1-Identify three job opportunities in that region (such as United Arab Emirates, Indonesia, Malaysia, Saudi Arabia, Qatar, Bahrain, Kuwait, Oman, Morocco, etc.) RELATED to your major (briefly describe each one with salaries, benefits, and responsibilities) – The job must be current listing or within the past 12 months)

Your very dear friend just got a job in ….. (A MUSLIM COUNTRY OF YOUR CHOICE). He/She wants you to come visit and potentially seek a job in the region because there are many job opportunities for Americans companies conducting business there. You are unsure about the idea but since you have a break at Cal State or graduating soon and have some time off, you decided to go visit for two weeks. Prior to visiting, you did some research and found some short tourism / news / business clips about YOUR COUNTRY OF CHOICE in addition to some job opportunities:

Write a short (approximately 1,200 words) exploration AND reflection answering the following:

EXPLORATION (600 words)

1-Identify three job opportunities in that region (such as United Arab Emirates, Indonesia, Malaysia, Saudi Arabia, Qatar, Bahrain, Kuwait, Oman, Morocco, etc.) RELATED to your major (briefly describe each one with salaries, benefits, and responsibilities) – The job must be current listing or within the past 12 months) (200-300 words)

2-Identify three touristic sites you would like to visit in the country above and why you chose them ahead of other sites (300-400 words)

(Please add the links from the websites you found, however, don’t count linked addresses as part of your word expectation)

REFLECTION (600 words)

1-Write three considerations that make you want to accept a job there (300 words)

2-Write three considerations that make you want to turn down a job there (300 words)

Write a 5 pages paper on the success of flayton electronics.

Write a 5 pages paper on the success of flayton electronics. The focus of Flayton Electronics was to determine where the problem started and to solve it before the customers learned about it from the media or other sources.

Howell (2010) defined critical success factors as a limited number of conditions in a business that directly impact the effectiveness and efficiency of a project. Critical success factors (CSF) are the important areas of business activity that must be performed well if the enterprise is to achieve the organization’s set missions and goals (Howell, 2010). CSF is important as it helps the business create a common point of reference for help during the problems that may arise during the business’s operations and measure the success of the project (Wiener, 2006). The managers of Flayton Electronics did not carefully take a key interest in the area that receives constant and careful attention, which is the security of the customers’ data. According to the case study, the critical success factors in Flayton Electronics firm were to ensure that the security of the customer’s data, attract and satisfy new customers, and to create successful relationships with the customers.

There was a data breach in Flayton Electronics firm where there was evidence of purchasing an above-average number of bad cards. This was a critical setback to the firm since they would lose important private information and the customers would not be amazed to hear such information from a firm that they have entrusted with all their savings. This data breach in the firm means that the managers were not keen enough to follow the business’s critical success factors. As stated in the case study, Laurie, who was responsible for security, was not sure of all the information she was supposed to know about the breach. Brett Clayton, the CEO, started researching how theft happens the next morning after realizing that their company was a threat, which he should have been aware of as the company’s CEO.

write an article on web site for tony’s chips

Hi, I am looking for someone to write an article on web site for tony’s chips Paper must be at least 1250 words. Please, no plagiarized work! Support is also widely available on the internet and a support package can be bought from Microsoft. Windows can be installed in a local PC by a relative novice, but it does require specialists when used in a multi-server environment.

Apache will run on Windows or Linux. It has by far the largest installed base of web server software. It does require some expertise to install for a small site, and specialists are required for large sites with many web pages and high hit rates. Support is widely available on the internet.

Microsoft IIS which forms part of the Windows Operating System is the second most popular web server. It is easy to install from the Windows Control Panel by a novice, but specialists are required for a multi-server site. Support can be purchased from Microsoft as part of the Windows Support package.

A database is required for a website if there is to be any form of long term storage or transaction-based processing such as placing orders. Open-source offerings such as MySQL or PostgreSQL are readily available and free, Microsoft provides SQL Server for Windows and there are other chargeable products such as Oracle (which runs on Windows or UNIX/Linux).

MySQL runs on Windows or Linux, has a major market share, and supports large websites. It requires minimal expertise to install but does require SQL expertise to implement a database. While being very fast, MySQL has limitations in terms of transaction integrity.

PHP, Perl, and Python are the generally used languages on the open-source platforms, although they can also be used on a Microsoft platform. For Microsoft platforms, ASP.NET is the preferred language, but other .NET languages also work.

Although the brief is to “… provide a disaster recovery solution to ensure the site is always available”, this is too onerous on a small operation like Tonys Chips. The scope of disaster recovery covered here is where the web-server does not respond to requests, recovery will be automated, and short periods of downtime (minutes) will be tolerated. It does not cover:

• External network faults, such as the cable being dug up – this would require a redundant network connection via an alternate route (such as wireless) to backup the fixed cable, as well as alternate domain configurations on the switches of the major carriers (DNS failover).

writing homework on History of Geographic Information Systems.

Need help with my writing homework on History of Geographic Information Systems. Write a 1250 word paper answering; The evolution of this particular progression will be traced in the hopes that such a discussion will be fundamentally useful in allowing the analyst to come to a further appreciation of the way in which geographic information systems have evolved and impacted upon the way in which decisions are made and information is understood within the current world. As a result of tracing the historical origins of geographic information systems, the analysis will present some of the key ways in which GIS has been able to positively impact upon human knowledge and drastically developed over the past several hundred years. By discussing and analyzing GIS and its history outside of the era of computing, it is the further hope of this author that the reader can gain a more informed and definitive understanding of the ways in which this particular technology is likely to grow and expand in the immediate future. representing more and more a pivotal way of understanding the world around us and less contingent upon complicated software applications.

One of the first recorded applications of GIS denotes the fact that computer imaging and/or sophisticated software suites are not required in order for this particular science to be represented. Accordingly, in 1832, the French geographer Charles Picquet utilized GIS as a means of tracking the 48 districts of Paris and seeking to determine a level of inference with respect to a debilitating and deadly cholera outbreak that was threatening the health of the entire city. By creating a primary layer of geographic information that represented 48 districts of Paris and overlaying this map with cholera infections, Charles Picquet was able to pinpoint the actual well that was responsible for the illness that was killing so many Parisians at that time. Through analyzing the two different data sets at the same time and being able to draw a useful level of inference from what was represented, most GIS historians did note that this particular&nbsp.representation was the first of its kind in which GIS was utilized as a means of affecting a level of understanding on the practitioner.

write an article on stuxnet’s outline and structural planning

Hi, I am looking for someone to write an article on stuxnet’s outline and structural planning Paper must be at least 1250 words. Please, no plagiarized work! Stuxnet is normally acquainted with the target environment through a tainted USB blaze drive. The infection then spreads over the system, filtering for Siemens Step7 programming on PCs controlling a PLC. Without both criteria, Stuxnet gets to be lethargic inside the PC. On the off chance that both the conditions are satisfied, Stuxnet presents the contaminated rootkit onto the PLC and Step7 programming, changing the codes and giving sudden summons to the PLC while giving back a circle of typical operations framework values criticism to the clients (Langner, 2012).

VirusBlokAda from the get-go distinguished the worm. Its current name is gotten from a blend of a few decisive words in the product (“.stub” and “mrxnet.sys”). The purpose behind the revelation right now is ascribed to the infection incidentally spreading past its proposed focus because of a programming blunder presented in an overhaul. this prompted the worm spreading to an engineers PC that had been associated with the axes, and spreading further when the architect returned home and joined his PC to the web.

Kaspersky Lab specialists from the start evaluated that Stuxnet began spreading around March. however, the worm’s first variation showed up in 2009. In 2010, the day the worm’s presence got to be broadly known, a circulated foreswearing of-administration assault was made on the servers for two driving mailing records on modern frameworks security. This assault, from an obscure source, however likely identified with Stuxnet, debilitated one of the rundowns and accordingly intruded on an imperative wellspring of data for force plants and industrial facilities (Zetter, 2014). Then again, analysts at Symantec had uncovered a variant of the Stuxnet PC infection that was utilized to assault Iran’s atomic program in 2007, being created as right on&nbsp.time as 2005, when Iran was all the while setting up its uranium enhancement office.

Give an example of if-then, and loop using variables. Explain the danger of endless loop, and how to avoid them. Can an endless loop create a DoS (Denial of Service)?

All posts must be a minimum of 250-300 words. APA reference. 100% original work. no plagiarism.

1. Give an example of if-then, and loop using variables. Explain the danger of endless loop, and how to avoid them. Can an endless loop create a DoS (Denial of Service)?

prepare and submit a paper on analysis of the tempora surveillance system.

Your assignment is to prepare and submit a paper on analysis of the tempora surveillance system. Surveillance is a very useful activity to law enforcement agencies, and government organizations for purposes of maintaining social control, recognizing threats, and investigating/ preventing criminal activity. There are a variety of programs developed for purposes of promoting surveillance programs. An example is the Tempora surveillance system. Tempora is a codeword for a secret computer system that was used by the British Government to collect intelligence information through the internet. This system made it possible for the British Government to extract information from the fiber-optic cables. It enabled the British Government to access a large volume of personal information from the users of the internet (Ernst, 2012). To improve on the surveillance capabilities, the government normally uses biometric software and high-speed surveillance computers for purposes of collecting information and data on an individual. However, the enactment of the Freedom of Protections Act prevented intelligence officials from violating the privacy of their subjects. However, for surveillance programs to be effective, there is a need of supervising everyone responsible for collecting and using the intelligence gathered.

There is a need of supervising surveillance programs, for purposes of ensuring their effectiveness.

Carrying out a surveillance program helps the government to collect information to use in protecting the citizens of a state. However, there are instances where the government intelligence agencies or surveillance programs are accused of breaching the privacy of the citizens of a state. Take for example the Tempora surveillance program that was developed by the British government, to spy on the online data of people (Ernst, 2012). Through this program, the British intelligence agencies were able to access millions of personal data, extracted from social media sites such as Facebook, Twitter, LinkedIn, etc. This program was also able to capture telephone conversations between different people.

Make a PPT with Evidence Base Practice. PICOT Question:  Are educated Medical-Surgical nurses (I) more successful in performing COVID-19 nasopharyngeal swabs (P) compared with non-educated Medical-Surgical nurses (C) for accurate COVID-19 test results (O)? 

Make a PPT with Evidence Base Practice. PICOT Question:  Are educated Medical-Surgical nurses (I) more successful in performing COVID-19 nasopharyngeal swabs (P) compared with non-educated Medical-Surgical nurses (C) for accurate COVID-19 test results (O)?

I uploaded a PPT that you can use/edit. Check all the articles in the reference list I put in and search 3 more articles that is related to my PICOT question. You have to base all the articles to my PICOT questions. I need it tomorrow in less than 24 hours, if early I appreciate it. Thank you.

*Hope you know how to grade articles using The Johns Hopkins Nursing Evidence-based Practice Rating Scale.

Readings for psychology quiz

The quiz will open on Wednesday at 7:00 am and be available through 11pm central on Sunday.   This quiz will cover the readings and materials from weeks 3 & 4.  You will have one hour to complete the quiz.

I HAVE ATTACHED READINGS AND OTHER MATERIAL NEEDED ALSO YOU HAVE ACCESS TO MY CHEGG!!!

1. Read chapter 8 in the Barnett et al. textbook.

Read chapter 9 in the Barnett et al. Text

2. Read Chapters 1 through 4 in the Weiss Book.

Read Chapters 5 through 12 and the afterword in the Weiss book.

3. Watch the video Domestic Abuse in Public (See the link on Moodle).

4. Read the Eisikovitz and Buchbinder Article: Pathways to Disenchantment: Battered Women’s Views of Their Social Workers

5. Review the DV Wheels

6 Watch the video on the Power and Control Wheel.

7. Review my short Powerpoint: “What SocialWorkers Need to Know about DV”.

8. WATCH AGAIN….. https://youtu.be/dtVHnZX8E50

9. WATCH….https://youtu.be/5OrAdC6ySiY

10. Watch the Tony Porter video on Youtube and comment on the video as a part of your weekly discussion board assignment.

11. Read The Letter to a Perpetrator and comment on the letter as a part of your weekly discussion board assignment.

12. Read Tutty, L. M., Bidgood, B.A., Rother, M.A., & Bidgood P. (2001).  An evaluation of men’s batterer treatment groups. Research on SocialWork Practice, 11(6), 645-670.

13. Read Buchbinder, E., Eisikovits, Z.(2008). Doing treatment: Batterers’ experience of intervention. Children and Youth Services Review, 30, 616-630.

WATCH AGAIN!!! https://youtu.be/td1PbsV6B80

http://www.grantwatkins.com/grantsstore/unpinned.html

You will perform the following actions by completing the “Population Health Data Brief Template” attachment: Complete the “Sociodemographic Profile” section in the “Population Health Data Brief Template” attachment

You will perform the following actions by completing the “Population Health Data Brief Template” attachment:

 

  1. Complete the “Sociodemographic Profile” section in the “Population Health Data Brief Template” attachment by doing the following:

 

Note:  If information is not available for any subsection, please provide an explanation.

 

  1. Complete the “Key Findings” subsection, including a screenshot of the county you are investigating.
  2. Complete the “Introductory Paragraph” subsection (suggested length of 1–2 paragraphs), identifying the source of the data and a summary of findings from the table in part A3.
  3. Complete the 20 population characteristics in the “Sociodemographic Profile Table” subsection for the selected county and the United States.

 

  1. Complete the “County Health Trends & Rankings” section in the “Population Health Data Brief Template” attachment by doing the following:
  2. Complete the “Introductory Paragraph” subsection (suggested length of 1–2 paragraphs), including why the data for the health trends in part B2 were collected and identifying the source of the data and the methods used to gather the data.
  3. Complete the “Discussion of Health Trends” subsection, including a discussion of the use of trend graphs for the seven major health trends selected in part B3.
  4. Complete the “Health Trends (Visual Graphs)” subsection, including one trend graph for each of the selected health trends.

 

Note:  Caption each visual graph in APA format.

 

  1. Complete the “Health Trends Discussion” subsection (suggested length of 1–2 paragraphs), including how each of the trend graphs tell a story about the health of the county and how the health aspect is improving, worsening, or remaining stable.

 

  1. Complete the “Health Factors” section in the “Population Health Data Brief Template” attachment by doing the following:
  2. Complete the 14 items in the “Health Factors Table” subsection for the selected county, the top U.S. performer, and the state.
  3. Complete the “Comparison of Data” subsection (suggested length of 1–2 paragraphs), including an analysis of background information on health rankings and the purpose of comparing county data to the top performers.

 

  1. Complete the “Summary” section in the attached “Population Health Data Brief Template” by doing the following:
  2. Complete the “Significant Finding(s)” subsection (suggested length of 1–2 paragraphs), including one main health trend from part B that has the potential to be redirected by an action plan to significantly improve community health outcomes in the county.
  3. Complete the “Action Plan(s)” subsection (suggested length of 1–2 sentences), including the initial steps needed for implementing an action plan to address the main health trend in part D1.
  4. Complete the “Services or Programs” subsection (suggested length of 1–2 sentences) with a discussion of the services or programs that may be introduced in the county to address the identified health trend(s) from part D2.
  5. Complete the “Raise Public Awareness and Promote Public Engagement” subsection (suggested length of 1–2 paragraphs), including a description of three ways that the advanced professional nurse should use technology to integrate informatics into practice.
  6. Complete the “Monitoring and Evaluating Action Plan” subsection (suggested length of 1–2 paragraphs), including a summary of how the elements of the proposed action plan from parts D2a and D2b will be monitored.

 

  1. Complete the “Data Sources & Methods” section in the attached “Population Health Data Brief Template,” including the sources you used to gather data for your data brief.

 

  1. Acknowledge sources, using APA-formatted in-text citations and references, for content that is quoted, paraphrased, or summarized.