c) If the cutoff between “insecure” and “secure” were x amount of time,how long would a secure password have to be? State and justify yourassumptions regarding the character set from which the password isselected and the amount of time required to test a single password.7. Design a protocol by which two mutually suspicious parties can authenticateeach other. Your protocol should be usable the first time these parties try toauthenticate each other.8. List three reasons people might be reluctant to use biometrics forauthentication. Can you think of ways to counter those objections?9. False positive and false negative rates can be adjusted, and they are oftencomplementary: Lowering one raises the other. List two situations in which falsenegatives are significantly more serious than false positives.10. In a typical office, biometric authentication might be used to control access toemployees and registered visitors only. We know the system will have some falsenegatives, some employees falsely denied access, so we need a human override,someone who can examine the employee and allow access in spite of the failedauthentication. Thus, we need a human guard at the door to handle problems, as wellas the authentication device; without biometrics we would have had just the guard.Consequently, we have the same number of personnel with or without biometrics,plus we have the added cost to acquire and maintain the biometrics system. Explain the security advantage in this situation that justifies the extra expense.

Integrative Bargaining

Discuss two of the following statements.Respond to at least two of your classmates’ postings.  Try to respond to students who pick different statements.Carefully review the for the criteria that will be used to evaluate this Discussion Thread. 

Lab -LAMPZap

For this Lab please do make sure to include a word document to use called williamclementsSDEV300Lab9 attached. Please format it so it is a professional report including APA Style references for how you fix the 2 separate ZAP Reports attached which are the vulnerability reports I had already ran. So please be well-organized and include a table of contents, page numbers, figure and table numbers. The writing style should be paragraph style with bullets used very sparingly to emphasize specific findings. In other words, this should be a professional report and demonstrate mastery of writing.Those two reports are week7 local host website that was created last week and a local host site that was given to evaluate this week. After documenting all the issues and how you fixed them, send those two files two me as a zip file separately attached so I can run the files again and be sure there are no more vulnerability issues for any of the 2 different local lost websites. Below is what is required!  Include your full name, class number and section and date in the document.  UMUCTutorLamp.zip (supplied local host site by teacher).  answer_2.0.zip (My website created).ZAP Scanning Report for week7 Lab.docx (should open in a word document with the vulnerability report for the site).  williamclementsSDEV300Lab9.dox (Please use that for the report as mentioned above and send back along with the zip file edits).