strategies that you will use to become successful

Write an essay that discusses the strategies that you will use to become successful.

Begin with an introduction that starts out with a summary of Dweck’s “Growth Mindset”before you on to  discuss your own mindset and,finally,present your thesis.You must quote from the article “Brainology” twice directly in the intro.


As you discuss each strategy,one per body paragragh,support your ideas by using a real person who has used this particular strategy to excel,while you may use those who inspired you,aim for choosing examples of people who have excelled in the career of your choice (FYI: MY CAREER OF CHOICE IS NURSING).Research people about whom you wish to discuss,and be careful not to insert their biographies into your paper.You only need to use information that reveals how these people have used a growth mindset to achieve their goals.


Each body paragraph will the focus on one strategy and provide one example.please remember to use the body paragraph fomat-topic sentence,explanation of the topic sentence,example,analysis(how the example proves the thesis-in this case,the result of using this strategy and this person became accomplished by having a Growth Mindset),and transition.


In conclusion,discuss your own success in two paragraphs;one paragraph that includes research about the academic path you wish to follow and another paragraph that describes your vision of your career goals.Close with a quote from Dweck,and provide a statement of your own after the quote


You will have a six paragraphs in total:anintroduction,three body paragraphs,and a conclusion of two paragraphs.After you outline and essay appear,you need to include a works cited page at the end that cites Dweck’s “Brainology” along with the other sources you used for your body paragraphs


Be certain to include a typed,Roman numeral formatted outline as the first page(s) of your paper.Keep the outline and the essay together as all one document so that the paiginationcontinues.If your outline is two pages long,your essay will begin on page 3.You will put a heading on the first page of the outline and one again on the first page of the essay.The works cited page is a continuation of the essay,and it should also be included in the same document.

dentify and assess emerging cyber security

Individual Assignment
Write an 15 page (minimum length) paper in which you identify and assess emerging cyber security approaches and technologies as well as discuss government efforts to nurture the development of these emerging technologies.
An emerging technology is a technology that is in the genesis stage, is still being researched and developed, and has not been proven, standardized, or widely adopted. One way (but not the only way) to identify emerging cyber security approaches and technologies can be based on its novelty and interest as demonstrated by the availability of 5 or more recent (less than 12 months old) research papers from IEEE or ACM sources that address the identified cyber security technology/approach. By that criteria, fingerprint biometrics, eye biometrics, voice print ID as a class are all unacceptable topics. There may be a new research result in one of these areas, but the basic idea and first deployments of these technologies occurred over 30 years ago. These technologies are not emerging.
Your paper must include: Cover Page, Table of Contents, Introduction, Section Headings and Subheadings, Conclusions, APA compliant in-text citations and list of References, and page numbers. The paper must be formatted according to the mandatory paper format guidelines. The page count begins with the Introduction and ends with the Conclusions and does not include any figures or tables. Prepare your paper in Word (.doc or .docx). Include a minimum of 8 credible, external sources. At least 75% of references should be based on official reports, scholarly studies, or peer-reviewed journal articles. The latest edition of the APA manual is the authoritative reference for grammar questions for the assignment. The following two questions must be addressed in your paper.
1. How do the emerging cyber security technologies that you identified coupled with prioritized research and development improve cyber security?
A. Clearly define the emerging cyber security technologies that you identified as well as their main features.
B. Clearly define how an organization would use these emerging cyber security technologies.
C. Describe real-world examples of the use of these emerging cyber security technologies.

2. Discuss the role of the federal government in the support and nurturing of the emerging cyber security technologies that you identified.
A. Clearly discuss the benefits and drawbacks that government efforts to support new cyber escurity technologies may create.
B. Describe real-world examples that support your position.

A title page, table of contents and the reference pages are required. The page count starts with the Introduction and ends with the Conclusions. However, the page count DOES NOT include figures and tables. Prepare your paper in Word (.doc or .docx). Include a minimum of 8 credible, external sources. At least 75% of references should be based on official reports, scholarly studies, or peer-reviewed journal articles. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. The assignment is due at the end of Week 3, by Sunday 11:59PM U.S. Eastern Time.
Before you submit your paper, you will need to run your assignment through and receive an originality report. DO NOT WAIT UNTIL THE LAST MINUTE TO DO THIS. It might take several hours to a day or two for to do this. Resubmissions can take a day or more. For instructions, go to the “ Instructions” conference posting under the “Important Documents and Rubrics” conference. After your paper meets all of the stated criteria in the posting, attach the paper AND the originality report in your Assignments Folder by the end of the week 3, by Sunday 11:59PM U.S. Eastern Time.
Prepare your paper in either Word (.doc or .docx) format and submit it through your Assignments Folder. The PDF version of the assignment generated by Turnitin must also be submitted. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

Other correspondence from the instructor. I would like my topic to be on ?The Blockchain?
Hello Professor,
I am kind of stuck on a topic for my IA. I want to write about The Blockchain as an emerging technology but was not sure if it is a topic that you’re looking for. If not, do you have any ideas that I can squeeze 15 pages from because I’m not sure if Blockchain will. Please advise. Thanks, Professor.
OJ, not sure what angle you may have been thinking to address using Blockchain as the basis so sort of difficult to advise whether it’s a good topic. From a cyber security perspective, would you be looking at blockchain as the basis for a potentially larger global financial exchange mechanism and then examine the inherent vulnerabilities therein? I could see something along the lines of comparing that use versus the current financial transactions network, examining whether this approach lends any additional security or protection to the financial transactions that occur between banks and other financial institutions. Would that be something of interest or in line with your thinking?
If you think the data is not out there to support what you want to address, consider presenting what you think (based on the data available, your knowledge of the cyber challenges out there, and the pending financial difficulties that scaremongerers publish) and laying out how this might offer support to an enhanced, secure financial transaction approach. That would, in my view, take some detail to present the concept, explain its merits, explain its benefit to cyber security, and then address some of the mechanics of how it would be implemented. Make sense? If so, then I think there’s enough there for your paper — you actually might have to write much of it as original thinking (which is a really good thing).

Active Directory Certificate Services and PKI

Do some research and write a short “summary paper” on Active Directory Certificate Services and PKI. I’m expecting a well researched and thought out report that’s 2-3 pages long… not just a quick internet search followed by a bunch of copy-n-paste operations. You will be graded on both the content and the level of effort. Remember, I’m after “understanding” rather than just the reciting of facts.

There is no particular format for this assignment, but it must be well organized and easy to tell that you actually did some work

Purpose: To demonstrate your understanding of a Microsoft PKI implementation.

Arguable Thesis Statement

APA Format Arguable Thesis Statement that previews 3-4 main points.
Create an annotated bibliography of 10 credible sources that you plan to use in your research paper.
1. Provide a full, APA-formatted reference citation for each source.
2. Provide an annotation (suggested length of 100 words) for each source that includes the following:
a. a summary of the information presented in the source
b. an analysis of the credibility of each source’s author or publication, if no author is present
c. an analysis of the relevance of each source to your chosen topic.
Main paper topic: What are the benefits of legalizing the recreational use of marijuana.
Must be 9 pages


replies to those question
1. data compression has become a very important tool in today’s world of big data and ever growing file sizes. this powerpoint presentation showed the types of compression that can be used and businesses and individuals have to decide what best fits their needs and what kind of data they are trying to compress. there is no one best way to compress everything and then there are times where you would not want to compress it in the first place. like it said in the presentation, some file sizes grow larger after compression because of the type of data stores in that file. data compression is all about how to store large amounts of data in a smaller, more cost effective way and also being able to move data more efficiently by reducing the size of the file(s) you need to move.  with the ever growing size of media these days compression is paramount. when a person is streaming something from netflix, the service compresses the video based on the users internet speed or bandwidth. it uses multiple levels of this because everyone does not have the same internet speed. another consumer example would be pc games.  they have grown so much over the years that a game can now be 50gb+ easy. being able to compress that data and then transfer it to the user reduces the amount of data download needed(caps these day are nothing new) and makes it much faster. on the business side everyone is collecting data on everyone. this data grows so fast that companies inevitably have to compress it to reduce storage costs. when companies have data warehouses and probably don’t access that data very often, it’s most likely stored in a compressed state to cut down on costs. even in our own oracle databases the backups that we make are saved in a compressed format to save space.
compression will keep evolving over time as file sizes keep increasing. where do you think the next pied piper(fictional new compression algorithm) will come from and how will it work?  (from hbo’s silicon valley).

2. data compression has many advantages like saving disk space, ease of transfer compressed files, the compressed files can also be encrypted with a password for protection. it is indispensable in today’s’ world with the large usage of data. the result of compression is having fewer bits than the original representation. there are two basic types of compression lossy and lossless compression. the type of compression to be used should be decided by the kind of file that needs to be compressed. in lossless compression, there is no loss of data (i.e.) when the compressed file is decompressed it is the same as the original file. there are two techniques for lossless compression. statistical redundancy where data is compressed based on repetition of characters. the lzw algorithm is based on this. bit string where the data is compressed based on the sequence of bits coding. huffman coding algorithm is based on this. it reduces the number of bits used by using a code tree. most of the applications that we use to transfer data like whatsapp compress the file before transfer. thus we use data compression without even knowing it.  for discussion, are there any other places where we compress the data without even realizing it? do you think this is beneficial?

evaluate the effectiveness of community oriented policing


 1. Please expand on how you would evaluate the effectiveness of community oriented policing. You mentioned interviewing the officers. Can you expand on this a little? Just an extra couple sentences.

2. Can you think of any concrete examples of how our pretend police force could engage the community to “co-produce”? We have collectively mentioned general ideas such as forums and communication with the community, partnerships between organizations, and positive reinforcement. I like the idea of community liaisons, individuals who are focused on communicating the needs of the community, as provided by the community, to police authorities to ensure the needs of the community are acknowledged and addressed. What are your thoughts?

3. What do you mean by negative perceptions being a challenge. Would this be negative perceptions by the officers about COP? Or negative perceptions by the community about the police?