prepare and submit a term paper on The London Visual Arts Exhibition System.

You will prepare and submit a term paper on The London Visual Arts Exhibition System. Your paper should be a minimum of 1250 words in length. The major entities involved in the operations of this system involve the museum management staff, the curator, the artist, the promotional artist, the transportation agency and the advertising agency. The reservation requirements would include the date, time and duration of stay, and each customer or artist will be required to register on the website when providing painting information.

The business events entailed in this system mainly focus on the marketing of exceptional paintings via the London Visual Arts (LVA) Museum/Gallery. Artists will have to contact the London Visual Arts (LVA) Museum/Gallery curators and upload snapshots of the paintings they are interested in displaying at the exhibition. In turn, the London Visual Arts (LVA) curators examine and select paintings that would make a good exhibition. Curators also contact other galleries or museums to find out about paintings held elsewhere viable for the exhibition.

Paintings collected and scheduled for the exhibition are transported to the London Visual Arts (LVA) via a transportations agency. Next, the curators create a detailed file for each and every painting to be put up for exhibition together with all the artist information affiliated with the respective painting. The business events meant for this system revolve around the operations manager, that is, the curators at the art gallery who are responsible for managing the major operations of the proposed system, a term referred to as a system administrator (BURAGGA & ZAMAN 2013).

This phase of the development cycle is tasked with the preliminary investigation of the end-user needs. The end-users of the system in this case scenario will be patients, doctors and physicians who will interact with the end system after its development. This stage of software creation promotes project planning and the feasibility study to be carried out. This aids in establishing a high-level view or display of the intended project and determines the objectives set for the organization. This stage entails data collection of facts and figures and other data variants which involves a feasibility study that is purposed to aid in the carrying out of an economic study of the organization’s background (SEFFAH, GULLIKSEN & DESMARAIS 2005).

write an article on Information Security Measures.

Hello, I am looking for someone to write an article on Information Security Measures. It needs to be at least 1250 words. The study has been planned in several stages. review of relevant literature. study of architectures and measures in computing systems. a case study of security issues within a specific system. and recommendations for good practices for information security. The study is expected to be completed in over a year, and resources at the university library and the computer laboratories have been considered adequate for the study.

A risk assessment approach is necessary for the development of systems with an acceptable level of risk. The use of security standards backed with administrative and technical measures are good practices for minimizing security risks.

Computing applications have become ubiquitous in human endeavors, with applications ranging from simple processing of personal information to complex systems. The widespread growth in the use of computers has led to an increase in risks to security as well. Computers vulnerable to such risks could lead to a range of myriad problems such as loss of information to failure of complex systems resulting in loss of life and property. Addressing computer security is of utmost significance in the design of systems. Organizations have been compelled to institute security systems/programs for the protection of information from increasing levels of threats (Knapp et al., 2009). There has been an evolution of security measures from the addressing of security breaches to managing those that have an impact on the economic growth of an organization. Information security is not about looking at the past of an attack faced. neither is it about looking at the present with the fear of being attacked. nor is it about looking into the future about the uncertainty that might befall us. It is about being alert at all times (Dlamini et al., 2009).

Models of computer security such as the Bell-LaPadula model, the Biba model, and the Clark-Wilson model work within the confidentiality, integrity, and availability (CIA) framework.&nbsp.

writing homework on The Lesson Plan and the English Proficiency of the ELLs.

Need help with my writing homework on The Lesson Plan and the English Proficiency of the ELLs. Write a 1250 word paper answering; The globalization that has been taking place in recent years has strongly necessitated at least a basic command of the English language to succeed, to the point that even infamously xenophobic countries such as Japan and China have been forced to require their students to take up at least the English language in school, if not other foreign languages (Kubota, 1998. Kirkpatrick and Zhichang, 2002).

As such, the advantage in this scenario goes to employees or applicants from countries such as the United States or the United Kingdom, who have been utilizing the English language as their primary language since childhood. However, for one originating from a country such as Iran, in which English is generally not used as the lingua franca, this has some implications. For one thing, these English language learners need are prone to experiencing more difficulty in learning the language that is inversely proportional to its relationship with the student’s mother tongue.

For instance, whereas German students should find it easy or at the very least manageable to learn to speak English due to its close relationship with the German tongue, their Chinese peers may have more trouble due to their own language being completely different in comparison (McKay and Schaetzel, 2008). Aside from this, the intricacies of their culture may necessitate favoring one approach to teaching them, as can again be seen in how Chinese students were found to derive more benefit from teacher-led lectures as compared to more unorthodox methods of instruction, such as classroom discussion and learning activities (Jin and Cortazzi, 1998). Needless to say, would-be teachers of English to speakers of other languages need to be especially sensitive to the learning styles and preferences of their students.

This being the case, this student has come up with a lesson plan, in line with the standards espoused by TESOL.org, which shall be used in an attempt to teach the English language to speakers of other languages.

prepare and submit a paper on environmental issues in the energy sector.

Your assignment is to prepare and submit a paper on environmental issues in the energy sector. The release of carbon dioxide in the atmosphere contributes to global warming and is thus a danger to the well-being of human beings. To ease global warming, either people refrain from using fossil fuel as an energy source or capture carbon dioxide before it reaches the atmosphere (Easton, 2011, p. 148). In carbon capture technology, the debate is not about the existence of the said technology but on their sustainability, safety and viability in being stored underground indefinitely (p. 149).

In a nutshell, there are three issues surrounding the debate between David Hawkins and Charles Schmidt – the availability of technology, safety concerns and the political will to end the use of coal (Easton, 2011, p. 149-150). Hawkins maintains that the technology to capture carbon emissions are already existing and can already be utilized while Schmidt contends that the available technology is not yet technically and financially viable to be utilized on a major scale (p. 149). Anent to this issue is the question of safety, while Hawkins maintains that the technology on safety concerns are already feasible, Schmidt contends that there is still no assurance that carbon dioxide can be stored and can remain in containment underground indefinitely. He also adds that there are still no clear guidelines on who will be responsible for monitoring and take the blame if storage fails (p. 149). Regarding the last discussion point, Hawkins states that the coal power industry is projected to entail at least $5 trillion investments to put up power plants in the next 25 years in order to support the project power demands worldwide (p. 151). As there is a growing need to put up more plants to support the growing power needs of the world, Hawkins maintains that there is an immediate need to set up carbon capture devices to reduce pollution and mitigate climate change effects brought about by coal-burning (p. 154).

write an article on discrimination against women in the united states police force

Hi, I am looking for someone to write an article on discrimination against women in the united states police force Paper must be at least 1250 words. Please, no plagiarized work! From the above table, it is evident that policewomen acceptance by all policemen in America is shallow compared to that in other parts of the world. In other words, American policewomen are suffering from massive discrimination compared to policewomen in other parts of the world. American police officers do not keep a positive attitude towards policewomen. “Male officers anticipate women failing. they doubt women can equal men in most job skills. they do not see women officers as doing “real” police work, and they perpetuate myths about women’s lack of emotional fitness” (Price, 1996). Even before allowing the policewomen to prove their abilities, male police officers in America rate them as inferior to police officers. Thus, American policewomen do not get enough opportunities to prove their credentials because of the superior male officers’ negative attitudes. Many of the only male police officers have the illusion that policewomen’s role is to assist Police officers than participate in the actual policing work. Like a woman doing a secretary post in an organization, policewomen in America are forced to do secretarial jobs.

In job allocation and promotion, deployment, training, and overtime works, American policewomen suffering a lot of discrimination. The following table provides a rough idea about these discriminations suffered by American policewomen compared to other policewomen in other parts of the world.

From the above table, it is evident that 45% of American policewomen are suffering discriminations related to the promotion. In contrast, policewomen in other parts of the world are suffering from comparatively fewer intolerances concerning advertisements. In the case of deployment and training also, American policewomen suffering a lot compared to other policewomen. It should be noted that American policewomen are getting less exercise even though police officers are getting the best training in the world. In other words, the American police force is not giving any importance to the contributions to the policewomen. In their opinion, policewomen are only supporting staff, and therefore they need less training.

submit a 1250 words paper on the topic Understanding of the Bending Theory.

Hi, need to submit a 1250 words paper on the topic Understanding of the Bending Theory. Under load, a beam bends to form an arc. The centre of the beam is the neutral axis which does not deform. However, the layer above the neutral axis shortens while the layer below elongates. As a result, beam fibers above the neutral axis are under compression whereas those below are under tension.

Young’s modulus, or modulus of elasticity (E), is a stiffness measure for any material. This is the extent to which the material resists deformation under an applied load. For beams, the kind of deformation that takes place is majorly deflection (the degree to which a structural element is displaced under a load) (Bansal, 2010). Consider the beam below.

When loaded with a uniformly distributed load or a point load, the beam will be subjected to a bending moment. As a result, it will deflect as shown. Upon removal of the load, the whole strain caused by the load may disappear completely. When this occurs, the material is said to be perfectly elastic. Flexible materials have small values of E whereas stiff materials have large values of E. Graphically. E is equal to the slope of a load against deflection graph.

Much as the amount that a beam will bend when loaded will be determined by the modulus of elasticity of the material, the second moment of the area also determines the degree of deformation in part hence its relevance in the theory of bending. The size and shape of the object determine its second moment of area (Bansal, 2010).

The amount by which a structural element is displaced upon application of a load is called deflection. Depending on how the element is supported, how it will deflect and its degree of deflection will vary. A structural element can be: simply supported, fixed, pinned, supported on rollers or cantilevered. While deflection is least experienced at the supports of the element in question, it is greatest at midspan of the supporting element.

Create a thesis and an outline on Issue of the Software Theft.

I need help creating a thesis and an outline on Issue of the Software Theft. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. The modern world is in a period where there is an outburst of research and innovative concepts that are been realized day in day out. The level of innovations has grown and that can only be attributed to technology. The most outstanding thing about it is the speed of innovation. The rate of innovation has increased dramatically such that each day, a better version, or model of a technological item is created [1]. In the digital world, where software is the main norm, this is the case. The software that is produced is the real reason that a lot of the hardware that is in use functions as it does. Hence, companies like Primal Pictures manufactures software that avails precise 3-D models of human anatomy, which is no mean achievement. In spite of this prudent innovation that can be used in learning, health services, and research, the company is faced with an infringement of its intellectual property, which is the software. Piracy, an ethical problem, is threatening its existence as the software is copied using DVDs that are then sold to people as fake versions of the software. In addition, there is the sharing of the same software through sites that permit peer-to-peer torrents download. The shared versions of this software are the pirated ones. Due to these threats, the company sought the help of the Federation against Software Theft (FAST) who tried to stop the illegal distribution of the software by closing some of the online retailers who were selling the software without legal permission. The company also had several listings available on Google brought down. It tried the legal road, which proved tough. Hence, the paper is going to examine the ethical theories and principle aspects of the case study.

As noted, the ethical problem surrounding the software of Primal Pictures is piracy [2]. The question is what makes piracy an ethical problem?&nbsp.Piracy is the unlawful copying of software to sell, distribute, or share it without express permission from the legal and rightful owner [3].

write an article on Chinas Struggle for Environment Protection.

Hello, I am looking for someone to write an article on Chinas Struggle for Environment Protection. It needs to be at least 1250 words. High rates of industrial pollution and the degradation of the forests and the grassland region, it has become quite difficult for marine creatures and other animals on land to fight for survival.

As an alarming concern with regards to the conservation of the environment, the Chinese Central authorities are trying to establish a strong basis in which the environmental regulators in the country will be able to implement measures that will guarantee the protection of the environment. However, it is well noted that the effort of the environmental regulators in protecting the environment will definitely sabotage the industrial activities as well as employment. It is based on this claim that the Chinese central authorities have not yet found it fit to equip the environmental regulators with the legal rights to implement their measures and laws. Politics has also made this step to be quite difficult as there are many conflicting parties, which want to address the issue of environmental conservation differently.

It is through the conservation of nature that animal protection can be guaranteed. Therefore, China is focussing more on protecting the environment especially concerning the habitats occupied by different animal species. A recent research study conducted by some of the environmental regulators in China indicated that the conservation of the ecosystem as well as the animal species within the ecosystem would assist in maintaining the natural imbalances, which have been affected by numerous human activities (Shapiro 42).

There has also been a rapid decrease in the number of animals in China. This is based on a conservation study that was conducted on animal extinction. Humans have attributed the decline to the destruction and persecution of their habitats. For instance, most industrial waste products are released into freshwater bodies causing the water to be filled with impurities leading to the death of most of the sea creatures.

write an article on culture diversity between islamic, catholic, and buddhist.

Hi, I am looking for someone to write an article on culture diversity between islamic, catholic, and buddhist world Paper must be at least 1750 words. Please, no plagiarized work! The country has a homogenous population and the major languages spoken among this population are Korean and English. The major religion practiced by them is Christian and Buddhism.

Morocco is estimated to have over 33 million people. The age distribution among this population is majorly made up of people between the age of 15 and 64 at 67 %, followed by 0 14 years at 26 % while 65 years and over constitute 6.3% of the population. The Arab-Berbers make 99% of the population speaking Arabic as the major language and Berber as the indigenous language. The major religion that is practiced is Muslim

Ecuador has over 15 million people. People between the ages of 15 and 64 make 63 % of the population, 0 to 14 years make 30.6 %, and 65 years and above 6.4 %. The mestizos make the largest ethnic group followed by the Spanish the Blacks and the Europeans. Spanish is the official language while Quichua is the official language. The religion practiced is Christian with Catholics forming 99% of it.

Iran has a population of over 80 million people with 71 % of the population being between 15 and 64 years of age while 0 to 14 years make 23 % of the population. The Persians are the major ethnic group making up over 60 % of the population. Other ethnic groups include the Azeris, Lur, Kurds, Arabs, Balochs, Turkmen, and the Turkic. Persian is the official language. Other languages include Arabic, Balochi, Gilaki, Kurdish, Turkic, and Mazandarani. The major religion is Muslim. However, there are Sunni, Christian, and Jews.

Iran’s existence as an Islamic state came after the revolution in 1979. It fails to recognize Israel as a sovereign state and continues to push for nuclear capability. Thus it has a strained relationship with Western powers.

Ecuador has been plagued by political instability since its independence for over 30 years. Only now has it gained stability. It has had disagreements with its neighbors over territories it claims to own. It was colonized by the Spanish. It celebrated 30 years of independence in 2003.

Compose a 1250 words assignment on tegan and hrad technika case study.

Compose a 1250 words assignment on tegan and hrad technika case study. Needs to be plagiarism free! Thus, the only viable solution was to outsource the project to a third party having all the necessary expertise and resources to complete it in time.&nbsp.Thus, the only viable solution was to outsource the project to a third party having all the necessary expertise and resources to complete it in time.&nbsp.The next issue was of the small budget allocated for the completion of the project. The outsourcing was finalized based on the lowest bid available and not on the qualities and expertise of the IT firm. What are the trade-offs involved in having the requirement analysis for a project performed by one of the firms that would ultimately bid on the project?&nbsp. Answer:&nbsp. Djavanshir studied the impact of IT outsourcing and argued that there are a high complexity and risk factor involved in the completion of IT outsourcing projects (32). Therefore, the businesses have to keep into consideration the possibility that the outsourcing firm may withdraw from the deal at the eleventh hour or default. In both scenarios, the business losses all its investments in the project as well as the time.&nbsp. Tegan’s management considered this aspect and undertook an act of analyzing the requirements with the same firm that was likely to bid for the project. The primary trade-off of undertaking this activity was the assessment and assurance that the firm will undertake the project within the desired time frame. Hrad Technika’s team was well aware of the requirements of the project as they had developed the entire document for the bidding process. They understood the underlying problem and therefore, required less time and resources to finalize the project. This way the risk of firm’s default in performing the task was also substantially minimized.&nbsp.