credibility of sources

credibility of sources

After viewing “A guide to critical thinking about what you see on the web” (Retrieved from, read the “Eggs and Cholesterol” exercise (Retrieved from

Azman, R. L., & Fox, S. H. (2014, April 21). Understanding plagiarism . . . with some help from Dr. Seuss: A plagiarism prevention presentation [PowerPoint presentation]. Retrieved from

Evaluate the sources listed for credibility. Which source do you believe to be the most credible? Why? Which is the least credible? Why?

Answer must be at least 250 words long, and have at least two in-text citations with references at bottom. Any questions, please feel free to ask. Thank you.

world cultures discussion week 1

world cultures discussion week 1

“Baroque Style” Please respond to one (1) of the following, using sources under the Explore heading as the basis of your response: 

  • Listen to one (1) composition that demonstrates the qualities of the Baroque musical style. It may be from the Websites below or from this week’s Music Folder. Identify your choice, and describe it by relating key terms from the textbook to your selection. Explain what you like or admire about the work. Compare it to a modern soundtrack or song that evokes a similar mood. 
  • Select two (2) Baroque style paintings from the Websites below that no other student has selected. Identify each as to artist, date, and title or description. From the summaries of the Baroque style’s features in our class text, identify specific key aspects of each painting that fit the Baroque style. Explain why you selected each and what you like or dislike about it. Compare this style to a modern film, type of film, or to a modern situation.  


Monteverdi and Vivaldi

Baroque Visual Arts

chemistry task redox reactions spectroscopic amp chromatography techniques

chemistry task redox reactions spectroscopic amp chromatography techniques

Chemistry Task-Redox reactions, spectroscopic techniques, chromatography techniques,.docx 

geometry help please 9

geometry help please 9


bus 475 final exam week 11

bus 475 final exam week 11

It is electronic. I can’t submit questions.

executive proposal project

executive proposal project

Can someone please help with this project:

The purpose of this project is to evaluate the student’s ability to research and evaluate security testing software and present a proposal for review by executive team members. By completing the document the student will also gain practical knowledge of the security evaluation documentation and proposal writing process. The project will enable the student to identify and understand the required standards in practice, as well as the details that should be covered within a proposal.

Project Deliverable 

Using the Case Study presented in this document, to complete an executive proposal.

Provide a threeto five page proposal summarizing purpose and benefit of chosen security software to the executive management team.

The student will evaluate and test security testing software for purposes of testing corporate network security. The purpose of the software is to measure the security posture of the organization by identifying vulnerabilities and help prevent future attacks and deter any real-time unknown threats. 

The proposal should effectively describe the software in a manner that will allow the executiveteam members to understand the purpose and benefits of the software to approve purchase.


Evaluate and select a security tool for recommendation that you learned about in the iLabs modules or the EC-Council text books. 

The proposal document must be 3 to 5 pages long, conforming to APA standards. See “Writing Guideline” in WebTycho where you’ll find help on writing for research projects.

At least three authoritative, outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page titled “References.”

Appropriate citations are required. See the syllabus regarding plagiarism policies.

This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity.

The paper is due during Week 7 of this course.

Project Description

The purpose of project is to write an executive proposal for a fictitious company called Consolidated Dynamics. The goal of the proposal is to persuade the executive management team to approve purchase of security testing software that can benefit the company’s corporate network security by testing and identifying vulnerabilities before they are exploited by hackers. The proposal must include a detailed description of the software, its purpose and benefits. 

Suggested Approach

Research a security testing software tool that you practiced using in the EC-Council iLabs or from the textbook. 

Determine whether the tool would be beneficial in testing the security of a corporate network.

Use the vendor’s website to collect necessary information about the tool to be able to explain its purpose and benefit.

Include 3rd party endorsements and case studies about the tool.

Integrate the information from your own experience with the tool into your proposal. This may include results from the iLab exercises or your own test lab.

Company Description

Consolidated Dynamics Corporation

Consolidated Dynamicsis a startup medical research and development company. After five years of extraordinary success in the development of innovative medical and pharmaceutical products, Consolidated Dynamicsis on its way to becoming a major player in the medical research and development industry. However, due to its success, Consolidated Dynamicshas also become a major target of cybercriminals. Consolidated Dynamicshas been the victim of cybercriminal attempts to steal intellectual property and sell it to Consolidated Dynamics’s competitors. It is suspected that the corporate network has been infiltrated from unauthorized sources more than once. In 2011, Consolidated Dynamicswas falsely accused of unethical research and development practices. The false allegations resulted in the defacement of Consolidated Dynamics’s public website and several Denial of Service attacks at different times over a 9 month period that brought the corporate network to its knees. These attacks had a major impact on Consolidated Dynamics’s ability to conduct business and resulted in undesirable publicity for the company.

Regardless of its security problems,Consolidated Dynamicshas continued to grow as a company. Its research and development departments have grown over the years, due to the expansion of the company, in proportion to the increase in its business making up over 40% of the human resources. Consolidated Dynamics’s innovative research and development information is paramount to its continued success as a company. Although, no known attacks have occurred in last 18 months, the security of its network and intellectual property is still a major concern for the company. Because Consolidated Dynamicsis a still fairly young company, management has been hesitant to budget for expensive security projects. However, this point of view is beginning to change. Particularly, because one of Consolidated Dynamics’s competitors, a major player in the medical research and development industry for over 40 years, experienced a loss of hundreds of millions of dollars in research data that was stolen from its corporate network by cyberthieves.

Background and your role

You are the IT Manager hired in 2012 to manage the physical and operational security of Consolidated Dynamics’s corporate information system.You understand information security issues better than anyone else in the company. You also know that the network is vulnerable to outside threats because it has experienced attacks in the past and because you haven’t had the resources to properly test the corporate information system to identify the vulnerabilities that might exist and take action prevent possible attacks. You have a responsibility to bring these concerns to the attention of the executive team and ask for approval to purchase the necessary testing software. 

Your education and training have introduced you to variety of security tools for testing computer and network security. The majority of these tools you either only read about or have practiced using in lab environment. You have decided to research some of these tools and test them out in your own lab environment and choose one for recommendation to executive team. 

You will need to present information that proves the chosen tool will be beneficial to the security of corporate information system. To accomplish this you will need to research the product, if possible, test the product in a virtual lab environment. If the tool is part of your iLab exercise, it is recommended that you practice using and testing the tool beyond the scope of the lab exercise. Based on your research and analysis, you will include this information in your proposal in way that the executive staff can understand and allowing them to make an informed decision to approve purchase of the product.

The executive management team of Consolidated Dynamics:

The proposal should include:

Detailed description of the software and benefits.

Include reviews, case studies and customer recommendations 

Include your own hands-on experience with the tool and test results

Cost of product. Include additional costs such as training or hardware software that might be needed in order to properly deploy manage and maintain the software.

How will the software impact the production environment? For example, the software may test for Denial of Service attacks. You need to explain any interruptions the test may have on business operations. You need to justify the need for such a test. Also explain how to you plan to minimize or prevent possible production outages.

The software should test for one or more of the following types of attacks:

Denial of Service (DoS)

Cross Site Scripting (XSS)

Authentication Bypass

Directory Traversal 

Session Management

SQL injection 

Database Attacks

Password Attacks

Firewall/Router Attacks

Operating System Attacks

Corporate Office Network Topology

The Consolidated Dynamicsmain research and development facility is located in Reston Virginia. You have concerns about the sensitive information that is stored at this location as well as data that transmitted over the WAN to Consolidated Dynamics’s New York City headquarters location, business partners and clients. The Reston facility is also where the Consolidated Dynamicsdata center is located. The data center is where Consolidated Dynamics’s public website, email, databases and corporate intranet are hosted. The environment contains a mix of Microsoft and *NIX technologies. 

45 Windows 2008 Servers

13 Windows 2003 Servers

15 UNIX Servers

2200 Windows XP and 7 Desktops

Web Servers: Apache and IIS 


Database: SQL, Oracle and MySQL

Network: Cisco Routers and Firewalls

Grading Rubrics

Final Deliverable





Documentation and Formatting



 Appropriate APA citations/referenced sources and formats of characters/content.

Software Research 



Accurate Completion of Software Research

Software Analysis



Accurate Completion of Software Analysis

Executive Proposal



 Provide proposal for purchase 




 A quality paper will meet or exceed all of the above requirements.





Documentation and formatting

7-10 points

At least 3 Appropriate APA citations/referenced sources and formats of characters/ content. 

3-6 points

Included 3 references but incorrect formatting or referencing/ citation 

0-2 points

Does not include at least 3 references

Software Research

15-20 points

Effectively describes the purpose of the software that will allow the Senior Management to understand the organizational need and make the appropriate decisions to purchase.

Research is supported with documentation and evidence. 

8-14 points

Describes the software to Senior Management but not enough to understand an organizational need andmake the appropriate decisions to enforce. And/or is not sufficiently supported with documentation and evidence. And/or the description is somewhat unclear.

0-7 points

Describes the software in a manner that is unclear to the Senior Management. The research Is not sufficiently supported with documentation and evidence. Senior management would not have enough detail to make appropriate decisions. 

Software Analysis

15-20 points

Effectively provides analysis results that demonstrate the effectiveness of the software to meet to meet the organizations objectives

8-14 points

Provides analysis results that demonstrate the purpose of the software but does not demonstrate effectiveness to meet the organization’s objectives.

0-7 points

Provides analysis results that fail to demonstrate the purpose of the software and does not demonstrate effectiveness to meet the organization’s objectives.

Executive Proposal

36-50 points

Effectively explains the benefit of the software. Cost of the software and any costs. Includes all key points of the analysis and allows the senior management to understand the organizational need enough to make an appropriate choice.

18-35 points

Describes software in a manner that allows the Senior Management to understand the purpose of the software but not enough to make a decision to purchase. Key information is left out or not made clear.

0-17 points

Describes the software in a manner that is unclear and/or insufficient. Proposal is difficult to follow or does not include key information and details.

More Details: 

supervisory management 1

supervisory management 1

Island Shades.docx  attach is the case study

Assignment: “Island Shades” Case Study

Directions: Read the Case “Island Shades” in Chapter 2 of your textbook. In a 2-3 page paper discuss the following:

  1. Analyze Terry’s goal and plan based on the concepts you learned in this chapter. Are there additional key performance areas that Terry could identify for action? Is her goal realistic?
  2. Do you agree with Terry’s view that Island Shades will be successful? Why or why not?
  3. Would you recommend any changes or modifications to her goal or plan? Discuss.
  4. Present a summary of your analysis and recommendations to this case study.

employee training and cipp model of evaluation

employee training and cipp model of evaluation

how does the CIPP model address the issue of training transfer? Be specific.

what is the surprise ending of part iv in descatess discourse on the method 2

what is the surprise ending of part iv in descatess discourse on the method 2

What is the surprise ending of part IV in Descatess’ Discourse on the Method?

 Write a three to four (3-4) paragraph essay (250 words minimum) which analyzes the “surprise ending” of the reading selection

  • Reading selection from Descartes’ Discourse on the Method (Part IV). Descartes begins with a  proof of one basic conclusion and ends with a proof of something much grander. Remember to focus on the surprise and point of realization, not the details of the philosophical argument. Read Part IV of the Discourse on the Method located at This is only four or five (4 or 5) pages of the larger work.

question 8 8 which of the following is not one of the underlying tort principle

question 8 8 which of the following is not one of the underlying tort principle

Question 8.8. Which of the following is NOT one of the underlying tort principles? (Points : 5)