computer architecture Embedded systems

For each of the following examples, determine whether this is an embedded system, explaining why or why not. 

Question 1 

Are programs that understand physics and/or hardware embedded? For example, one that uses finite-element methods to predict fluid flow over airplane wings? 

Question 2

Is the internal microprocessor controlling a disk drive an example of an embedded system?

 Question 3

Is an I/O drivers control hardware, so does the presence of an I/O driver imply that the computer executing the driver is embedded? 

Question 4

Is a PDA (Personal Digital Assistant) an embedded system?  

Question 5

Is the microprocessor controlling a cell phone an embedded system?  

Question 6

Is the computer controlling a pacemaker in a person’s chest an embedded computer?  

Question 7

List and briefly define the possible states that define an instruction execution.  

Question 8

List and briefly define two approaches to dealing with multiple interrupts.  

Question 9

Consider two microprocessors having 8- and 16-bit-wide external data buses, respectively. The two processors are identical otherwise and their bus cycles take just as long.  (a) Suppose all instructions and operands are two bytes long. By what factor do the maximum data transfer rates differ?  (b) Repeat assuming that half of the operands and instructions are one byte long.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Question 4

Q1 Using the five paragraph format, discuss US life expectancy gap visualization.  This paper should be single spaced. It should have a meaningful title. It must include 3 quotes from the text or from expert sites found in the library’s research databases or from the text. They should be cited properly in APA format. 

  

Q2 According to Healy, ‘Putting categorical variables on the y-axis to compare their distributions is a very useful trick’. Using the five paragraph format, explain what he means. This paper should be single spaced. It should have a meaningful title. It must include 3 quotes from the text or from expert sites found in the library’s research databases or from the text. They should be cited properly in APA format.

Q3 https://www.youtube.com/watch?v=hVimVzgtD6w&t=522s View this video from Hans Rosling. Using the five paragraph format, discuss what you learned from the video. This paper should be single spaced. It should have a meaningful title. It must include 3 quotes from expert sites found in the library’s research databases or from the text. They should be cited properly in APA format.

Q4 Using the five paragraph format, write a proposal for a visualization project that you will submit for your master’s thesis. This paper should be single spaced. It should have a meaningful title. It must include 3 quotes from the text or from expert sites found in the library’s research databases or from the text. They should be cited properly in APA format. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT 640 Milestone One Guidelines and Rubric Overview

Within an organization, the dependability of network infrastructures has become top priority. The fundamentals of how this infrastructure works within the organization requires a systems thinking mindset and the ability to properly develop an analysis plan. You have been tasked with analyzing the current network architecture of the organization and determining any key changes that should occur as the organization prepares for future growth. You will evaluate traffic patterns to determine critical aspects of your business and provide basic insight into what should be done to the network from a capability aspect and from a security viewpoint as the organization prepares for future growth. Ultimately, you will recommend a design for the future network architecture of the organization.

Prompt

For this milestone, you will create a project analysis plan. Your plan will identify the network applications of the current network including a description of how the current network is designed by explaining how the different layers of the Open Systems Interconnection (OSI) model relate to each other within the network.

Refer to the following files when completing this milestone:

To complete this assignment, address the following critical elements:

  • Identify the network applications that are a part of the current network.
  • Identify and label the components of the network with the appropriate OSI network layer(s) (refer to the Organizational Network Diagram – Current file)
  • Provide a nontechnical description of the role and functions of key components, including routers, switches, and firewalls.
  • Provide a brief analysis of the current network configuration in terms of day-to-day business operations. Consider the following questions as a guide to your analysis:
    • What is the impact of losing connectivity between the Dallas router and the Memphis router? Which applications might be impacted between locations?
    • What is the risk of just having a single router or switch within the Memphis office?
    • How effective is the firewall in the current network?
  • Summarize the project requirements and deliverables

What to Submit

Your assignment should be 1 to 2 pages in length with double spacing and should conform to academic writing standard expectations for mechanics, content organization, and use of APA style.

See attached additional resources.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Embedded Systems jan 22

Homework Content

For each of the following examples, determine whether this is an embedded system, explaining why or why not. 

Question 1 Are programs that understand physics and/or hardware embedded? For example, one that uses finite-element methods to predict fluid flow over airplane wings?

 
Question 2 Is the internal microprocessor controlling a disk drive an example of an embedded system? 

Question 3  Is an I/O drivers control hardware, so does the presence of an I/O driver imply that the computer executing the driver is embedded?

 
Question 4 Is a PDA (Personal Digital Assistant) an embedded system? 

Question 5 Is the microprocessor controlling a cell phone an embedded system? 

Question 6 Is the computer controlling a pacemaker in a person’s chest an embedded computer? 

Question 7 List and briefly define the possible states that define an instruction execution. 

Question 8 List and briefly define two approaches to dealing with multiple interrupts.

 
Question 9

Consider two microprocessors having 8- and 16-bit-wide external data buses, respectively. The two processors are identical otherwise and their bus cycles take just as long. 

(a) Suppose all instructions and operands are two bytes long. By what factor do the maximum data transfer rates differ? 

(b) Repeat assuming that half of the operands and instructions are one byte long. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

5Rspn

  

RESPOND TO THESE DISCUSSION POST BASED ON THE TOPIC “Incident response is an important component in a security awareness program. While not all incidents can be prevented, incident response capabilities can promptly detect and reduce the losses resulting from security attacks.
 

In September 2014, Home Depot stated that over 56 million credit cards had been compromised in a five-month cyber-attack on their payment systems. This attack simply highlighted the vulnerability of the U.S. retail store’s payment systems. Research the Home Depot incident and reflect on the basic elements of an incident response plan and the attack vectors.
 

In your initial post, answer the following questions:

Was the Home Depot incident handled correctly? Incorrectly?

Could more have been done? If so, what?

Then, thoughtfully respond to your classmates. Give feedback as to whether you think their ideas model elements of an incident response plan. Are there other real-life scenarios that you can use to identify ways of handling cyber-attacks correctly or incorrectly?.” (TWO (2) PARAGRAPHS EACH WITH REFERENCES ON EACH OF THEM SEPARATELY, NOT TOGETHER)

1.vIrIA pAtT  

In September 2014 Home Depot was the compromised by a cyber-attack. “Hackers used a vendor’s stolen log-on credentials to penetrate Home Depot’s computer network and install custom-built malware that stole customer payment-card data and e-mail addresses, the retailer announced Thursday.” (Winter, 2014) It was later found this software was installed on the stores self-checkout registers. One downfall I believe Home Depot had was not having the proper crisis planning in place. Home Depot originally stated that only customers credit card information had been affected. This later turned into customers email addresses being affected but the company was still unsure of if customers using checks were in danger. If Home Depot had a proper plan and team in place they might have been able to reduce the severity of the incident. Also, it was found that “Home Depot didn’t have secure configuration of the software or hardware on the POS terminals. There was no proof of regularly scheduled vulnerability scanning of the POS environment.” (Institute, 2017) To me this brings up the question shouldn’t Home Depot had a better security system in place or even scanned its environment considering Target had a major credit card breach in December 2013? In the end Home Depot announced that it will be installing an enhanced encryption data system as well as providing credit card monitoring and a $50 gift card to all loyal customers.

2.aLxY bLmS). INC RSP

The hackers that perpetrated the data breach of Home Depot in 2014 were able to use 3rd party vendor credentials to gain entry to the Home Depot network (Hawkins, 2015).  Once inside the network they utilized memory (RAM) scraping technology to obtain the payment information of customers (Hawkins, 2015).  In response to these attacks, Home Depot rolled increased security measures of enhanced encryption and the use of EMV Chip-and-pin technology (Home Depot, 2014).  While Home Depot was already in the process of implementing encryption technology; however, the breach hastened the company’s efforts to roll out the technology to all of its store locations (Home Depot, 2014).  The company’s use of Chip-and-pin technology added additional layers of security and protection for the payment cards of clients (Hawkins, 2015).

It is not apparent from reporting whether the company was completing monthly vulnerability scanning of its network (Hawkins, 2015).  With this security measure in place, they may have detected the breach sooner and decreased the impact of the intrusion.  It is absolutely critical that the payment system should have been segregated from the rest of the network, in order to protect the system’s other assets (Cichonski).  In addition, a training program, regarding the lessons learned from the data breach would be beneficial to help employees become better equipped to partner in protecting the network from unauthorized access.

3.tYlR rSpNsE).inc RSPN

I believe that the Home Depot data breach was responded to in a timely fashion which could not be said about other breaches such as Target.  This does allow people more time to turn their cards off and investigate any fraudulent charges, the longer you wait the more severe the consequences.  With that being said I do believe that Home Depot should have learned from other breaches that happened years before it (Kohgadai, 2016).  One major takeaway is the Point of Sale System that are in use in America.  The switch to EMV- Chip Cards could have prevented the malware on the POS from stealing the card info.  We as a country must move away from magnetic strips, these data storage vessel are unencrypted and pose a serious security threat (Hawkins, 2015).  The best way to respond to a breach is to prevent it from happening in the first place.

PLEASE READ THIS.IT IS VERY IMPORTANT

Allow your discussion posts to be detailed and capable of sharing knowledge, ideas and points.  You must discuss the topic using your own words first.  Using your own words indicate you understand the topic of discussions.  Secondly, you must cite your sources in-text.  This is necessary to justify your points. Sources from several sources showed good research abilities.  Lastly, you must provide references at the bottom of your post.  A discussion post without justification with sources does not show proper research abilities. A terse and not detailed discussions represent post that would not provide enough sharing of knowledge or proper understanding of the topic. DO NOT just copy and paste a sentence from online with citation at the end as your own discussion. I have not asked for definitions, I asked for discussions and will not buy this.  You must show understanding of the discussion topic by using your own words to describe the topic and then justify that with sources.

www.citationmachine.net to format references into the APA style if necessary. Extremely important. Intext citations is very essential and highly needed as well.

     

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ASSEMBLY LANGUAGE PROGRAMMING

 

Write the program for the 8th exercise ( copy string backwards) on page 138 of your book:

8. Copy a String Backwards

Write a program using the LOOP instruction with indirect addressing that copies a string from

source to target, reversing the character order in the process. Use the following variables:

source BYTE “This is the source string”,0

target BYTE SIZEOF source DUP(‘#’)

Insert the following statements immediately after the loop to display the hexadecimal contents

of the target string:

mov esi,OFFSET target ; offset of variable

mov ebx,1 ; byte format

mov ecx,SIZEOF target ; counter

call DumpMem

If your program works correctly, it will display the following sequence of hexadecimal bytes:

67 6E 69 72 74 73 20 65 63 72 75 6F 73 20 65 68

74 20 73 69 20 73 69 68 54

(The DumpMem procedure is explained in Section 5.3.2.) (A VideoNote for this exercise is posted

on the Web site.)

  Also count the number of words in the string. You must display the reversed string and the number of words. To display a string and a number, you can use the The Irvine library functions as explained in the chapter 5 section 4. 

Hint: You can look for Ascii value 32 which represents the space in the string. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Java Programming Homework # 5 and #6

Homework 5

   

1 What is the printout of running the class C (via the command “java C”) in the code below (saved in C.java)? (And, is that what you expected?)

1: class A {

2: public A () {

3: System.out.println( “A’s no-arg constructor is invoked” );

4: }

5: }

6: 

7: class B extends A {

8: }

9: 

10: public class C {

11: public static void main ( String [] args ) {

12: B b = new B();

13: }

14: }

2 What problem do you expect to see if compiling the program below? What was the error(s), if any, actually produced?

1: class A {

2: public A ( int x ) {

3: }

4: }

5: 

6: class B extends A {

7: public B () {

8: }

9: }

10: 

11: public class C {

12: public static void main ( String [] args ) {

13: B b = new B();

14: }

15: }

3 Which of the follow statements are true? Which are false? Explain why.

A subclass is a subset of a superclass.

B When invoking a constructor from a subcass, its superclass’s no-arg constructor is always invoked.

C You can override a private method defined in a superclass.

D You can override a static method defined in a superclass.

4 What is the benefit of using the @Override annotation?

5 a Show the output of the following program:

1: public class Test {

2: public static void main ( String [] args ) {

3: A a = new A( 3 );

4: }

5: }

6: 

7: class A extends B {

8: public A ( int t ) {

9: System.out.println( “A’s constructor is invoked” );

10: }

11: }

12: 

13: class B {

14: public B () {

15: System.out.println( “B’s constructor is invoked” );

16: }

17: }

B Is the no-arg constructor of Object invoked when new A(3) is invoked?

6 Indicate true or false for the follow statements:

A You can always successfully cast an instance of a subclass to a superclass.

B You can always successfully cast an instance of a superclass to a subclass.

7 What’s wrong with the following code?

1: public class Test {

2: public static void main ( String [] args ) {

3: Object fruit = new Fruit();

4: Object apple = (Apple) fruit;

5: }

6: }

7: 

8: class Apple extends Fruit {

9: }

10: 

11: class Fruit {

12: }

8 When overriding the equals method, a common mistake is mistyping its signature in the subclass. For example, the equals method is incorrectly written as equals(Circle circle) as shown in (a) below. It should be written as equals(Object circle), as shown in (b) below. Show the output of running class Test using the Circle class first from (a), and then from (b). Explain the output.

1: public class Test {

2: public static void main ( String [] args ) {

3: Object circle1 = new Circle();

4: Object circle2 = new Circle();

5: System.out.println( circle1.equals( circle2 ) );

6: }

7: }

1: class Circle {

2: double radius;

3: public boolean equals ( Circle circle ) {

4: return this.radius == circle.radius;

5: }

6: }

1: class Circle {

2: double radius;

3: public boolean equals ( Object circle ) {

4: return this.radius == ((Circle) circle).radius;

5: }

6: }

Next, try adding the “@Override” annotation to the equals method in (a), and then try compiling. Repeat with (b). What are the results, and are they as you expected?

9 How would you prevent a class from being extended? How would you prevent a method from being overridden?

10 Which of the following classes define legal abstract classes?

A 1: class A {

2: abstract void unfinished ( ) {

3: }

4: }

B 1: public class abstract A {

2: abstract void unfinished ( ) {

3: }

4: }

C 1: class A {

2: abstract void unfinished ( ) ;

3: }

D 1: abstract class A {

2: protected void unfinished ( ) ;

3: }

E 1: abstract class A {

2: abstract void unfinished ( ) ;

3: }

F 1: class A {

2: abstract int unfinished ( ) ;

3: }

11 Suppose A is an interface. Can you create an instance using “new A()”?

12 Which of the following (if any) is a correct interface declaration? (Assume I1 and I2 are correctly defined elsewhere.)

A 1: interface A {

2: void print () {

3: };

4: }

B 1: abstract interface A extends I1, I2 {

2: abstract void print () {

3: };

4: }

C 1: abstract interface A {

2: print () ;

3: }

D 1: interface A {

2: void print () ;

3: }

Homework 6

  

1 How do you create a Date for the current time? How do you display the current time?

2 How do you do the following tasks?

A Create an ArrayList for storing double values?

B Append an object to a List?

C Insert an object at the beginning of a List?

D Find the number of objects in a List?

E Remove a given object from a List?

F Remove the last object from a List?

G Check whether a given object is in a List?

H Retrieve an object at a specified index from a List?

3 Identify the errors in the following code fragment:

1: ArrayList<String> list = new ArrayList<String>();

2: list.add( “Denver” );

3: list.add( “Austin” );

4: list.add( new java.util.Date() );

5: String city = list.get( 0 );

6: list.set( 3, “Dallas” );

7: System.out.println( list.get(3) );

4 Suppose the ArrayList list contains duplicate elements. Does the following code correctly remove all elements from list? If not, correct the code.

1: for ( int i = 0; i < list.size(); i++ )

2: list.remove( element );

5 Explain why the following code fragment displays [1, 3] rather than [2, 3].

1: ArrayList<Integer> list = new ArrayList<Integer>();

2: list.add(1);

3: list.add(2);

4: list.add(3);

5: list.remove(1);

6: System.out.println( list );

6 How do you create an object of the java.util.Calendar class, that represents the current moment in time?

7 For a Calendar object c, how do you get its year, month, date, hour, minute, and second?

8 Using the java.time API, how can you add one month to a LocalDate object? How can you create a LocalDate object that represents the last Friday of the current month?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Comparison of project models

Your company has been using Traditional Project Management (TPM) methods for years, but is now looking into the possibility of adopting agile practices. Your boss has asked you to prepare a paper comparing TPM to agile practices and summarizing the benefits and limitations of each.

Write a 5- to 7-page paper including, at a minimum, the following information:

Briefly describe the TPM waterfall method.

Briefly describe one or more Agile project management approaches.

Compare and contrast TPM and Agile methods, emphasizing the strengths and weaknesses of each.

Discuss what kind of projects would be more appropriate for TPM approaches and what types would be more appropriate for Agile approaches.

Discuss how a project approach is selected for different types of project. Provide an example by selecting an approach for one of the following projects, and explaining your rationale for the selection. Remember to focus on the project approach and not get involved in the technical details of the project.

Converting a large enterprise from using IPv4 to IPv6

Managing a Business Process Reengineering (BPR) project to modernize and integrate a major company’s business systems (accounting, sales, logistics, manufacturing, etc.) into an enterprise-wide unified architecture

Building a new data center for an international business

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

due on friday

Your organization opened seven new branch offices in five states. Each branch office has five floors. All of the branch offices use the same Internet domain name. The organization has approximately 25 servers and anticipates that an additional 30 servers should be purchased. The organization is planning to provide network services for about 5,000 users. All users require access to the Internet. Certain resources such as printing and file sharing will be centralized.

Group Project Guidelines

Complete the following for this assignment:

  • Using the scenario and assignment information in the Assignment Description, discuss with your group how you should divide the tasks evenly among the members.  
  • Perform the following tasks:   
    • Estimate the quantity of connectivity (routers, switches, etc.) devices that will be needed to link all the branches.   
      • Provide your rationale for choosing the quantity of each device. 
    • Estimate the number of Domain Name System (DNS) servers and the type of DNS server that will be installed in each branch.  
    • Recommend the connectivity and bandwidth for each branch, and provide your reasoning behind the recommendation.  
    • Using Visio, provide a network design (a diagram or diagrams) that shows interconnectivity among the branches. 
  • Compile your final group estimations, recommendations, and diagrams into a Word document of 8–15 pages. 

Grading 

You will be graded on the development of your reasoning behind your equipment quantity estimations, the thoroughness of your DNS server recommendation, and the accuracy of your group’s diagrams.

Please add your file.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Grading Criteria 

  Project Criteria Exceeds: 90%–100% Very Good: 80%–89% Meets: 70%–79% Needs Improvement: Below 70%   

Content
(40%)

Response covers all topics indicated in the assignment and adds additional content.  Response covers most topics indicated in the assignment.  Response covers many of the topics indicated in the assignment. Response covers none to some of the topics indicated in the assignment.    

Effective Communication
(10%)

Demonstrates outstanding or exemplary application of written, visual, or oral skills. Demonstrates outstanding expression of topic, main idea, and purpose. Audience is addressed appropriately. Language clearly and effectively communicates ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are minimal. Organization is clear. Format is consistently appropriate to assignment. Presentation and delivery are confident and persuasive (where applicable). The writing was of collegiate level with no errors in spelling or grammar. Demonstrates very good written, visual, or oral skills. Demonstrates sound expression of topic, main idea, and purpose. Audience is usually addressed appropriately. Language does not interfere with the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are present, but do not distract from the message. Organization is apparent and mostly clear. Format is appropriate to assignment, but not entirely consistent. The writing was of collegiate level with two or less errors in spelling or grammar. Demonstrates acceptable written, visual, or oral skills. Demonstrates reasonable expression of topic, main idea, and purpose. Sometimes, audience is addressed appropriately. Language does not interfere with the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are present and may distract from the message. Organization is a bit unclear. Format is inconsistent. The writing was of collegiate level with several errors in spelling or grammar. Demonstrates inadequate or partially proficient application of written, visual, or oral skills. Demonstrates inadequate or partial expression of topic, main idea, and purpose. Audience is often not addressed appropriately. Language often impedes the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are frequent and often distract from meaning or presentation. Organization is inadequate, confusing, and distracting. The format is inadequate and obscures meaning. The writing was less than collegiate level with numerous errors in spelling or grammar.   

Supporting Analysis
(25%)

Analysis exceeds minimum requirements. Sources are used to support analysis, are appropriate, and are properly referenced. Basic analysis provided to support assertions. Sources are cited, appropriate, and properly referenced. Limited analysis provided to support assertions. Some sources are cited, appropriate, and properly referenced. No or inaccurate analysis, no sources are cited when needed, analysis and sources are not appropriate. When sources are used, they are not properly referenced.   

Effective Planning and Execution of Project
(25%)

Student participated fully, offered significant contributions to the development of a plan that identified all necessary tasks. Student demonstrated exceptional team skills in most of these areas: collaboration, leadership, consensus building, negotiation, conflict resolution, respect, problem solving, management, organizational, time management, and so forth. Supported other team members at the highest level. Student participated at an adequate level (85%), offered reasonable suggestions for the development of a plan that identified nearly all necessary tasks. Student demonstrated very good team skills in several of these areas: collaboration, leadership, consensus building, negotiation, conflict resolution, respect, problem solving, management, organizational, time management, and so forth. Provided support to other team members. Student participated in a limited fashion and contributed very little to the development of a plan that identified some of the necessary tasks. Student demonstrated at least one team skill (e.g. collaboration, leadership, consensus building, negotiation, conflict resolution, respect, problem solving, management, organizational, time management, etc.). Student participation and contributions were extremely insignificant to nonexistent. Student failed to demonstrate any team skills (e.g. collaboration, leadership, consensus building, negotiation, conflict resolution, respect, problem solving, management, organizational, time management, etc.).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 1: GIS: Data Collection, Storage, Transfer, and Maintenance

 

Write a four- to five-page paper that addresses each of the following: 

  1. List one primary and one secondary method of data collection and identify the key differences between the two methods.
  2. From the publicly available sources, identify a commercially available GIS software/hardware vendor or service provider and critique the data collection methodology. What do you like or don’t like about the data collection method?
  3. Once data is captured, storing, transferring, and maintaining the databases are equally important tasks. Name one known technique for structuring geographic information, specifically for creating topology and indexing. Identify the issues associated with multi-user editing and versioning.
  4. Maps are a very effective way of summarizing and communicating the results of GIS operations to a wider audience. Transitory maps and map-like visualizations are used to simply display, analyze, edit, and query geographic information. Describe your favorite cartography example within the GIS industry and its advantages.
  5. Imagine you are the project manager for the data collection portion of a large GIS project. You were informed that the cost of the data collection could be as high as 50% of the total project, excluding the labor costs. How do you validate such a claim? Could you personally investigate the published resources and summarize your conclusions on your own? You don’t have to agree with the claim, but provide the rationale and justification for your statements.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now