Create a thesis and an outline on Security and Cyber-Attack of a Bitcoin. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required.

I need help creating a thesis and an outline on Security and Cyber-Attack of a Bitcoin. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required.

One can use a Bitcoin to transact online or buy things like manicures, pizza or web-hosting.Bitcoins became famous after its introduction in 2009 because of its features. For example, as mentioned earlier, transactions using Bitcoin can be done anonymously. Additionally, Bitcoin is used online meaning that the transaction can be conducted in any part of the world. Because of such features tied to Bitcoin, transactions can be done without any regulation from the government. In addition, Bitcoin cannot be charged like normal currencies.

However, the use of bitchin led to huge criticisms from interest groups and some countries.Altshuler et al. (198) point out that Bitcoin attracted many users right after it was introduced in 2009. The study shows that a Bitcoin was going for $30. It attracted much attention in the market and media far more than any other currencies. However, the use came under criticism from interest groups and politicians. The critics argued that the use of Bitcoin encouraged money laundering. The senators from the U.S. and the interest groups from Germany such as the Federal Association of Digital Economy pointed out that Bitcoin is not good.

They argued that because of the anonymity features of bitchin and its use, the currency attracted illegal transactions and money laundering. They also pointed out that the use of Bitcoin will not be good for society because users will evade taxes. The study reveals that bitcoin is decentralized in nature making it a bit hard to regulate.However, some users argue that the anonymity nature of a bitcoin is not the main objective behind its application. Other people have different views. One member behind the development of Bitcoin, Jeff Garzik explains that there are no statistics relating to the illegal transaction using bitcoin.

There seems to be huge disagreement relating to anonymity despite claims that anonymity has nothing do to with its use.&nbsp.Other users believe that anonymity is the main idea for use of Bitcoin. For example, WikiLeaks, an organization renowned for releasing government and people secretes accepts Bitcoin.

prepare and submit a paper on still thinking.

Your assignment is to prepare and submit a paper on still thinking.

teraction within society was changed as a result of not having access to these technological devices, the means whereby her communications models were altered, and the ways in which her free time and personal habits were altered as well. Moreover, by performing such an analysis onto the ways in which technology and the lack thereof impacts upon the ways in which an individual integrates within society, it is the hope of this student that a further level of inference can be drawn with regards to technology’s role within society and the means whereby each and every one of us to one degree or another integrate with it.

Firstly, with respect to the way in which the brief moratorium on technology impacted upon her degree of interaction within society, it was quickly observable that she was more willing and able to meet and speak with strangers than she would have been on any other normal day. Rather than reclosing into the information of her phone or laptop, she was open to the world and actively seeking a form of stimuli to replace that which had been lost. It is worth noting that from the observation that this student engaged upon, it seemed to be that the level of interaction and the level of interpersonal communications were integrally linked.

As such, the proceeding section of the analysis will seek to draw a level of inference based upon the lack of technological stimuli into the way in which interpersonal communications were also changed.

It was further noted that as a result of the lack of stimuli from the technological tools that my friend had become so very dependent upon, there seemed to be a noticeable growth in the level to which meaningful and undivided levels of communication could be engaged upon. This was evidenced not only with this observer but also with other individuals with whom she interacted.

Potasium. The work is to be 2 pages with three to five sources, with in-text citations and a reference page.

I will pay for the following article Potasium. The work is to be 2 pages with three to five sources, with in-text citations and a reference page.

POTASSIUM Potassium Potassium element plays a pivotal role in the body and plant systems. According to Roza, (2007), Humphrey Davy discovered the element 1807. He managed to isolate this element through electrolysis method making it the pioneer the use of this approach in isolation of other elements (Shaposhnik, 2007). To date, the element is acquired through electrolysis of hydroxide or chloride because it is not found freely in nature (Roza, 2007). It was until the eighteenth century that Potassium and sodium were distinguished.

Potassium is an essential dietary mineral. Regulation of potassium levels inside and outside of cells affect normal bodily functions. Potassium is a chemical element represented by the symbol K and atomic number 19. Elemental potassium is a silvery-white metal, oxidizes quickly in the air, and reacts with water (Shaposhnik, 2007). During reaction with water, hydrogen is emitted and the heat generated is sufficient to ignite the hydrogen and burns with a lilac flame (Woodford, 2002). Potassium and Lithium are the least dense known metals.

Interestingly the composition of the element makes up about 1.5% the earth crust’s weight. It is one of the most common mineral elements though it is rarely found naturally. It is found in crystalline form as feldspars or micas (Woodford, 2002).Roza (2007) ascribed that people used plant ash to make soap. Later on scientists discovered that plant ash is composed of potassium (Roza, 2007). The main applications of potash were the production of glass, soap, bleach, and gunpowder as potassium nitrate.

The discovery of potassium chloride mineral deposits in Germany led to the mass production of potassium-containing fertilizers.The humans require this element for proper functioning of the system. There are events that leads to abnormal functioning that relates to deficiency of the element for instance consumption of coffee, alcohol, severe stressing of the body, excess strenuous physical and using potassium-wasting diuretics deprives the system of this element leading to hypokalemia (Roza, 2007. Woodford, 2002).

Potassium deficiency leads to muscle weakness, severe fatigue, cardiac arrest, nervous disorders and poor reflexes can occur. Other conditions that influence the risk of hypokalemia include severe vomiting or diarrhea, abuse of laxatives, anorexia or bulimia, Magnesium deficiency and congestive heart failure. Excess potassium in the body could lead to dehydration. The kidneys regulate the concentration of potassium in the body (Roza, 2007. Woodford, 2002). Potassium is the most absorbed mineral element by plants than other mineral elements and is essential for growth and metabolic processes (Woodford, 2002).

Potassium and sodium work together for several purposes. The combination aids in the regulation of body waste, control heart rhythms, and blood pressure (Roza, 2007. Woodford, 2002). It also sends oxygen to the brain thus clear thinking. Being an electrolyte, it regulates the balance of fluids in cells, including blood.It helps the plants in the growth of vegetation. It regulates and maintains the body system. Therefore, having adequate quantities of potassium helps the system performs its functions accordingly.

It must be regulated, excessive or deficiency could be hazardous to health.In conclusion, potassium is a vital element for both animal and plants because it plays essential regulatory function. Deficiency of this element can lead to problems that would be costly to manage. Its discovery was a breakthrough not only for the medical and industrial application but also for subsequent studies that aims to improve living condition.Table showing the properties of potassium elementPhysical properties of the elementColourMetal with silvery and white colour (Roza, 2007. Woodford, 2002)M.

P (melting point)Very low levels of about 145oF or 63oC (Roza, 2007. Woodford, 2002)Phase Solid in natural stateDensity Its less dense compared with waterChemical properties of the elementCompounds K2CO3, KCN, KBrReaction with waterViolent reaction that liberates hydrogen gas (Roza, 2007. Woodford, 2002)Chemical formulaeKOxidation Oxidises rapidly when exposed in airReactivity The element easily reacts explosively with non metals (S, Cl, F, P, N) and acids (Roza, 2007. Woodford, 2002)Storage Stored under oil to prevent rapid oxidation when in contact with air (Roza, 2007. Woodford, 2002)ReferencesRoza G. (2007) Potassium: Understanding the elements of the periodic table.

New York: The Rosen Publishing Group.Shaposhnik, V. A. (2007). History of the discovery of potassium and sodium (on the 200th anniversary of the discovery of potassium and sodium).&nbsp.Journal of Analytical Chemistry&nbsp.62&nbsp.(11): 1100–2.&nbsp.doi:10.1134/S1061934807110160.Woodford C. (2002) Potassium: Elements.

prepare and submit a term paper on Comparison of Cyclone Nargis and Cyclone Sidr. Your paper should be a minimum of 1250 words in length

You will prepare and submit a term paper on Comparison of Cyclone Nargis and Cyclone Sidr. Your paper should be a minimum of 1250 words in length. Natural Disasters result from naturally occurring events that affect human lives and the wider environment. Throughout the world natural disasters usually occur in the form of earthquakes, fires, floods, tsunamis, tornados, volcanoes and hurricanes. Hurricanes, referred to as cyclones if they originate around the Indian and South Western Pacific Oceans are yearly occurrences. Cyclones are associated with strong winds that can cause damage to buildings and trees resulting in loss of life and property. Heavy and continuous rain can also lead to floods and submergence of low lying areas.

The Burmese government’s response to the disaster was very slow and ineffective. Immediately after the storm, the military government was refusing international aid even when it was obvious that they lacked enough facilities to deal with the disaster. The government was also accused of withholding information from the citizens and failure to warn them of the approaching storm. ABC News quoted then First Lady Bush as stating that, “Burma’s state-run media failed to issue a timely warning to citizens in the storm’s path.” They were also criticized by other world leaders as well as spokespersons from donor agencies that cited their slow emergency response as exhibiting little or no regard for human lives. It has also been reported that meteorologists in India that they informed Burma of the approaching cyclone and gave the specific location of the landfall (CRS Report, May 15). Many blamed the government’s response on the country’s political situation. The military junta did not have normal relations with many international communities. The Bangladeshi’s response to Cyclone Sidr on the other hand helped to reduce the humanitarian impact of the disaster. Owing to past experiences it would seem that the government was adequately prepared and responded as early as possible. Approximately 3.2 million people were evacuated and there was stockpiling of relief and other basic items.&nbsp.

write an article on child development in practice Paper must be at least 4000 words.

Hi, I am looking for someone to write an article on child development in practice Paper must be at least 4000 words. Please, no plagiarized work!

Maksim is able to find hidden objects even if the hiding place is changed, in accordance with the information processing theory which states that children improve their cognitive abilities such as memory as they grow older (Feldman 225). At 15 months, Maksim is dropping objects into the water at certain depths and observing how they float back up, just as explained in the Piagetian theory in terms of attaining object permanence.2. Analyze your baby’s temperament in more detail at 19 months than you did at 8 months.

How would you describe your baby in terms of the five aspects of temperament utilized by the Virtual Child program (activity, sociability, emotionality, aggressiveness vs. cooperativeness, and self-control)? Has your child’s temperament been stable over the first 18 months? A blurb defining and providing examples of the five aspects of temperament is provided at 12 months, but you should seek out further explanations of temperament from your textbook. Explain how the concept of goodness of fit (also discussed in the blurb on infant temperament) applies to your interactions with your child.

From 8 months, Maksim would readily accept to be held by strangers and by 19 months old he was very social, as exhibited in his interaction with a specialist where he made good eye contact. In terms of activity, Maksim is able to model the specialist’s block tower, solve picture puzzles, and color within lines. Although Maksim does not exhibit much aggression except when another child tried snatching his toys away from him, he is a bit emotional and becomes irritable and impatient when things do not go his way during the play session.

Generally, Maksim is an easy baby in terms of temperament as he has a generally positive attitude, is always curious, and has moderate emotions (Feldman 186). As such, in response to the goodness-of-fit approach, we as the parents need to try and engage Maksim in interesting activities for longer in order to prepare him for pre-school&nbsp.activities.&nbsp.

Create a 5 pages page paper that discusses eyewitness to a genocide: the united nations and rwanda.

Create a 5 pages page paper that discusses eyewitness to a genocide: the united nations and rwanda.

Hutu leaders come to believe that Hutu rescue required Tutsi annihilation. The Hutus ratified their plots with shocking efficiency. In just one hundred days they killed approximately eight hundred thousand persons. The Rwandan mass murder, therefore, has the ghoulish oddity of more than the rate of massacre attained during this genocide. And the persons behind the Rwandan genocide employed mainly low-tech and physically demanding instruments of death that necessitated an understanding of their fatalities.

The genocide was implemented with viciousness and hostility that defy the mind’s eye.Almost as incomprehensible is the response of the global community. What sets the Rwandan crisis aside from other crisis is that the global community could have mediated at a fairly low cost prior to the results were entirely realized. A crisis conference commanded states to react. There were twenty-five hundred U.N. peacekeeping troops on the land, and certainly, later on, the slaughter started, the U.N.’s commandant, Canadian Gen.

Romeo Dallaire1, satisfied with all mod cons troop to prevent the slaughter. Yet the U.N. at once arranged its army not to save nationals from harm. And on April 21, it ordered that but 270 troops are withdrawn (Dallaire 2004, pg. 231).In the background of it, the U.N. basically overlooked both the smaller carnages held in the period of 1990-1993 and the arrangements for this unforgivable genocide. It cracked down instead on creating an end to the war between the Rwandan government and the Rwandan Patriotic Front (RPF), an objective indeed achieved in August 1993 with the signing of the Arusha Accords2.

An asset in the accord, the U.N. provided a conscientious objector force3 (UNAMIR) to ease the transition to a designated government and to supervise the integration of the Rwandan Militia with the RPF military. But the U.N. sought a shameful victory and remained unsuccessful to provide either the command required or the military services needed to make sure a timely and systematic transition.

Writing assignment on the idea of a university by roger scruton

I need some assistance with these assignment. the idea of a university by roger scruton Thank you in advance for the help! Scruton’s purpose, in this article, is to impress upon the readers that Newman’s ideas implied the creation of ideal gentlemen for the society in universities. however, the current educational institutions are far way away from producing ideal gentlemen. That is why. it is essential to create new universities that can implement Newman’s ideas, not necessarily in the physical space. Scruton through didactic tone conveys his readers the idea that existing institutions fail to manage transition from adolescence to adulthood (“The Idea of a University” par. 9): that is why. we need to find a better way where it is worth spending family savings on a four-year course (“The Idea of a University” par. 5).

Scarton in “The idea of a university” uses definition, cause/effect, and problem/solution as rhetorical modes of writing. He uses Newman’s concept to define the idea of his proposed university as cause and effect to validate his claim, and problem and solution to identify issues and provide the outcome. The structure of the essay is more like a presentation of a judicial case to the juries. in this case, the juries are readers. Scruton develops his arguments using the claim of value, claim of the cause, claim of definition and claim of policy. The claim of value, in this case, Newman’s concept of the idea of the university (logos). The claims of cause and definition describe why the current educational institutions fail to produce Newman’s ideal gentlemen (pathos). The claim of policy suggests building universities in the cyberspace and implementation of Cardinal John Henry Newman’s ideas in these universities (ethos).

All through the essay, Scruton’s uses deductive tone. He opens his claim by informing the readers who Newman was and how he envisioned the principal function of a University, “For Newman, a university does not exist simply to convey information or expertise. The University is a society in which the student absorbs the graces and accomplishments of a higher form of life.

write an article on The Influence of Colour and Design on Aggressive Behaviour in Customers. It needs to be at least 2250 words.

Hello, I am looking for someone to write an article on The Influence of Colour and Design on Aggressive Behaviour in Customers. It needs to be at least 2250 words.

This study will&nbsp.consider the other alternatives in design for providing a more conducive environment for customers in pubs and cafes.Conflict in bars and pubs is a common occurrence in the UK as well as in other parts of the world. Obviously, the main reason is that alcohol removes inhibition and enhances people’s tendency to react freely to situations. No matter how thoughtful and well planned the design is, one cannot hope to completely eradicate aggression in the setting of a bar or pub.

On the other hand, one cannot simply ignore the “influence” of the design of a pub or bar on the “mood and behavior of people who spend time in it” (Conflict & Violence in Pubs: Design Issues, 1992 p.3). This is because various elements in the environment in which humans function are known to exercise a high level of influence on their behavior and determine how they respond to given situations. The design, light, color or flow patterns of bars and pubs, when coupled with other factors such as drunkenness and noise pollution, can increase the stress levels of patrons and create flashpoints for instigating aggression.

Research evidence suggests that the design, interior and “overly energetic décor – complexity and color schemes” are causing “between 15 and 20% of all aggression” in bars and pubs (Conflict & Violence in Pubs: Design Issues, 1992 p.3). Therefore, these factors need to be taken into consideration when the designs of bars and pubs are planned and decided. Thus, apart from an appropriate shape and direction of the building and suitable design, it is significant to choose a sober color scheme to facilitate a more congenial setting in pubs to reduce the stress levels of drunken customers and to encourage them to conduct peacefully.

In the present day, “client-initiated violence” is on the increase, which is identified as a major issue in “retail trade” including bars and pubs.

Write 2 pages thesis on the topic social class in the us. Sawhill, Isabel (2006) in a Policy Brief stated that while the US economy performed well, most of the benefits of such success were reaped by those at half top of the income distribution strata, especially those at the top one percent (or those with an income of more than about $400,000 in 2006).

Write 2 pages thesis on the topic social class in the us. Sawhill, Isabel (2006) in a Policy Brief stated that while the US economy performed well, most of the benefits of such success were reaped by those at half top of the income distribution strata, especially those at the top one percent (or those with an income of more than about $400,000 in 2006).

In the same Policy Brief, Sawhill confirms that indeed, the class still matters in the American

Society, stressing that it takes at least five generations to totally free one from circumstances of birth or family background. Sawhill adds that as the gap widens among the income levels or groups, it has become harder for people to move up, as the topmost of the ladder becomes more and more solid and strong, accumulating more and more wealth.

Immigrants, illegal or otherwise, represent cheap, reliable labor for American businesses. The documented and legal immigrants mostly have no education or reached only high school level, which makes it harder for them to land on high-paying jobs. Even their children tend to not continue to go to school but instead engage in jobs to augment their families’ incomes.

Education, they say, is the great leveler. However, the US does not provide equal access to quality education to its people. The majority of the immigrants’ kids go to public schools which are below par the other schools across the nation. Even the funding for Bilingual Education has been debated upon, most probably towards its abolition.

It is therefore no wonder that recent trends had been that these immigrants are going back to their homes, primarily to seek better opportunities at their homelands, and secondly to be near their loved ones back home. The US may be a land of opportunity to some, but definitely not for everyone. It is not really a matter of the hardworking, persistent winning the race. It is still a matter of who one’s parents were, where one went to school, how much power does one hold, among other factors that really matter in order to live the American Dream.

This lab has been tested in Oracle 10g express.  You may copy and paste directly from this file. Note that if you need to edit this file, it is better to do so in NOTEPAD (copy & paste it to notepad),  word sometimes puts in characters that Oracle will not recognize it.  Also, note that as you copy & paste the stored procedures and triggers, you may need to copy & paste everything except for the slash and then paste the slash. Your job is to create an audit table in MS-SQL Server.

Lab # 7  part 2 – DATABASE AUDITING (lab)

This lab has been tested in Oracle 10g express.  You may copy and paste directly from this file. Note that if you need to edit this file, it is better to do so in NOTEPAD (copy & paste it to notepad),  word sometimes puts in characters that Oracle will not recognize it.  Also, note that as you copy & paste the stored procedures and triggers, you may need to copy & paste everything except for the slash and then paste the slash. Your job is to create an audit table in MS-SQL Server. Then create a trigger that puts data into the table. Then issue the command that will activate the trigger. You can translate some of the triggers in this assignment, copy and paste triggers from the web-site or create your own trigger. Regardless, your deliverable should be: a small text in English explaining what the trigger is doing and why is it useful, the Audit table, the Trigger, the command that execute the trigger.

Part  0 – only if you are doing it on a newly installed version

— Open an SQL window. Create a user & grant the user dba privileges. Example:

CREATE  USER  cit540 IDENTIFIED BY  c;

GRANT  DBA   TO  cit540;  — In SQL Server, you grant all privileges to this user through login/security

— Create another user and grant this user create session privileges. Example:

CREATE  USER   smith  IDENTIFIED  BY  s;

GRANT    CREATE  SESSION   TO  smith;

Part  1 – audit login and logout

— Login as the user CIT540 with dba privileges

CONNECT  cit540/c;

— Create a table to keep track of user login and logoff

CREATE TABLE  login_logoff

(

      USERID ​VARCHAR2(30),

      SESSIONIDNUMBER(8),

      HOSTVARCHAR2(30),

      LOGIN_DAYDATE,

      LOGIN_TIME            VARCHAR2(10),

      LOGOUT_DAYDATE,

     LOGOUT_TIME         VARCHAR2(10)

);

/

— Create a trigger that will insert a row in the login_logoff table every time user logs in

CREATE OR REPLACE TRIGGER

     audit_login

AFTER  LOGON  ON  DATABASE

BEGIN

INSERT  INTO  login_logoff  values (

         USER,

         sys_context (‘USERENV’,’SESSIONID’),          

​  sys_context (‘USERENV’,’HOST’),

                          sysdate,

                          to_char(sysdate, ‘hh24:mi:ss’),

                          null,

                          null  );

                 COMMIT;

                 END;          

/

— Create a trigger that will insert data in a row in the login_logoff table every time user logs out

CREATE OR REPLACE TRIGGER

    audit_logoff

BEFORE  LOGOFF ON DATABASE

BEGIN

  UPDATE  login_logoff

  SET

    logout_day = sysdate, logout_time=to_char(sysdate,’hh24:mi:ss’)

WHERE

  sys_context(‘USERENV’,’SESSIONID’)=sessionid;

END;

/

–Do not close your  SQL session. Open another SQL window and login as the user that does — not have dba privilege.

connect  smith/s;

— leave the SQL session

Exit;

— connect as administrator (in this example, cit540

Connect  cit540/c;

— From the user CIT540 session that does have DBA privileges, verify the login

SELECT USERID, SESSIONID, HOST, LOGIN_DAY, LOGIN_TIME FROM LOGIN_LOGOFF;

Display. Your results.  Howe many rows did you see ?

You should see something like (but with CIT540 and Smith) :

Logout and type in:

SELECT  *  FROM  LOGIN_LOGOFF;

—————————————–

Creating Audit table and Audit Trigger

You will copy and paste everything that is in green. Deliverable: Screenshots of query with results.

1) get current date and current user

select  getDate();

select  suser_sname();

2) Create an audit table

CREATE TABLE UpdateProductAudit (date_updated  date,  who  varchar(50));

3) Create a trigger that inserts a row into the AuditProductChanges every time the Products table is updated

create trigger AuditProductChanges on Products

after update

as

begin

insert into dbo.UpdateProductAudit values(getDate(), suser_sname());

end

go

4) udate the Products table

UPDATE Products set quantity = quantity * 1.1;

5) view the update in the audit table

SELECT * from dbo.UdateProductAudit;

6) Do the exercises in the link below. Your professor will discuss the link in class.

https://www.mssqltips.com/sqlservertip/4055/create-a-simple-sql-server-trigger-to-build-an-audit-trail/

Submit the screenshots of the results. Create the table inside your own database. Alter each table name and trigger name to have your initials.  Consequently , you also need to order each reference to the table to have your initials also.

7) Go to https://docs.microsoft.com/en-us/sql/relational-databases/security/auditing/create-a-server-audit-and-database-audit-specification?view=sql-server-2017

And create a server audit specification (either in SSMS or SQL)