Week 4 Assessment

In: Social Issues

Submitted By aguayoismael
Words 434
Pages 2
Week 4 Stating an Opinion on a Position
1. Only the good die young.
I would have to disagree with this saying. Why? Well because i believe that plenty of people who hold good morals and stay true to their good ways see a long life as well as I’ve very successful.

2.Its human Nature to be greedy.
I believe this is true, because in the early years of the human race, it has been said that the men of the tribes always wanted to be superior to other man, and in a sense have that feeling of being the alpha male.

3. We know ourselves more than other know us.
This is very true, in fact how can somebody with a completely different center on consciousness tell us how we feel or know us better than we know ourselves. Its impossible.

4. Black people are better athletes than white people.
This can go both ways, but in my opinion yes! i believe they are better athletes they seem to hold more passion for the sport they play, and to them if you’re not 1st you’re last which is always a good attitude to have when participating in a competitive sport.

5. An unborn fetus is a human being.
Absolutely! Anything with a heart beat inside another human being is considered a human being according to me.

6. Censorship is evil.
Yes! i believe we have the right to know whats going on in our world that we share. Its not fair that information is being kept from us, and when i say this I’m referring to what the news airs or what they chose not to air.

7. Winning isn’t everything, Its the only thing.
Coming from a family that was always competitive i have no choice but to agree with this statement. My father always told me that “when you almost win, theres a word for that, its called Loosing” So to me winning and coming 1st was the only option to me.

8.The oil companies manipulate gasoline prices.
This is false to me, i believe it is more a supply and demand that really impacts gas prices.…...

Similar Documents

Week 2 Lab #4 Assessment

...ISSC362: IT Security: Attack & Defense 14 Apr 2013 Lab #4 – Assessment Worksheet 1. Phase 1—Reconnaissance, Phase 2—Scanning, Phase 3—Gaining Access, Phase 4—Maintaining Access, Phase 5—Covering Tracks 2. Zenmap does an intense scan of all TCP ports in order to find open and vulnerable ports. 3. Phase 1 Reconnaissance 4. This is referred to by many names, but typically just called a vulnerability scan. Can be done with tools such as Nessus or Microsoft baseline security analyzer. 5. MS04-022: Microsoft Windows Task Scheduler Remote Overflow (841873), MS04-012: Cumulative Update for Microsoft RPC/DCOM (828741), MS03-043: Buffer Overrun in Messenger Service (828035), MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution (917159), MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution (921883), MS09-001: Microsoft Windows SMB Vulnerabilities Remote Code Execution (958687), MS03-039: Microsoft RPC Interface Buffer Overrun (824146), MS04-011: Security Update for Microsoft Windows (835732), MS04-007: ASN.1 Vulnerability Could Allow Code Execution (828028), MS05-027: Vulnerability in SMB Could Allow Remote Code Execution (896422), MS05-043: Vulnerability in Printer Spooler Service Could Allow Remote Code Execution (896423), MS03-026: Microsoft RPC Interface Buffer Overrun (823980), MS08-067: Microsoft Windows Server Service Crafted RPC Request Handling Remote Code Execution (958644), MS02-045: Microsoft Windows SMB Protocol......

Words: 343 - Pages: 2

Week 4 Assignment Product Assessment

...Running head: WEEK 4 ASSIGNMENT PRODUCT ASSESSMENT Week 4 Assignment Product Assessment Marketing 100 July 30, 2013 Introduction Many people enjoy listening to music nowadays for relaxation or to become more energetic. For whatever reasons a person enjoy music, it becomes an essential part of their lives. In a world where technology continues to grow the once popular music medium known as compact disc are now marked obsolete. Current Target Market In the last four years in a row, cd‘s sales have dropped nearly 20% mainly caused by digital downloads (Christman, 2013). The target markets for compact disc include all people –including different races and incomes. Teens, young adult and older people between the ages of 15-64 which makes up an estimated 61.3% of the population are the main factor for the target market (ACS Demographic and Housing Estimate, 2013). Only 15.9 percent of the U.S household population lives below the poverty level in 2010-2011 (Selected Population Profile in the United States, 2013). The demographic groups selected mean that half of the target market could afford to spend money on non-essential items. Compact Disc Declining in Popularity There are many factors that cause the lack of popularity of music compact disc like social, demographic, the ethnic market, economic, technology, and legal as well as the competitive market. Social factors are the product and the price a consumer will pay for a compact discs. Consumers are also......

Words: 1771 - Pages: 8

Knowledge Assessment 1-4

...Lesson 1 Overview of Active Directory Domain Services Knowledge Assessment Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. The Active Directory database is stored on each domain controller in a file called _____ntds.dit____. 2. The Active Directory __forest____ is considered the security boundary for an Active Directory environment. 3. To provide fault tolerance, Active Directory utilizes a _multimaster_ replication model. 4. To create a trust relationship with an NT4 domain, you will configure a(n) __external trust__. 5. The _ Domain_ naming context is replicated across the domain. 6. Each object in the schema must have a unique ___OID___. 7. A(n) __cross-forest trust__ provides a two-way transitive trust relationship between all domains within two forests. 8. Each domain in an Active Directory forest has a(n) ___two-way transitive___ trust relationship with every other domain in a forest. 9. ___Universal group caching___ allows a user at a remote site to be able to log into Active Directory without needing to contact a global catalog server. 10. Active Directory clients rely on ___SRV records___ in DNS to locate Active Directory resources such as domain controllers and global catalog servers. Multiple Choice Circle the correct choice. 1. Which of the following items is a valid leaf object in Active Directory? a. Domain b. User c. Application partition d. OU Except for a user object...

Words: 5416 - Pages: 22

Week 4 Assignment 2: Organizational Risk Appetite and Risk Assessment

...Week 4 Assignment 2: Organizational Risk Appetite and Risk Assessment Abstract This report will touch on what is needed to prepare in case of untimely disaster and what should be done when the worse has happen and you need to recover. We will take a look at what the business impact analysis look like and the company risk assessment for our company and look for risk that can be handled and risk the most be avoided and try to come up with a plans and policies for how to handle all future risks and problems. ”Business Impact Analysis (BIA) determines the importance of the organization’s activities by assessing the impact over time, if they are interrupted, and establishes continuity and recovery objectives”. (Engemann & Henderson, 2012) When looking to make a Business Impact Analysis we need to talk a look at all the resources of our company and what they do for the company. Then we figure what each piece need in the event of a crisis and how long and how much money it will take to get back on line so let take a look at the most valuable piece of equipment and work our way to the most expandable piece of equipment. The first and most important is the 3 file servers which is the central storage and the managing of data files to the company. These servers house not only private information on the company but also customer information. This means if they are damage or found missing work is loss and vital customer data is either gone or in a worse case stolen. ......

Words: 2047 - Pages: 9

Lab 4 Assessment Worksheet

...the computer owner's or user's knowledge or permission for the benefit of someone else. Malicious code – Malware short for "Malicious" software is designed to infiltrate or damage a computer system without the owner's informed consent. 2. How often should you update your anti-virus protection? Must be updated regularly to stay effective against new viruses, and most anti-virus software is designed to update automatically, but you can also update your software manually. 3. Why is it a best practice to have and to carry an antivirus boot-up disc or CD? So that there is not a chance of anti-virus program to have issues (with virus, malware, etc.). Installed on the workstation already there could be virus’s already in there. 4. What other anti-malicious software and anti-malicious code applications are included with Avira under the Real-Time Shields application? What risk and threats do these help mitigate? Real-Time Shield (with Avira) shields the possibility of the program to check data for viruses at the time as the data is written or read, Avira AntiVir Personal have this into the Guard. The Guard will observe the drives and check the data at the time as the data is written or read. Avira AntiVir Personal can’t directly check the content of Websites, but the downloaded data from the sites will be checked after download from the Guard. 5. In a corporate environment, should new AV definitions be installed as soon as they are available? The AV......

Words: 992 - Pages: 4

Week 2: Self-Assessment

...Week 2: Self-Assessment This document contains the template you will use to complete this assignment. Save the file by adding your last name to the filename (e.g. Week2_Self_Assessment_Template_Smith.docx). Be sure to proofread and spell check your work before you submit it. A grading rubric is also available at the end of this document. There are FOUR parts to the Self-Assessment. Part 1: Reflect on your results from the self-assessment exercises you’ve done from the textbook, as well as others you might have done in the past, and complete the table below. Review current or past jobs to identify your transferable skills. Develop an inventory of your most marketable career-related skills (minimum 15), instances where you have demonstrated these skills (minimum three), and the core values you want your work to reflect (minimum five). Take into consideration the traits employers are seeking, including technical and transferable skills and general abilities. (30 POINTS) SELF-ASSESSMENT EXERCISES & MY RESULTS I completed the following assessments/inventories as part of my self-assessment activities: 1.Ability Assessment 2.Transferable Skills Assessment 3.Marketing readiness quiz 4.Work environment and life preferences 5.Self Awareness 6.Personality Check My most marketable career-related skills are . . . (minimum 15) (Remember to include technical and transferable skills on this list!) 1.Analyze Data 2.Direct others 3.Do precision work 4.Lead people......

Words: 1007 - Pages: 5

Unit 4 Assessment

...Unit four: Principles of supporting change in a business environment Assessment You should use this file to complete your Assessment. • The first thing you need to do is save a copy of this document, either onto your computer or a disk • Then work through your Assessment, remembering to save your work regularly • When you’ve finished, print out a copy to keep for reference • Then, go to www.vision2learn.com and send your completed Assessment to your tutor via your My Study area – make sure it is clearly marked with your name, the course title and the Unit and Assessment number. Please note that this Assessment document has 3 pages and is made up of 3 Sections. Name: Ioannis Louizos Section 1 – Understand why change happens in a business environment 1. Explain why change happens in a business environment. You should include at least three reasons in your answer. Change happens in a business environment as a result of several factors which broadly can be broken down into 4 reasons: Political which is as a result of changes in laws, regulations, political upheaval such as wars or conflicts abroad, trade union disputes and legislation, for example the outlawing of certain chemicals in a manufacturing process. Economic such as the recent credit crunch, unemployment, inflation, interest rates, foreign exchange rates, reaction to changes in raw material or fuel and utility prices. Social such as changes in consumer behaviours and attitudes. Best...

Words: 1229 - Pages: 5

Lab 4 Assessment Questions

...1. Which US government agency acts as the legal enforcement entity for businesses and organizations involved in commerce? • Federal Trade Commission 2. Which US government agency acts as the legal enforcement entity regarding HIPAA compliance and HIPAA violations? • Office of Civil Rights: OCR 3. List three (3) similarities between GLBA and HIPAA. • They both protect customer’s information, they both require review of log and access reports, and they protect how the company shares the information. 4. List five (5) examples of privacy data elements for GLBA as defined in the privacy rule. • Credit, Consumer Loan, Money, Tax Returns, and Consumer Debts 5. List five (5) examples of privacy data elements for HIPPA as defined in the privacy rule. • Physical Health Condition, Mental Health Condition, Provision of health care, Payment, and Health plan 6. List three (3) differences between GLBA and HIPAA. • GLBA protects financial information, HIPAA protects medical information, and HIPAA rules and regulation are enforced by the OCR and GLBA by the FTC. 7. How does GLBA and HIPAA privacy rule translate into information systems security controls and countermeasures? • All financial and medical information must be kept confidential. 8. What three areas does the GLBA safeguard rule encompass? • Confidentiality, integrity and availability. 9. What is ePHI? • Electronic Protected Health Information. 10. What three areas does the HIPAA security......

Words: 404 - Pages: 2

Lab #4 – Assessment Worksheet

...Lab #4 – Assessment Worksheet Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation IS4650 Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you performed all five phases of ethical hacking: reconnaissance (using Zenmap GUI for Nmap), scanning (using OpenVAS), enumeration (exploring the vulnerabilities identified by OpenVAS), compromise (attack and exploit the known vulnerabilities) using the Metasploit Framework application), and conducted post-attack activities by recommending specific countermeasures for remediating the vulnerabilities and eliminating the possible exploits. Lab Assessment Questions & Answers 1. What are the five steps of ethical hacking? reconnaissance, scanning,enumeration, compromise, post-attack activities: recommended countermeasures for remediation. 2. During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those ports? There were several Ports, I will list onl a few POrts, 21,3306,22,53,445,111,25, all running TCP: the services running were Linux telneted, smtp Postfix, Apache Tomcat/Coyote JSP 3. What step in the hacking attack process uses......

Words: 285 - Pages: 2

Spe 578 Week 4 Spe578 Week 4

...com/q/spe-578-complete-course-spe578-complete-course/13544 SPE 578 WEEK 1 INDIVIDUAL ASSIGNMENT REFLECTION PAPER Reflect on a prior instructor-led learning experience in which you were the student. You may choose a training course or a classroom course. Consider this learning experience in the context of this week's assigned readings. Write a 500- to 750-word reflection paper on your experience. Address the following questions in the paper: * What was the instructor's purpose? * What process or model do you think the instructor followed when planning the learning experience? * How well did the learning experience meet your needs? * In Methods for Effective Teaching, you were introduced to the linear-rational and backward design methods. If you had been the instructor, which of these models would you have used to design your learning experience? Why? * What was the role of standards in this teaching experience? * If you had been the instructor, what activities might you have planned to meet the needs of the students with exceptionalities? Click the Assignment Files tab to submit your assignment. SPE 578 WEEK 1 LEARNING TEAM ACTIVITIES AND PREPARATION Locate and share two lesson plans of your own or from the Internet or a published source. Generate a list of important components of an effective lesson plan. Participate in a learning team discussion about what you believe are the important components of an effective lesson plan. Submit your team list. SPE 578......

Words: 1888 - Pages: 8

Spe 578 Week 4 Spe578 Week 4

...com/q/spe-578-complete-course-spe578-complete-course/13544 SPE 578 WEEK 1 INDIVIDUAL ASSIGNMENT REFLECTION PAPER Reflect on a prior instructor-led learning experience in which you were the student. You may choose a training course or a classroom course. Consider this learning experience in the context of this week's assigned readings. Write a 500- to 750-word reflection paper on your experience. Address the following questions in the paper: * What was the instructor's purpose? * What process or model do you think the instructor followed when planning the learning experience? * How well did the learning experience meet your needs? * In Methods for Effective Teaching, you were introduced to the linear-rational and backward design methods. If you had been the instructor, which of these models would you have used to design your learning experience? Why? * What was the role of standards in this teaching experience? * If you had been the instructor, what activities might you have planned to meet the needs of the students with exceptionalities? Click the Assignment Files tab to submit your assignment. SPE 578 WEEK 1 LEARNING TEAM ACTIVITIES AND PREPARATION Locate and share two lesson plans of your own or from the Internet or a published source. Generate a list of important components of an effective lesson plan. Participate in a learning team discussion about what you believe are the important components of an effective lesson plan. Submit your team list. SPE 578......

Words: 1888 - Pages: 8

Assessment 4

...Assessment Worksheet Applying OWASP to a Web Security Assessment Web Security Management COM-545 Course Name and Number: _____________________________________________________ Plinio Alves Student Name: ________________________________________________________________ Manh Nguyen Instructor Name: ______________________________________________________________ 10/30/15 Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the Open Web Application Security Project (OWASP) Web site and reviewed its Web application test methodology. You studied the standards and guides published by this project and summarized your findings. Finally, you drafted a Web Application Test Plan based on the information you gained in your OWASP research. Lab Assessment Questions & Answers 1. Identify the four recognized business functions and each security practice of OpenSAMM. The four business function are governance, construction, verification and deployment. 2. Identify and describe the four maturity levels for security practices in SAMM. Phase I: Awareness & Planning Phase II: Education & Testing Phase III: Architecture & Infrastructure Phase IV: Governance & Operational Security 3. What are some activities an organization could perform for the security practice of Threat Assessment? Starting with simple threat models and building to more detailed methods of threat analysis and weighting, an organization......

Words: 586 - Pages: 3

Assessment 4

... |Individual Assessments|Assessment 1 |S ( NS ( |Final Result |C ( | | |result | | | | | | | |Assessment 2 |S ( NS ( | | | | | |Assessment 3 |S ( NS ( | |NC ( | |Assessor | |Date | | |Signature | | | | |Feedback to Student | | | |I have received the Assessment Feedback on ____________________________(Date) | |Students Signature | | |Assessor Signature | |Date | | Assessment 1: Project : ......

Words: 3292 - Pages: 14

Qnt 561 Week 4 Weekly Learning Assessments - Assignment

...QNT 561 Week 4 Weekly Learning Assessments - Assignment Chapter 10 Exercise 2 [The following information applies to the questions displayed below.] A sample of 36 observations is selected from a normal population. The sample mean is 12, and the population standard deviation is 3. Conduct the following test of hypothesis using the 0.01 significance level H0: μ ≤ 10 H1: μ > 10 1. Award: 10 out of 10.00 points a. Is this a one- or two-tailed test? b. What is the decision rule? c. What is the value of the test statistic? d. What is your decision regarding H0? e. What is the p-value? Chapter 10 Exercise 10 Given the following hypotheses: H0 : μ = 400 H1 : μ ≠ 400 A random sample of 12 observations is selected from a normal population. The sample mean was 407 and the sample standard deviation 6. Using the .01 significance level: a. State the decision rule. (Negative amount should be indicated by a minus sign. Round your answers to 3 decimal places.) b. Compute the value of the test statistic. (Round your answer to 3 decimal places.) c. What is your decision regarding the null hypothesis? To download QNT 561 Week 2 Complete Answers click here QNT 561 Week 2 Weekly Learning Assessments Chapter 10 Exercise 12 The management of White Industries is considering a new method of assembling its golf cart. The present method requires 42.3 minutes, on the average, to assemble a cart. The mean assembly time for a random sample of 24 carts, using the new method,...

Words: 1953 - Pages: 8

Ese 691 Week 4 Assignment Functional Behavior Assessment

...ESE 691 Week 4 Assignment Functional Behavior Assessment To Buy This material Click below link http://www.uoptutors.com/ese-691-ash/ese-691-week-4-assignment-functional-behavior-assessment Every behavior is exhibited either to gain or avoid something. When learning to modify a target behavior, the first step is to find out what is the function of the behavior (gaining or avoiding), and then identify its purpose. Read Chapter 8, Formal Behavior Assessment, and Chapter 9, Functional Behavior Assessment, in your textbook. Then, read the articles, “Functional Behavior Assessment (FBA),” and “Functional Behavioral Assessment: Conducting a Functional Behavioral Assessment (FBA).” Complete the STAR legacy module, Functional Behavioral Assessment: Identifying the Reasons for Problem Behavior and Developing a Behavior Plan, beginning with the “Challenge” section and following the self-guided tutorial. Complete the seven “Assessment” questions at the conclusion of the module. Each of your answers should be at least half a page in length, double spaced. Include additional outside sources and personal experiences to support your answer (with the exception of questions 3 and 6). Your paper should be four to six pages in length, excluding the title page and reference page, and written in APA format, as outlined in the Ashford Writing Center. The assessment questions can also be found below: Give a school-based example of two of the following: positive reinforcement, negative......

Words: 447 - Pages: 2