Category: Other

  • Title: Understanding Firearms and Sighting Systems

    Choose a firearm you own or have legal access to that is equipped with factory or “iron sights”. Research the firearm and sights and answer the following:
    1. What is the intended purpose of the firearm (i.e. target, combat, home defense, hunting, etc.)? How is this firearm built specifically for that purpose? Are there any pros or cons you have experienced with the firearm’s design?
    2. How well suited is the sighting system to the intended purpose of the firearm? Is there another sighting system that would be better? Thoroughly explain your answer.
    3. Provide a detailed explanation of the method the sighting system can be adjusted for improved accuracy at various distances. Are tools required for adjustment. If so, which tools and how would they be used?
    NOTE: If you have a photo of the firearm and sighting system, please include this photo in your submission.
    Assignment Two
    Answer the following:
    1. When is a 50 mm objective lens preferable to a smaller lens? When is it not? Why?
    2. The size of a scope tube has more to do with adjustability than light-allowance. Explain.
    3. Explain the concept of “parallax” as though you were introducing this to someone with no prior experience. Use everyday examples to better illustrate your understanding (e.g. bathroom scale, speedometer, etc.)

  • “Creating a Personalized Nutrition Plan for Optimal Health and Wellness”

    please read and follow instructions in attached paper. use the information provided to fill out the template: instructions and template are attached

  • Penetration Testing Report for Acme Corporation’s New System Penetration Testing Report for Acme Corp: Assessing Network Vulnerabilities and Mitigation Strategies

    Take a look at the example penetration testing report by Offense Security in the resources. Conduct a writeup similar in nature for the vulnerabilities we discovered today. This writeup must include images as seen in the example so that the customer can easily see what was found. Your paper must discuss each of the vulnerabilities we covered in this week’s lab, as well as two additional vulnerabilities that we did not discuss.
    In the resources section, you’ll see a list of vulnerabilities in Metasploitable3. Review this list to determine which additional vulnerabilities you want to exploit. When documenting these in your paper, you will need to document how you found this vulnerability. Do not state that you used a vulnerability listing for Metasploitable3. Instead, discuss the process used to identify the vulnerability (nmap scans to find open ports, Nessus to find vulnerability, etc…). Ensure that your paper revolves around the following scenario.
    Scenario:
    Acme Corporation hired you to validate a new system added to its network. They believe this system is secure and ready to be added, but company policy requires a completed penetration test to verify security. The policy dictates that the penetration test be conducted first as a white-box test to ensure that the system can be completely verified. As such, the project manager at Acme Corp has provided you with the credentials to the box. This allows you not only to conduct an uncredentialed scan, but also a credentialed scan.
    They want the test to start as if the hacker has access to the internal network, but does not know anything. As such, the test must start with only barebones information (you know the subnet you are on, but you do not know credentials). After you get an initial scan of the network using no credentials, they request that you use the provided credentials to get more accurate scans and more accurate testing.
    Paper Requirements:
    Written Communication: Write in a professional manner using APA 7th Edition and formatting with correct grammar, usage, and mechanics.
    Narrative: The Narrative must start as if you do not know any username and password. As such, an uncredentialed scan must run, as well as nmap scans. After you get the initial uncredentialed scans, you must use the credentials to scan the VMs.
    APA Formatting: Any resources and citations used are formatted according to APA 7th Edition.
    Length: 3-5 Pages (not including Title Page, References, and any Abstract/Executive Summary)
    Font and font-size: Any of the acceptable APA7 fonts.
    Vulnerabilities: 5 Vulnerabilities are discussed. Those that we found in the Lab this week, and two additional ones you discovered by yourself.
    Take a look at the example penetration testing report by Offense Security in the resources. Conduct a writeup similar in nature for the vulnerabilities we discovered today. This writeup must include images as seen in the example so that the customer can easily see what was found. Your paper must discuss each of the vulnerabilities we covered in this week’s lab, as well as two additional vulnerabilities that we did not discuss.
    In the resources section, you’ll see a list of vulnerabilities in Metasploitable3. Review this list to determine which additional vulnerabilities you want to exploit. When documenting these in your paper, you will need to document how you found this vulnerability. Do not state that you used a vulnerability listing for Metasploitable3. Instead, discuss the process used to identify the vulnerability (nmap scans to find open ports, Nessus to find vulnerability, etc…). Ensure that your paper revolves around the following scenario.
    Scenario:
    Acme Corporation hired you to validate a new system added to its network. They believe this system is secure and ready to be added, but company policy requires a completed penetration test to verify security. The policy dictates that the penetration test be conducted first as a white-box test to ensure that the system can be completely verified. As such, the project manager at Acme Corp has provided you with the credentials to the box. This allows you not only to conduct an uncredentialed scan, but also a credentialed scan.
    They want the test to start as if the hacker has access to the internal network, but does not know anything. As such, the test must start with only barebones information (you know the subnet you are on, but you do not know credentials). After you get an initial scan of the network using no credentials, they request that you use the provided credentials to get more accurate scans and more accurate testing.
    Paper Requirements:
    Written Communication: Write in a professional manner using APA 7th Edition and formatting with correct grammar, usage, and mechanics.
    Narrative: The Narrative must start as if you do not know any username and password. As such, an uncredentialed scan must run, as well as nmap scans. After you get the initial uncredentialed scans, you must use the credentials to scan the VMs.
    APA Formatting: Any resources and citations used are formatted according to APA 7th Edition.
    Length: 3-5 Pages (not including Title Page, References, and any Abstract/Executive Summary)
    Font and font-size: Any of the acceptable APA7 fonts.
    Vulnerabilities: 5 Vulnerabilities are discussed. Those that we found in the Lab this week, and two additional ones you discovered by yourself.

    Resources:
    https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf
    https://github.com/rapid7/metasploitable3/wiki/Vulnerabilities

    Tips for Creating a Strong Cybersecurity Assessment Report

  • “IMC Plan for Product X: Driving Growth and Success in the New Year”

    Part 1 covers the current marketing strategies used by the product & sets the communications objectives for the new year. Use the template to develop your IMC Plan. You can either:
    1. Copy the slides and use them as guides to develop your own format. However, all the topics must be covered.
    2. If you use the template, keep the headings, but remove all the directions and tips for a professional presentation.
    Customize your project with your own graphics and artwork, or just use this template. Check out the Effective Power Point Presentation Tips in your Marketing Toolbox under course resources.
    Add additional slides if you need more space to effectively present key information. But use the numbering system already in the template.

  • “Concept Map: Steps and Considerations for Placing an Order”

    I need help with a concept map .
    Important Info
    The order was placed through a short procedure (customer skipped some order details).
    Please clarify some paper details before starting to work on the order.
    Type of paper and subject
    Number of sources and formatting style
    Type of service (writing, rewriting, etc)

  • “Cultural Insights from Episode 2 of “Call My Agent”” Title: “Cultural Insights from Episode 2 of “Call My Agent”” In episode 2 of season one of “Call My Agent,” titled “Line and Image

    First of all, you need to watch episode 2 of season one of the French TV show “Call My Agent” and describe that episode.
    you will BRIEFLY outline episode 2 of season one of this show and describe the main events (3 sentences max) and most importantly, you will explain the cultural points that you discovered during the episode.
    Remember to only watch and describe episode 2.
    This show can be found in Netflix.

  • Connecting with the Elements: My Experience with Earth and Water When I first embarked on this assignment to connect with the elements, I was both excited and nervous. I have always been drawn to the natural world and its elements, but I had never

    1) Describe your experience 1)greeting, 2) feeling, 3) expressing gratitude with the EARTH element. What was this like for you? Did you have thoughts? Did you experience emotions? Did you have sensory experiences–sight, smell, taste, touch, hearing. Were you indoors or outdoors? Both? Share any experiences you would like to share and if you have any questions please ask. Be specific, write: ″When I greeted I . . . .″ ″For me what I experienced during the ′feeling′ stage was . . . ″ ″When I expressed gratitude, I experienced . . . ″
    2) Next write about your experience with the WATER element. Follow the instructions above.
    If you have any questions about this assignment, email me. Please write between 4 and 6 pages double-spaced 12 pt is fine. 

  • “Case Study Analysis: Examining Student Performance and Teacher Strategies” Introduction: In this case study analysis, we will be examining the performance of a group of students and the strategies used by their teacher to improve their academic achievement. The study will focus on

    The a-s-s-e-s-s-m-e-n-t will
    Case Study Analysis
    Please see the questions shown in the screenshot. I will send you all the info after being hired, eg PPTs, student access etc. Please send a draft in 12hrs -1 day time, day 2, and day 3 as well. + Will need to draft some questions to ask the teacher and revise base on feedback (Send bk ard in 1 day max)

  • Title: Annotated Bibliography: Evaluating Sources for a Meteorology Research Project

    The reason the annotated bibliography is included as part of the research project is that writing an annotated bibliography is important in that it provides excellent preparation for the final presentation. One of the issues regarding any type of research, especially in meteorology, is the credibility of the sources used, particularly those obtained from various websites. By forcing you to evaluate each of your potential sources carefully, the annotated bibliography helps you determine if in fact the source you chose is credible and helps you determine how relevant it is to your topic and understand the topic better which will help you develop your presentation.
    For this project, you will assess three sources to include:
    1) a complete citation for each source,
    2) a summary of each source, and
    3) an evaluation of each source.
    Please see the attached sample annotated bibliography and grading criteria.

  • “Interpreting the Data: Key Findings and Implications”

    I would like the ″Interpretation″ section of this report completed referring to the data in the results section which I have already completed.