1-Determine the present values (PVs) if $5,000 is received in the future (i.e., at the end of each indicated time period) in each of the following situations:

  • a.5 percent for ten years
  • b.7 percent for seven years
  • c.9 percent for four years

2- Assume you are planning to invest $5,000 each year for six years and will earn 10 percent per year. Determine the future value (FV) of this annuity if your first $5,000 is invested at the end of the first year.

3-Determine the present value (PV) now of an investment of $3,000 made one year from now and an additional $3,000 made two years from now if the annual discount rate is 4 percent.

4- What is the present value (PV) of a loan that calls for the payment of $500 per year for six years if the discount rate is 10 percent and the first payment will be made one year from now? How would your answer change if the $500 per year occurred for ten years?

5-Determine the annual payment on a $500,000, 12 percent business loan from a commercial bank that is to be amortized over a five-year period.

6-Determine the annual payment on a $15,000 loan that is to be amortized over a four-year period and carries a 10 percent interest rate. Prepare a loan amortization schedule for this loan.

7-Assume a bank loan requires an interest payment of $85 per year and a principal payment of $1,000 at the end of the loan’s eight-year life.

  • a.At what amount could this loan be sold for to another bank if loans of similar quality carried an 8.5 percent interest rate? That is, what would be the present value (PV) of this loan?
  • b.Now, if interest rates on other similar quality loans are 10 percent, what would be the PV of this loan?
  • c.What would be the PV of the loan if the interest rate is 8 percent on similar quality loans?
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Portfolio professional goals

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Must be at least 100 words each

1) Module 2 Network Security Vulnerabilities

Security Vulnerabilities warrant the most concern for network and security professionals as it provides a critical threat for efficiency and effectiveness of an organization. It is extremely important to identify network security vulnerabilities proactively before a hacker does it for planning an attack on the organization. Here are a few vunerabilities that aren’t mentioned as often as the most common ones.

Network Security Vunerabilities:

  • Missing patches…All it takes for an attacker, or a rogue insider, is a missing patch on a server that permits an unauthenticated command prompt or other backdoor path into the web environment.
  • Weak or defaulted passwords…Honestly I don’t believe passwords should even be part of a network security vulnerability discussion knowing what we now know. However, many web applications, content management systems, and even database servers are still configured with weak or default passwords.
  • Mobile devices…Phones, tablets, and unencrypted laptops pose some of the greatest risks to web security.

Whether accessible from inside or outside your network, these commonly-overlooked security vulnerabilities are likely putting your web environment at risk today. The smart approach to minimize your risks is to perform in-depth web vulnerability scans and manual analysis, but also ensure that everything else that touches your web environment has been properly reviewed.

2) Module 2 Threats Vulnerabilities and attacks


Building on the knowledge of network structure and network defense from last week, the terms threats, vulnerabilities, and attacks play a significant part of information security. Threats are actions that can compromise security. Threats create the possibility for vulnerability to be compromised. Threats can be non-man made (natural disasters, fires, tornadoes) or man-made (malicious hackers, untrained employee). Vulnerabilities are a weakness in security that could be compromised by a threat. They can be physical (flooding, theft) or non-physical (unpatched software, outdated antivirus software). An attack is an assault on the network. Attacks can take numerous forms : buffer overflow, cross-site scripting, SQL injection. Monitoring, detecting and responding to each term will help the network recover and resume operations.

3) Module 2 Network Security Breach

There are many different types of network security breaches that can occur within a company. Some common examples include:

  • Hardware theft or loss: This type of breach can occur if an employee accidentally loses or someone steals a computer or other device that contains sensitive network information.
  • Viruses, worms, trojan horses: Viruses, worms and trojan horses are malicious programs that have been created to steal information or destroy a network.
  • Hacker attacks: Hacker attacks occur when an individual or group of individuals hacks into a computer network to steal information or damage a system.
  • Phishing: This type of attack is when someone tries to get sensitive information by tricking an individual or group into revealing it.

With the right security measures in place, you can minimize your company’s risk of a security breach. Network security defense typically includes:

  • Anti-virus software
  • Anti-spyware software
  • Firewall
  • Virtual private networks
  • Intrusion prevention systems

It is important to note that you can’t install just one of these methods and expect your network to be secure. The most effective defense against a network security breach is to combine these methods for a single, more effective layered security solution.

4) Learning Team Collab

I look forward to working with you on our discussions. I am not sure what kind of company we would like to research, but a couple come to mind. I remember when I used to play on the PlayStation Network a lot, they used to be plagued with DDoS attacks. I have not signed on in a while, so I do not know if they are still suffering from those, but it could possibly be interesting to look into. I would think they would also have other four vulnerabilities, threats, and risks.

The other company I was thinking of could be any of the companies that were hit with the recent ransomware attack. As far as a common threat/risk (I still have trouble differentiating between them), I think perhaps phishing would be a good threat/risk (sorry!) to write about and it seems like any company can suffer from those.

Once I go through some of the readings, I will try and come up with some more ideas. I look forward to brainstorming this with all of you!

5) Individual: Network Vulnerabilities

What is the difference between a DoS attack and a DDoS? What matter of protection is available to the latter?

6) Module 1 Denial of Service attack

Unlike a password-based attack, the denial-of-service attack prevents normal use of your computer or network by valid users. After gaining access to your network, the attacker can do any of the following:

  • Randomize the attention of your internal Information Systems staff so that they do not see the intrusion immediately, which allows the attacker to make more attacks during the diversion.
  • Send invalid data to applications or network services, which causes abnormal termination or behavior of the applications or services.
  • Flood a computer or the entire network with traffic until a shutdown occurs because of the overload.
  • Block traffic, which results in a loss of access to network resources by authorized users
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Answer each question listed below: Word counts are listed beside the question.

  • Define Hardware – 25 to 50 words
  • Define Software – 25 to 50 words
  • What is an operating system – provide an example – 25 words
  • How do hardware and software and how they work together to process user requests. 100 word minimum
  • Discuss what hardware components should be considered when deciding what applications to install. 100 word minimum
  • What are some key utilities in the operating system software that allow users to customize their desktop and keep their PC maintained and optimized. 50-75 word minimum
  • Use the Bulleted feature to list basic hardware components and define their function.
  • Insert a picture or image of your PC, or one that you found on the internet. Type the make and model of PC under the picture and apply Word features to bold and highlight.

Include the following

  • Format paper using APA Guidelines found in the link Writing and Style Guidelines (APA) for 100-299 classes on the lower right side of the Class Home page. You should have an APA title page.
  • You must have at least one reference for this assignment. You must have a reference page and in-text ciations. If you do not have either one of these, it is an automatic zero.
  • You must site any pictures that do not belong to you. If you paraphrase, you must cite the reference. Anything that is NOT your orignal work, you must cite it.
  • Use what you learned in Word Modules 1 & 2 to insert in-text citations and references using APA style.
  • You may number each question and answer it as it is in the worksheet provided. You do not have to write this in essay format.
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Please read the following link: http://www.npr.org/sections/thetwo-way/2017/04/12/523592057/sculptor-of-wall-street-bull-says-fearless-girl-horns-in-on-his-work (Links to an external site.)Links to an external site..

What is the iconography of The Charging Bull in the initial artwork ( standing alone)?

What is the iconography of the Fearless Girl?

Finally, by combining these two sculptures facing each other on Wall street does the iconography of The Charging Bullchange?

Respond in at least 150 words.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Please respond to the following discussion topic. Your initial post should be 75-150 words in length. .

There is a lot of controversy over the ideas behind shared responsibility and victim precipitation theory. In Box 5.2 on pages 142-143 in your textbook “Crime Victims: An Introduction to Victimology” by Andrew Karmen, you will see several early criticisms of shared responsibility. Choose one of those criticisms and present an argument defending shared responsibility as a valid component of victimology.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

read article in the file

according to these problem give some suggestions

each problem have suggestion

each suggestion clearly

no less than 3 pages

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Describe the error in the conclusion. Given: There is a linear correlation between the number of cigarettes smoked and the pulse rate. As the number of cigarettes increases the pulse rate increases. Conclusion: Cigarettes cause the pulse rate to increase.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The paper is mostly written. I just need an abstract and constitution. This is the assignment:

Create a plan that outlines a research study and the associated qualitative method(s) you will use to analyze the data collected in the research study. The plan must include an abstract, introduction, literature review, methods section, and an expected conclusions section per APA standards. At least seven outside sources are to be used in the literature review section of the study. Please use your feedback from assignments prepared during the first four weeks (first four assignments if in the 12 week course) as guidance for your research plan.

Your research plan should look like a research article from a refereed journal, without the results section, but with an expected conclusions section. The most time and emphasis should be placed on the method and expected conclusions sections of your paper, as appropriate qualitative research methods are the focus of this course.

Details: For your selected topic, please complete the following:

  • Abstract – this is a relatively short piece, no more than one page in length (double spaced), where you summarize the paper. In it, you will give a brief description of the research study to be done. This piece of the proposal should be written in such a way that the reader of your Research Plan will be interested in your proposal and want to read further to find out the details.
  • Introduction – this is where you introduce the study Here you discuss the problem, going from the broad to the narrow topic, pointing toward the specific problem of which you plan to address with the literature. In a qualitative study, you will generally be investigating a research question that starts with “Why?” or “How?”. Whereas, the quantitative research questions generally address “How Much?” or “How Many”. Each section of your research plan should have alignment. Once you identify the specific problem and the prospective research question(s), you will be able to examine the literature within the scope of the specific problem to be investigated.
  • Literature Review – in this section, you should present existing information regarding your topic. You will present summaries of articles and their findings that support the background leading up to your study, or any aspect of the research proposed.
  • Method-here you tell the reader how you will gather the data that you will need to address the specific problem. This should be in alignment with the introduction and the proposed research question(s). Tell the reader how you plan to address the research questions with collection of the data. Briefly include the type of qualitative study (case study, qualitative, phenomenological, or other), as well as all qualitative research procedures you’ll use to gather and evaluate your data. Your target audience and the specific research techniques that you will use should be identified in this section of the paper.
  • Expected Conclusions – using fake data, use charts, graphs, and any analyses you think are appropriate for this proposal. Write a summary description, critique, evaluation, and comparison of the qualitative research technique(s). Discuss each method’s procedures, strengths and weaknesses, typical findings, best applications, and the unique qualities of each.

Support your paper with a minimum of 7 resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.

Length: 12-15 pages not including title and reference pages
References: Minimum of 7 scholarly resources.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Assignment

Throughout the session, you have learned about health issues that affect a certain population. In this assignment, you will apply everything you’ve learned and create a presentation about what you have learned. If we were in a traditional classroom, you would show your presentation to the class. For this assignment, only your professor will see the presentation.

Create a PowerPoint presentation about the population and health issue you focused on in Module 1. Describe the issue and the population. Discuss the extent to which the population’s behaviors, culture, genetics, or environment contribute to the issue. Include information about who has already done something to address the issue, and what has been done. Also include what can be done in the future to address the issue (and by whom).

In one slide, comment on how colleagues in your current or future health profession are (or could be) involved in addressing the issue.

Use a variety of resources for this presentation. At least two sources must come from peer-reviewed scholarly journals in Trident’s online library.

Please make the slides easy to read and visually appealing using graphics and a PowerPoint design template.

Here is a lesson about Making PowerPoint Slides: https://www.iasted.org/conferences/formatting/Pres…

If you have never created a PowerPoint presentation, go to the Microsoft Office Support site at https://support.office.com/en-US/ and type “create PowerPoint” in the Search box.

SLP Assignment Expectations

Length: 10–15 slides. 3 cited sources from required reading

Required Reading

Hinman, AR. (1998). Global progress in infectious disease control. Vaccine, 16(11), 1116-1121.

Kaiser Family Foundation (2013). Global Health Policy. Retrieved from http://kff.org/global-health-policy/ This site has information that could help with your assignment.

Komatsu, R, Korenromp, EL, Low-Beer, D, Watt, C, Dye, C., Steketee, R. W, & Schwartländer, B. (2010). Lives saved by Global Fund-supported HIV/AIDS, tuberculosis and malaria programs: estimation approach and results between 2003 and end-2007. BMC Infectious Diseases, 10(1), 109.

Yu, D, Souteyrand, Y, Banda, MA, Kaufman, J, & Perriëns, JH. (2008). Investment in HIV/AIDS programs: Does it help strengthen health systems in developing countries? Globalization and Health, 4(1), 8.

Bhattacharya, S, & Dasgupta. R. (2009). A tale of two global health programs: Smallpox Eradication’s Lessons for the Anti-polio Campaign in India. American Journal of Public Health, Vol. 99, No. 7, pp. 1176-1184.

Bhutta, ZA, Darmstadt, GL, Hasan, BS, & Haws, RA. (2005). Community-based interventions for improving perinatal and neonatal health outcomes in developing countries: a review of the evidence. Pediatrics, 115 (Supplement 2), 519-617

Garrett, L. (2007). The challenge of global health. Foreign Affairs, 14-38.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.