In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc.

 In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 5 Case Study Assignment 2: WAN for Canyon College

Canyon College began strictly as a liberal arts college, but for the past five years has been developing programs for business and professional students, including outreach programs to new areas within the same region. The college hired the company you work for, Network Design Consultants, to provide help with emerging WAN needs as they are developing these new programs.

Task 1: Providing WAN Services to Remote Cities

Canyon College plans to offer night classes for business school students, paralegal students, and nurses, in five remote cities. Their plan is to have professors offer the classes from the main site, and to use video conferencing and multimedia options at the remote sites. At the main site, they have a TCP/IP Ethernet network. The remote sites, which are not yet set up, will also have TCP/IP Ethernet networks. The Canyon College director of information technology is asking you to recommend two WAN options to connect the remote sites to the main campus, and to provide a rationale for the options you recommend.

  • (1)Prepare a sample network diagram.
     

    • Use Microsoft Visio.
       
  • (2)Indicate your recommended options in a separate Word document
     

Task 2: Teaching Classes from Home

The Canyon College president enjoys participating in several classes once a week as a guest lecturer or tutor, but she wants to do this from home, so she can spend more time with her family instead of driving back to the college, which is about two miles away. One of the requirements is that she needs to be able to use the telephone in her home office at the same time that she is connected to the main college network.

  • (3)Explain how the college president might be connected to the main college network through a particular WAN technology, and why you recommend that technology.
  • Save your explanation in a Word document.

Task 3: Troubleshooting Connectivity

The Canyon College president calls you in a panic to report she cannot access the school’s Web server from her office on campus, but she wants to troubleshoot the problem herself. Is there is a quick way she can test the Web server’s connectivity?

  • (4)What test method do you recommend?
  • Save your explanation in a Word document.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

MasterMind

 

Modify your version of the project to the following specifications.

1)  Randomly generate a code to break in the range of 0000 to 9999.  Use characters not integers.

2)  Include an option which test all possible guesses instead of  playing the game.  A table will be generated which is 10,000 long with a  guess starting at characters 0000 to 9999 incrementing by 1 each time.

     a)  The test will loop and test all possible guesses against your randomly chosen code.

     b)  Print the following headings

              Code   Guess  #right  #right in wrong spot   Sum

Example:   A code was randomly chosen such as 0120

              Code   Guess  #right  #right in wrong spot    Sum

              0120    0000        2                  0                       2

              0120    0001        1                  2                       3

              0120    0002        1                  2                       3

              0120    0003        1                  1                       2

              etc………….

              0120   0012         1                  3                       4

              etc……….

              0120   0120         4                  0                       4

              etc……….

              0120   2100         2                  2                       4

              etc……

              0120   9999         0                  0                       0

This is to make sure you are not double counting.  The max in any  column can be no greater than 4 and the sum can never be greater than  4.  Of course, just because that is true does not mean it is totally  correct.  That is why further checks are required.

Answer the following and check with your modified project.  

3)  How many times should 4 right come up?

4)  How many times should 3 right come up?

5)  How many times should 2 right come up?

6)  How many times should 1 right come up?

7)  How many times should 0 right come up?

8)  Answer the same for number right in the wrong spot like 3) to 7) from above. Answer the same 3) to 7) for the sum.

9)  Does your code verify this?

10)  Include an option where you can put in the code to test instead  of randomly generating the code.  Output the same table as above.  Do  the same comparison.

code

 //System Libraries
#include <iostream> //Input/Output Library
#include <cstdlib>
#include <ctime>
using namespace std;
//User Libraries
//Global Constants, no Global Variables are allowed
//Math/Physics/Conversions/Higher Dimensions – i.e. PI, e, etc…
//Function Prototypes
//Execution begins here
int main(int argc, char** argv) {
//Set the random number seed
srand(time(0)); // using srand to generate different random numbers everytime
int randomint = (rand()%5)+1; // generate a random number between 1 and 5 using rand
//Declare Variables
char colors[4];// the 4 colors of MasterMind
char ex;
//Random for loop
for(int i=0;i<4;i++){
randomint = (rand()%5)+1; // generate random number from 1 to 5 using rand function
switch(randomint){
case 1: // if randomint is 1 assign ‘R’ to colors array
colors[i] = ‘R’;
break;
case 2: // if randomint is 2 assign ‘B’ to colors array
colors[i] = ‘B’;
break;
case 3: // if randomint is 3 assign ‘Y’ to colors array
colors[i] = ‘Y’;
break;
case 4: // if randomint is 4 assign ‘P’ to colors array
colors[i] = ‘P’;
break;
case 5: // if randomint is 5 assign ‘G’ to colors array
colors[i] = ‘G’;
break;
}
}
//Initialize or input i.e. set variable values
char usercolors[4]; // user array for colors input from user
// print to console output
cout <<“The colors of the game is red is R, blue is B, yellow is Y,green is G,purple is P”<<endl;
cout<<“Please use uppercase letters when you play the game”<<endl;
cout<<endl<<endl;
cout<<“Colors R,B,Y,P and G”<<endl;
cout << “Let play the game (:” << endl;
int turncounter = 0; // initialize turncounter to 0
while(turncounter != 12){ // loop 12 times
turncounter++;
cout << “Current try: ” << turncounter << endl;
for(int i=0;i<4;i++){ // Ask user 4 colors
cout << “Color ” << i << “: “;
cin >> usercolors[i];
cout << endl;
}
for(int i=0;i<4;i++){ // compare user entered colors with the random generated colors array
if(usercolors[i] == colors[i]) // if color matches then print right else wrong
cout << “Right” << ” “;
else
cout << “Wrong” << ” “;
}
cout << endl << endl;
// if all four color matches then user win else lost
if(usercolors[0] == colors[0] &&
   usercolors[1] == colors[1] &&
   usercolors[2] == colors[2] &&
   usercolors[3] == colors[3])
{
cout << “You win! Number of tries: ” << turncounter << endl;
return 0;
}else{
cout << “Nope.” << endl << endl;
}
// Ask if user wants to keep trying again or not
cout<<“do you want to exit type Y to exit or N to continue keep trying “<<endl;
cin>>ex;
if(ex==’Y’) // if user types ‘Y’ exit
return 0;
}
if(turncounter == 12){ // if turncounter is 12 user lost
cout << “You lost.):” << endl;
}
return 0;

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Exam

 

1. Describe with the aid of a diagram the structure of the Windows XP operating system. Sketch the functions of each component, and clearly indicate which parts execute in kernel mode and which in user mode.

2. Contrast UNIX pipes with a general, asynchronous message-passing facility as a basis for inter-process communication between processes which run in separate address spaces.

3. An operating system supports multi-threaded processes. Within a given user-level address-space two threads cooperate by means of a shared, circular, N-slot buffer. Semaphores are supported by the language system.

a. Outline programs that may be executed by the thread which writes data into the buffer and the thread which reads data from it.

b. How would you ensure that several threads could write to, and read from, the buffer?

c. Explain how the semaphore implementation in the language system uses the thread implementation in the operating system.

4. Describe the various functions involved in interrupt handling. Indicate the hardware and software that might be involved in their implementation.

a. Discuss the interaction of interrupt driven software and process scheduling in an operating system.

b. Compare and contrast interrupt handling in the Windows XP and UNIX Operating Systems.

5. In relation to scheduling of processes, describe the concept of a working set and briefly outline how it can be used within an operating system.

a. Briefly explain why context switching between processes is inherently more costly than switching between threads of a process.

b. Give two reasons why operating system designers often choose to make code in the kernel non-preemptive.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Homework Help-10

Question 1.

10.1 What are three broad mechanisms that malware can use to propagate?

10.2 What are four broad categories of payloads that malware may carry?

10.3 What are typical phases of operation of a virus or worm?

10.4 What mechanisms can a virus use to conceal itself?

10.5 What is the difference between machine-executable and macro viruses?

10.6 What means can a worm use to access remote systems to propagate?

10.7 What is a “drive-by-download” and how does it differ from a worm?

10.8 What is a “logic bomb”?

10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?

10.10 List some of the different levels in a system that a rootkit may use.

10.11 Describe some malware countermeasure elements.

10.12 List three places malware mitigation mechanisms may be located.

10.13 Briefly describe the four generations of antivirus software.

10.14 How does behavior-blocking software work?

10.15 What is a distributed denial-of-service system?

Question 2 – 

Some common biometric techniques include:

1.  Fingerprint recognition

2.  Signature dynamics

3.  Iris scanning

4.  Retina scanning

5.  Voice prints

6.  Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

WK 4: Sourcing Plan

Assignment Content

  1. The strategic sourcing plan is a plan for how you will do business going forward. The sourcing plan can address how to supply resources to staff, your current and future systems, and how you will purchase raw materials or new IT systems.

    Develop a high-level IT sourcing plan to guide Phoenix Fine Electronics to adopting enterprise solutions rather than multiple stand-alone systems. As a guideline, your sourcing plan should be a 3- to 4-page outline or summary.

    Include the following in your sourcing plan:

    • The current technologies being utilized
    • Major issues with that technology
    • New technologies to implement as replacements for current technologies
    • How it addresses the current issues
    • Additional advantages or value added
    • Approximate time frame to implement the technology
    • Any dependencies that the company does not currently have in order to implement

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 4 Written Assignment

 

Week 4 Written Assignment

  • Select one of the three topics defined in the Essay Quiz section on page 334 in the textbook. Your paper should be 2 pages in length. You need to provide a minimum of two references and need to use APA format in the reference section.

Textbook

Principles of Computer Security, Conklin and White, 4th Edition, McGraw-  Hill Companies, 2016; ISBN: 978-0-07-183597-8.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research Paper- Data Center Technology

Research Paper:  Find a peer reviewed article in the following databases provided by the UC Library and write a 500-word paper reviewing the literature concerning Data Center Technology. Choose one of the technologies discussed in Chapter 5, Section 5.2 (Erl, 2014). 

Abstract <>

Introduction <>

1- Virtualization — <I prefer this one> provide some flow chat also. 

(Note:- But you can take anyone from 1 to 7)

2- Standardization and Modularity

3- Automation

4- Remote Operation and Management

5- High Availability

6- Security-Aware Design, Operation, and Management

7- Facilities

Etc…

======This is must

Use the following databases for your research:

· ACM Digital Library

· IEEE/IET Electronic Library

· SAGE Premier

=======

Conclusion<>

You may choose any scholarly peer reviewed articles and papers.

FYI — PDF BOOK

Section 5.2 <From here we can choose one topic)

5.2. DATA CENTER TECHNOLOGY

Grouping IT resources in close proximity with one another, rather than having them geographically dispersed, allows for

power sharing, higher efficiency in shared IT resource usage, and improved accessibility for IT personnel. These are the

advantages that naturally popularized the data center concept. Modern data centers exist as specialized IT infrastructure

Chapter 5. Cloud-Enabling Technology – Cloud Computing: Concepts, Technology & Architecture

https://www.safaribooksonline.com/library/view/cloud-computing-concepts/9780133387568/ch05.html[11/15/2017 5:49:24 PM]

used to house centralized IT resources, such as servers, databases, networking and telecommunication devices, and

software systems.

Data centers are typically comprised of the following technologies and components:

Virtualization

Data centers consist of both physical and virtualized IT resources. The physical IT resource layer refers to the facility

infrastructure that houses computing/networking systems and equipment, together with hardware systems and their

operating systems (Figure 5.7). The resource abstraction and control of the virtualization layer is comprised of operational

and management tools that are often based on virtualization platforms that abstract the physical computing and

networking IT resources as virtualized components that are easier to allocate, operate, release, monitor, and control.

Chapter 5. Cloud-Enabling Technology – Cloud Computing: Concepts, Technology & Architecture

https://www.safaribooksonline.com/library/view/cloud-computing-concepts/9780133387568/ch05.html[11/15/2017 5:49:24 PM]

Figure 5.7. The common components of a data center working together to provide virtualized IT resources

supported by physical IT resources.

Virtualization components are discussed separately in the upcoming Virtualization Technology section.

Standardization and Modularity

Data centers are built upon standardized commodity hardware and designed with modular architectures, aggregating

multiple identical building blocks of facility infrastructure and equipment to support scalability, growth, and speedy

hardware replacements. Modularity and standardization are key requirements for reducing investment and operational

costs as they enable economies of scale for the procurement, acquisition, deployment, operation, and maintenance

processes.

Chapter 5. Cloud-Enabling Technology – Cloud Computing: Concepts, Technology & Architecture

https://www.safaribooksonline.com/library/view/cloud-computing-concepts/9780133387568/ch05.html[11/15/2017 5:49:24 PM]

Common virtualization strategies and the constantly improving capacity and performance of physical devices both favor

IT resource consolidation, since fewer physical components are needed to support complex configurations. Consolidated

IT resources can serve different systems and be shared among different cloud consumers.

Automation

Data centers have specialized platforms that automate tasks like provisioning, configuration, patching, and monitoring

without supervision. Advances in data center management platforms and tools leverage autonomic computing

technologies to enable self-configuration and self-recovery. Autonomic computing is briefly discussed in Appendix E.

Remote Operation and Management

Most of the operational and administrative tasks of IT resources in data centers are commanded through the network’s

remote consoles and management systems. Technical personnel are not required to visit the dedicated rooms that house

servers, except to perform highly specific tasks, such as equipment handling and cabling or hardware-level installation

and maintenance.

High Availability

Since any form of data center outage significantly impacts business continuity for the organizations that use their

services, data centers are designed to operate with increasingly higher levels of redundancy to sustain availability. Data

centers usually have redundant, uninterruptable power supplies, cabling, and environmental control subsystems in

anticipation of system failure, along with communication links and clustered hardware for load balancing.

Security-Aware Design, Operation, and Management

Requirements for security, such as physical and logical access controls and data recovery strategies, need to be thorough

and comprehensive for data centers, since they are centralized structures that store and process business data.

Due to the sometimes prohibitive nature of building and operating on-premise data centers, outsourcing data centerbased

IT resources has been a common industry practice for decades. However, the outsourcing models often required

long-term consumer commitment and usually could not provide elasticity, issues that a typical cloud can address via

inherent features, such as ubiquitous access, on-demand provisioning, rapid elasticity, and pay-per-use.

Facilities

Chapter 5. Cloud-Enabling Technology – Cloud Computing: Concepts, Technology & Architecture

https://www.safaribooksonline.com/library/view/cloud-computing-concepts/9780133387568/ch05.html[11/15/2017 5:49:24 PM]

Data center facilities are custom-designed locations that are outfitted with specialized computing, storage, and network

equipment. These facilities have several functional layout areas, as well as various power supplies, cabling, and

environmental control stations that regulate heating, ventilation, air conditioning, fire protection, and other related

subsystems.

The site and layout of a given data center facility are typically demarcated into segregated spaces. Appendix D provides a

breakdown of the common rooms and utilities found in data centers.

Computing Hardware

Much of the heavy processing in data centers is often executed by standardized commodity servers that have substantial

computing power and storage capacity. Several computing hardware technologies are integrated into these modular

servers, such as:

• rackmount form factor server design composed of standardized racks with interconnects for power, network, and

internal cooling

• support for different hardware processing architectures, such as x86-32bits, x86-64, and RISC

• a power-efficient multi-core CPU architecture that houses hundreds of processing cores in a space as small as a single

unit of standardized racks

• redundant and hot-swappable components, such as hard disks, power supplies, network interfaces, and storage

controller cards

Computing architectures such as blade server technologies use rack-embedded physical interconnections (blade

enclosures), fabrics (switches), and shared power supply units and cooling fans. The interconnections enhance intercomponent

networking and management while optimizing physical space and power. These systems typically support

individual server hot-swapping, scaling, replacement, and maintenance, which benefits the deployment of fault-tolerant

systems that are based on computer clusters.

Contemporary computing hardware platforms generally support industry-standard and proprietary operational and

management software systems that configure, monitor, and control hardware IT resources from remote management

consoles. With a properly established management console, a single operator can oversee hundreds to thousands of

physical servers, virtual servers, and other IT resources.

Chapter 5. Cloud-Enabling Technology – Cloud Computing: Concepts, Technology & Architecture

https://www.safaribooksonline.com/library/view/cloud-computing-concepts/9780133387568/ch05.html[11/15/2017 5:49:24 PM]

Storage Hardware

Data centers have specialized storage systems that maintain enormous amounts of digital information in order to fulfill

considerable storage capacity needs. These storage systems are containers housing numerous hard disks that are

organized into arrays.

Storage systems usually involve the following technologies:

Hard Disk Arrays – These arrays inherently divide and replicate data among multiple physical drives, and increase

performance and redundancy by including spare disks. This technology is often implemented using redundant arrays of

independent disks (RAID) schemes, which are typically realized through hardware disk array controllers.

I/O Caching – This is generally performed through hard disk array controllers, which enhance disk access times and

performance by data caching.

Hot-Swappable Hard Disks – These can be safely removed from arrays without requiring prior powering down.

Storage Virtualization – This is realized through the use of virtualized hard disks and storage sharing.

Fast Data Replication Mechanisms – These include snapshotting, which is saving a virtual machine’s memory into a

hypervisor-readable file for future reloading, and volume cloning, which is copying virtual or physical hard disk volumes

and partitions.

Storage systems encompass tertiary redundancies, such as robotized tape libraries, which are used as backup and

recovery systems that typically rely on removable media. This type of system can exist as a networked IT resource or

direct-attached storage (DAS), in which a storage system is directly connected to the computing IT resource using a host

bus adapter (HBA). In the former case, the storage system is connected to one or more IT resources through a network.

Networked storage devices usually fall into one of the following categories:

Storage Area Network (SAN) – Physical data storage media are connected through a dedicated network and provide

block-level data storage access using industry standard protocols, such as the Small Computer System Interface (SCSI).

Network-Attached Storage (NAS) – Hard drive arrays are contained and managed by this dedicated device, which

connects through a network and facilitates access to data using file-centric data access protocols like the Network File

Chapter 5. Cloud-Enabling Technology – Cloud Computing: Concepts, Technology & Architecture

https://www.safaribooksonline.com/library/view/cloud-computing-concepts/9780133387568/ch05.html[11/15/2017 5:49:24 PM]

System (NFS) or Server Message Block (SMB).

NAS, SAN, and other more advanced storage system options provide fault tolerance in many components through

controller redundancy, cooling redundancy, and hard disk arrays that use RAID storage technology.

Network Hardware

Data centers require extensive network hardware in order to enable multiple levels of connectivity. For a simplified

version of networking infrastructure, the data center is broken down into five network subsystems, followed by a

summary of the most common elements used for their implementation.

Carrier and External Networks Interconnection

A subsystem related to the internetworking infrastructure, this interconnection is usually comprised of backbone routers

that provide routing between external WAN connections and the data center’s LAN, as well as perimeter network security

devices such as firewalls and VPN gateways.

Web-Tier Load Balancing and Acceleration

This subsystem comprises Web acceleration devices, such as XML pre-processors, encryption/decryption appliances, and

layer 7 switching devices that perform content-aware routing.

LAN Fabric

The LAN fabric constitutes the internal LAN and provides high-performance and redundant connectivity for all of the

data center’s network-enabled IT resources. It is often implemented with multiple network switches that facilitate

network communications and operate at speeds of up to ten gigabits per second. These advanced network switches can

also perform several virtualization functions, such as LAN segregation into VLANs, link aggregation, controlled routing

between networks, load balancing, and failover.

SAN Fabric

Related to the implementation of storage area networks (SANs) that provide connectivity between servers and storage

systems, the SAN fabric is usually implemented with Fibre Channel (FC), Fibre Channel over Ethernet (FCoE), and

InfiniBand network switches.

NAS Gateways

This subsystem supplies attachment points for NAS-based storage devices and implements protocol conversion hardware

Chapter 5. Cloud-Enabling Technology – Cloud Computing: Concepts, Technology & Architecture

https://www.safaribooksonline.com/library/view/cloud-computing-concepts/9780133387568/ch05.html[11/15/2017 5:49:24 PM]

that facilitates data transmission between SAN and NAS devices.

Data center network technologies have operational requirements for scalability and high availability that are fulfilled by

employing redundant and/or fault-tolerant configurations. These five network subsystems improve data center

redundancy and reliability to ensure that they have enough IT resources to maintain a certain level of service even in the

face of multiple failures.

Ultra high-speed network optical links can be used to aggregate individual gigabit-per-second channels into single optical

fibers using multiplexing technologies like dense wavelength-division multiplexing (DWDM). Spread over multiple

locations and used to interconnect server farms, storage systems, and replicated data centers, optical links improve

transfer speeds and resiliency.

Other Considerations

IT hardware is subject to rapid technological obsolescence, with lifecycles that typically last between five to seven years.

The on-going need to replace equipment frequently results in a mix of hardware whose heterogeneity can complicate the

entire data center’s operations and management (although this can be partially mitigated through virtualization).

Security is another major issue when considering the role of the data center and the vast quantities of data contained

within its doors. Even with extensive security precautions in place, housing data exclusively at one data center facility

means much more can be compromised by a successful security incursion than if data was distributed across individual

unlinked components.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

2 Discussions – 1 Assignment

Discussion 1

APA format | 400 words Minimum | 2 scholarly References. 

Textbook Attached (Amoroso)

Discussion 2

APA format | 400 words Minimum | 2 scholarly References. 

Related Material attached (PFA)

Practical connection assignment

APA format | 500 words Minimum | 2 scholarly References. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion on global financial service sector which blockchain technology will likely change

Question and Text book attached. Read the attached doc file propely. 

Proper introduction and body and conclusion with References

Two or more references (One is book author and another one anyone)

Need three distinct questions from Chapter 1, 2 and 3. 

 

In chapter 3, the author describes eight core functions of the global financial service sector which blockchain technology will likely change. Create a new thread, choose one of the core functions described in chapter 3, and explain why it is important in moving today’s economy forward, and provide at least two real examples of the chosen core function being changed by blockchain technology today.

Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 1, 2, or 3. You’re not trying to test each other, but you are trying to start a discussion.

Finally, go to three other students’ threads and post comments, answering at least one of their questions.

You must do the following:

1) Create a new thread. As indicated above, choose one of the core functions described in chapter 3, explain why it is important in moving today’s economy forward, and provide at least two real examples of the chosen core function being changed by blockchain technology today. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 1. You’re not trying to test each other, but you are trying to start a discussion.

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should answer AT LEAST one of the questions posed in the thread and extend the conversation started with that thread. Make sure that you include the question in your comment so I can see what question you’re answering.

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just a short answer.)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now