#Q1 using a dictionary or any Internet resources answer the following: What do you think is the value of reading/ studying political theory? Even if

#Q1 using a dictionary or any Internet resources answer the following: What do you think is the value of reading/ studying political theory? Even if you don’t know much about political theory, use outside sources to answer this question. Think about what we have already discussed in class. Your response should be 200-250 words and is due on Blackboard on Sunday, 1 October 2017, by 11:59PM. #Q2 in 200-250 words 1. How does human nature affect our decision-making? Do you think world leaders take human nature into consideration when making decisions? Give a specific example either of a current or former leader where you think this is evident. 2. Do you think human beings are aggressive by nature and thus inclined towards war naturally or is aggression a learned behavior? Why or why not?

Your boss mentions that recently a number of employees have received calls from individuals who didn’t identify themselves and asked a lot of questions about

Your boss mentions that recently a number of employees have received calls from individuals who didn’t identify themselves and asked a lot of questions about the company and its computer infrastructure. At first, he thought this was just a computer vendor who was trying to sell your company some new product, but no vendor has approached the company. He also says several strange e-mails requesting personal information have been sent to employees, and quite a few people have been seen searching your company’s trash dumpsters for recyclable containers. Your boss asks what you think about all of these strange incidents. Respond and be sure to provide recommendations on what should be done about the various incidents. Directions:

Examine PepsiCo, Inc.’s Consolidated Balance Sheet on p. A6 in Appendix A of Financial Accounting, especially its Current Assets, Current Liabilities, and Total Assets for

Examine PepsiCo, Inc.’s Consolidated Balance Sheet on p. A6 in Appendix A of Financial Accounting, especially its Current Assets, Current Liabilities, and Total Assets for years 2005 and 2004. Calculate the following for PepsiCo, Inc. and show your work: • The Current Ratio for 2005 • The Current Ratio for 2004 • Two measures of vertical analysis—for example, compute the current assets divided by total assets for each year, and express your result as a percentage • Two measures of horizontal analysis—for example, compute the total change in assets by percentage, by dividing current assets in 2005 by current assets in 2004. Compute a similar percentage for current liabilities Examine The Coca-Cola Company’s Consolidated Balance sheet on p. B2 in Appendix B of Financial Accounting, especially its Current Assets, Current Liabilities, and Total Assets for years 2005 and 2004. • The Current Ratio for 2005 • The Current Ratio for 2004 • Two measures of vertical analysis—for example, compute the current assets divided by total assets for each year, and express your result as a percentage • Two measures of horizontal analysis—for example, compute the total change in assets by percentage, by dividing current assets in 2005 by current assets in 2004. Compute a similar percentage for current liabilities

Cross-site scripting (XSS) is a type of vulnerability commonly found in web applications. This vulnerability makes it possible for attackers to inject malicious code (e.g.

Cross-site scripting (XSS) is a type of vulnerability commonly found in web applications. This vulnerability makes it possible for attackers to inject malicious code (e.g. JavaScript programs) into victim’s web browser. Using this malicious code, the attackers can steal the victim’s credentials, such as cookies. The access control policies (i.e., the same origin policy) employed by the browser to protect those credentials can be bypassed by exploiting the XSS vulnerability. Vulnerabilities of this kind can potentially lead to large-scale attacks. To demonstrate what attackers can do by exploiting XSS vulnerabilities, we have set up a web application named Elgg in our pre-built Ubuntu VM image. Elgg is an open-source web application for social networking, and it has implemented a number of countermeasures to remedy the XSS threat. To demonstrate how XSS attacks work, we have commented out these countermeasures in Elgg in our installation, intentionally making Elgg vulnerable to XSS attacks. Without the countermeasures, users can post any arbitrary message, including JavaScript programs, to the user profiles. In this lab, students need to exploit this vulnerability to launch an XSS attack on the modified Elgg, in a way that is similar to what Samy Kamkar did to MySpace in 2005 through the notorious Samy worm. The ultimate goal of this attack is to spread an XSS worm among the users, such that whoever views an infected user profile will be infected, and whoever is infected will add you (i.e., the attacker) to his/her friend list. We will need the following: For the Firefox browser, we need to use the LiveHTTPHeaders extension for Firefox to inspect the HTTP requests and responses (available under the “Tools” menu in Firefox). The pre-built Ubuntu VM image provided to you has already installed the with the required extension. The is also included in the pre-built Ubuntu image. However, the web server is not started by default. You have to first start the web server using one of the following two commands: % sudo apache2ctl start or % sudo service apache2 start The is already set up in the pre-built Ubuntu VM image. We have also created several user accounts on the Elgg server and the credentials are given below (username, password): admin, seedelgg alice, seedalice boby, seedboby charlie, seedcharlie samy, seedsamy You can access the Elgg server using the following URL (the Apache server needs to be started first): http://www.xsslabelgg.com (this URL is only accessible from inside of the virtual machine, because we have modified the /etc/hosts file to map the domain name (www.xsslabelgg.com) to the virtual machine’s local IP address 127.0.0.1). Once you log in as a user in Elgg, you can access your Profile and list of Friends by clicking on icons in the upper left part of the browser window. Some of the project tasks require some basic familiarity with JavaScript. Wherever necessary, we provide a sample JavaScript program to you get started In this and next task, we will perform an attack similar to what Samy did to MySpace in 2005 (i.e., the Samy Worm). First, we will write an XSS worm that does not self-propagate; in the next task, we will make it self-propagating. From the previous task, we have learned how to steal the cookies from the victim. In this task, we need to write a malicious JavaScript to forge a HTTP request directly from the victim’s browser. This attack does not require the intervention from the attacker. The JavaScript that can achieve this is called a . This task consists of two independent sub-tasks. The objective of the attack in this subtask is to modify the victim’s profile and add Samy as a friend of the victim. To add a friend for the victim, we should first find out how a legitimate user adds a friend in Elgg. More specifically, we need to figure out what is sent to the server when a user adds a friend. Firefox’s LiveHTTPHeaders extension can us (available under the “Tools” menu in Firefox); it can display the header and contents of any HTTP request message sent from the browser. From this, we can identify all the parameters in the request. There are two common types of HTTP requests, one is HTTP GET request, and the other is HTTP POST request. These two types of HTTP requests differ in how they send the contents of the request to the server. We can use the JavaScript XMLHttpRequest object to send HTTP GET and POST requests to web applications. XMLHttpRequest can only send HTTP requests back to the server, instead of other computers, because the same-origin policy is strongly enforced for XMLHttpRequest. This is not an issue for us, because we do want to use XMLHttpRequest to send a forged HTTP request back to the Elgg server. To learn how to use XMLHttpRequest, you can study these documents: https://www.w3schools.com/xml/ajax_xmlhttprequest_create.asp https://www.w3schools.com/xml/xml_http.asp https://developer.mozilla.org/en-US/docs/AJAX/Getting_Started https://www.tutorialspoint.com/ajax/what_is_xmlhttprequest.htm If you are not familiar with JavaScript programming, we suggest that you study the following documents to learn some basic JavaScript functions. You will have to use some of these functions. Essential Javascript – A Javascript Tutorial: https://www.evl.uic.edu/luc/bvis546/Essential_Javascript_–_A_Javascript_Tutorial.pdf You may also need to debug your JavaScript code. Firebug is a Firefox extension that s you debug JavaScript code. It can point you to the precise places that contain errors. FireBug is already installed in Firefox in our pre-built Ubuntu VM image (available under the “Tools” menu in Firefox). For this subtask, the worm program should do the following: 1. Create the correct request to add Samy to the friends list of the user who is executing the malicious code 2. Forge a HTTP GET request to add Samy as a friend. We provide a skeleton of the JavaScript code that you need to write. This JavaScript code is inserted into user Samy’s profile, and any user that views Samy’s profile will then automatically add Samy as their friend. You need to fill in all the necessary details. When you include the final JavaScript code in the message posted to Samy’s profile, you need to remove all the comments, extra space, and new-line characters. Note that in this case the GET method is used to send the HTTP request. To modify the victim’s profile, the HTTP request sent by the worm should contain the victim’s __elgg_ts and __elgg_token values in the sendurl variable. These details are present in the web page (right-click and “View Page Source”) and the worm needs to find out and use this information using JavaScript code. The sendurl variable should also contain Samy’s id. 1. Based on the format of the GET request to add a friend, write a JavaScript script that adds Samy to the friends list of any user who views Samy’s profile. Save your JavaScript script in a file task4-1.txt. 2. Login as user Samy and inject in the “About me” field of Samy’s profile the script from file task4-1.txt. (Make sure to select “Remove editor” before editing this field, in order to disable any automatic formatting) 3. Logout and login as user Alice, and then view Samy’s profile by selecting user Samy from “More => Members” in the Elgg menu. At this point, the malicious Javascript script will be executed and Samy will be added to Alice’s friend list. 4. a. a screen printout with Alice’s friends list after viewing Samy’s profile. b. a printout of your JavaScript file task4-1.txt. The objective of the attack in this subtask is to modify the victim’s profile “About me” field to show the text “Samy is my HERO”. To do this, we should first find out how a legitimate profile change looks like in Elgg. More specifically, we need to figure out what is sent to the server when a user changes the “About me” field and saves her profile. Firefox’s LiveHTTPHeaders extension can us (available under the “Tools” menu in Firefox); it can display the header and contents of any HTTP request message sent from the browser. From this, we can identify all the needed data in the request. For this subtask, the worm program should do the following: 1. Create the correct request to add a certain piece of text into the profile of a user (the victim) who is viewing Samy’s profile 2. Forge a HTTP POST request to change the profile of the victim user. We provide a skeleton of the JavaScript code that you need to write. This JavaScript code is inserted into user Samy’s profile, and any user that views Samy’s profile will then automatically have their “About me” profile field changed to a certain piece of text. You need to fill in all the necessary details. When you include the final JavaScript code in the message posted to Samy’s profile, you need to remove all the comments, extra space, and new-line characters. Note that in this case the POST method is used to send the HTTP request. To modify the victim’s profile, the HTTP request sent by the worm should contain certain information about the victim in the HTML body of the request (which is sent via the content variable): · The __elgg_ts and __elgg_token values are present in the web page (right-click and “View Page Source”) and the worm needs to find out and use this information using JavaScript code. · The victim’s user name can be obtained using elgg.session.user.name · The victim’s id (guid) can be obtained using elgg.session.user.guid Be careful when dealing with an infected profile. If a profile is already infected by the XSS worm, you may want to leave them alone, instead of modifying them again. If you are not careful, you may end up removing the XSS worm from the profile. 1. Based on the format of the POST request to change a user’s profile, write a JavaScript script that changes the “About me” field in the profile of any user (the victim) who views Samy’s profile. The “About me” field should contain the following text: Samy is my HERO (added by Save your JavaScript script in a file task4-2.txt. 2. Login as user Samy and inject in the “About me” field of Samy’s profile the script from file task4-2.txt. (Make sure to select “Remove editor” before editing this field, in order to disable any automatic formatting) 3. Logout and login as user Alice, and then view Samy’s profile by selecting user Samy from “More => Members” in the Elgg menu. At this point, the malicious Javascript script will be executed and Alice’s profile will be changed. 4. a. a screen printout with Alice’s profile after viewing Samy’s profile.

The assignments have been designed to you integrate and apply the concepts you have learned up to this point. These concepts provide a foundation on

The assignments have been designed to you integrate and apply the concepts you have learned up to this point. These concepts provide a foundation on which other course concepts are built. Assessing your comprehension will ensure that you are on track to successfully complete the course. Refer to the Course Overview for general guidelines on preparing and submitting assignments. Also, be sure to read your instructor’s introductory postings pertinent to the assignments in the Discussions area of the course. The activities in this module have introduced key features of the strategic model. This assignment will test your understanding of these features and what you have learned in Module 1. All of the activities done for this module are the foundation for this assignment; a review of the readings and the activities should reveal the appropriate answers to the questions posed. This assignment consists of two parts: Part A requires an analysis of Best Buy Co. Inc. (as of February 2013), and Part B requires that you submit evidence of your work on the module activities. The assignment is worth 15 per cent of your final grade in the course. . Perform an analysis of Best Buy Co. Inc. Your analysis will draw on the Form 10K (as of February 2013). Your analysis can include information prior to February 2013 but should not draw on any information that you might come across that is post-February 2013. Bear in mind that as a strategic manager you do not have the benefit of foresight and hence your analysis must be confined to the period defined in the Form 10K as of February 2013 for this assignment. Address the following in your analysis: Write a brief report that demonstrates your active participation in the discussions and contributions to your personal journal. Your report should include examples of your postings on the activities, your thoughts and personal musings on the problems and issues introduced in the activities, and a summary of what you learned in this module. In addition, you can refer to questions that arose from your work on the activities. If you replied to questions posed by other class participants, indicate what your replies were and whether the interaction with other participants increased your understanding of course concepts, such as strategy formation and the strategic planning process. DO NOT copy and paste from your personal journal or discussion postings. Part B is an executive summary of the relevant issues/theory raised in the module activities. In addition, present your personal strategic plan (see the Personal Journal: Strategic Planning Process Model activity in Topic 2 of Module 1) and explain clearly what you learned about your strategic choices and decisions. Outline how you could use the strategic model in the future to map your personal progress and career. When you have completed the assignment, send it to your Open Learning Faculty Member using the Assignments function in Blackboard. The assignment must be properly formatted and be professional in appearance. It must include your name, TRU student ID, Course name, assignment number, your TRU or personal email address and your current home mailing address, and other information as described in the course guidelines. Purchase the answer to view it

Module 2 – Reflection: Audience Analysis Conceptual Post a very brief memo (100 words or less) that offers a strategy to determine audience needs in

Module 2 – Reflection: Audience Analysis  Conceptual Post a very brief memo (100 words or less) that offers a strategy to determine audience needs in technical writing. Pages 16 through 19 of the Tebeaux and Dragga textbook offer a series of questions meant to you understand, decipher, and respond to the needs of your likely audiences as a technical writer.  In this Reading Reflection, you should offer at least two additional questions of your own design that can you understand audience needs and wants. You should also provide a brief justification or explanation of what element of audience awareness each question is designed to accomplish. Tebeaux, E., & Dragga, S. (2014). The essentials of technical communication (3rd ed.). New York, NY: Oxford University Press. ISBN: 978-0199379996

Section 5.3, “Contemporary Hardware Platform Trends,” and Section 5.4, “Contemporary Software Platform Trends,” in Ch. 5 of Section 7.1, “Telecommunications and Networking in Today’s Business,”

Section 5.3, “Contemporary Hardware Platform Trends,” and Section 5.4, “Contemporary Software Platform Trends,” in Ch. 5 of Section 7.1, “Telecommunications and Networking in Today’s Business,” in Ch. 7 of a current trend in technology for improving global business that is likely to impact a global business within the next 3 years. a 1,050- to 1,400 word evaluation of the value or expected impact on a global business that the identified trend will likely have over the next 3 years. An evaluation usually involves judgments based on standards, generally accepted criteria, or benchmarks. Alternatively, prepare an 8- to 10-slide Microsoft PowerPoint presentation and script in the speaker notes to present and discuss your evaluation

NO LESS THAN 500 WORDS ESSAY AND REFERENCE MUST BE 5-10 YEARS OLD Per the week 7 lesson and assigned readings provide an overview of

NO LESS THAN 500 WORDS ESSAY AND REFERENCE MUST BE 5-10 YEARS OLD Per the week 7 lesson and assigned readings provide an overview of the rationale as to why some view the American process of rendering criminal justice as a non-system. Further briefly without using quotes give an overview of this article i.e., Smith, D. J. (2011). (Order No. 1503912). Available from ProQuest Dissertations & Theses Global. (916902684). Note: The essay response given should reflect upper-level undergraduate writing in accordance with current APA standards. The essay response is to include in-text citation(s) in proper APA format. In-text citations are to correspond to a source in proper APA format listed after the essay response.

dq1) The Deficit Reduction Act of 2005 and the institution of the Inpatient Prospective Payment System of 2007 were sentinel events for health care leaders

dq1) The Deficit Reduction Act of 2005 and the institution of the  Inpatient Prospective Payment System of 2007 were sentinel events for  health care leaders with respect to quality management and regulatory  compliance. The creation of Present on Admission (POA) and “never  events” accountability required health care leaders to change processes  and to assess and manage potential risks. Additionally, these events  required leaders to effectively intervene for assurance of quality care  or risk denial of payment for services (Youngberg, 2011, pp. 70–71, 78).  The era of accountable care organizations was driven by policy change. Review the Hospital Acquired Condition (HAC) list from Appendix 7-B on page 79 in your text. Imagine that you are the risk manager of an accountable care  organization. Select one never event from the list on page 79 and  describe how you would institute proactive monitoring for POAs. For this  discussion: An outline format is acceptable for this discussion as long as you  include in-text citations. Distinguished posts will describe, in 1–3  sentences, the role of a risk manager and briefly define an accountable  care organization, using a government or other credible industry source.  Additionally, distinguished posts will include a short 3–5 sentence  summary on how to create a culture to enhance voluntary, non-punitive  reporting of “never events.” Include a minimum of one peer-reviewed or  best practice resource. Initial posts should be based upon peer-reviewed, evidence-based  literature. In your post, include at least one APA-formatted in-text  citation and accompanying, congruent APA-formatted reference. Your  source can be a course textbook, assigned reading, or other scholarly  source. Youngberg, B. J. (2011). . Sudbury, MA: Jones and Bartlett. Respond to the posts of other learners according to the Faculty  Expectations Response Guidelines. If possible, respond to one learner  who has a perspective, background, or goals that are similar to yours,  and to one learner whose perspective, background, or goals are  different. Peer responses should be substantive and need to include one  peer-reviewed source that aligns with the discussion thread. You may  feel free to add an additional source that is new or provides a  completely different perspective. “I agree” and “s for sharing your  insights” are examples of responses that do not contribute content for  enhanced learning and are unacceptable. The goal is quality, substantive  feedback that demonstrates higher order critical thinking and  evaluation of peers’ initial posts. dq2) Being part of a close community of people who share your interests  can be a great advantage to your professional and intellectual  development. This course requires you to discover and utilize peer-reviewed and  professional resources for discussions and assignments. For this  discussion’s initial post, share the complete citation of an  article or resource you have discovered. It could be an interesting  source but one not yet used in the course. Provide a brief summary of  the content and what search terms or tactics you used to find this  resource. How useful was the resource? Will it be something you will  continue to refer to throughout the course or in your professional work?  If the resource was not what you needed for your research, would you  recommend it for someone else’s topic? Respond to the posts of other learners according to the Faculty  Expectations Response Guidelines. If possible, respond to one learner  who has a perspective, background, or goals that are similar to yours,  and to one learner whose perspective, background, or goals are  different. In your responses, ask questions or share search terms. This  is a chance for you to discuss the scholarly research process and the  successes you have or obstacles you may encounter. Purchase the answer to view it

Week 3 Assignment: Flashbulb Memories Due Monday by 1:59am Points 75 Submitting a file upload Submit Assignment Required Resources Read/review the following resources for this

Week 3 Assignment: Flashbulb Memories Due Monday by 1:59am Points 75 Submitting a file upload Submit Assignment Required Resources Read/review the following resources for this activity: Instructions Flashbulb memories are memories about a specific event that are so vivid it creates a “snapshot” of the event. Examples of well-known flashbulb memory events include the 9/11 attacks, Challenger disaster, and the MLK or JFK assassinations. Research the phenomenon of flashbulb memories. Discuss the major theorists, main characteristics of flashbulb memories and the major criticisms of these types of memories. Now, identify a personal example of a flashbulb memory and describe in detail what you were doing when you heard the news of this event (what was the time? who were you with? what was the first thing you thought of when you heard the news?). Thinking back to when your flashbulb memory event occurred. How confident are you about the accuracy of your responses about this event? Is the experience of your flashbulb memory event consistent with the characteristics and/or criticisms of flashbulb memories? Writing Requirements (APA format) Textbook: Chapter 6, 7, 8, 9 Lesson Minimum of 2 outside scholarly sources Length: 2-3 pages (not including Title and References pages) 1-inch margins Double spaced 12-point Times New Roman font Running header in the upper left of all pages Page number in the upper right of all pages Parenthetical in-text citations included and formatted in APA style References page (a minimum of 2 outside scholarly sources plus the textbook and/or the weekly lesson) ! 5/22/20, 4:45 PM Page 1 of 4 PSYC110 Week 3 Assignment Rubric Criteria Ratings Pts 10.0 pts 20.0 pts Grading This activity will be graded based on the Essay Grading Rubric. Course Outcomes (CO): 4 Due Date: By 11:59 p.m. MT on Sunday Content 10.0 pts Addresses all aspects of the assignment. 8.5 pts Addresses most aspects of the assignment. 7.5 pts Addresses some aspects of the assignment. 6.0 pts Addresses few aspects of the assignment. 0.0 pts No effort Explanation of Concepts 20.0 pts Thoroughly explains psychological theories and concepts in connection to key course content 17.0 pts Explains psychological theories and concepts in connection to key course content, but more detail could be added. 15.0 pts Adequately explains psychological theories and concepts in connection to key course content. Additional explanation and details are needed to clarify the topic and make link to course content and assignment. 12.0 pts Explanation of psychological theories and concepts is inadequate or unclear. Connections to key course content is inadequate or unclear. 0.0 pts No effort Analysis 20.0 pts The central idea is developed and expanded. 17.0 pts The central idea is discernible 15.0 pts The central idea needs more development 12.0 pts The central idea is not 0.0 pts No effort 5/22/20, 4:45 PM Page 2 of 4 20.0 pts 5.0 pts 5.0 pts Thorough analysis of psychological theories and concepts clearly supports the central idea and displays evidence of a thoughtful in- depth analysis. and developed and basic analysis of key theories and concepts is provided. A more thorough analysis could be included. with points tying back to key psychological theories and concepts. Additional support and details are needed to clarify points. developed, and the analysis lacks critical thought. Source Integration 5.0 pts All required resources are included: 2 outside scholarly sources plus the textbook/online lesson. 4.25 pts Most required resources are included: at least 2 outside scholarly sources, but no textbook/online lesson. 3.75 pts Some required resources are included 1 outside scholarly source plus textbook/online lesson. 3.0 pts Few required resources are included: 1 outside scholarly source or only textbook/online lesson. 0.0 pts No effort Writing: Mechanics & Usage 5.0 pts The writing is free of major errors in grammar, spelling, and punctuation that would detract from a clear reading of the paper. 4.25 pts The writing contains a few major errors in grammar, spelling, and punctuation, but the errors do not detract from a clear reading of the paper. 3.75 pts The writing contains some major errors in grammar, spelling, and punctuation that need to be addressed for a clearer reading of the paper. 3.0 pts The writing contains several major errors in grammar, spelling, and punctuation that impede a clear reading of the paper. 0.0 pts No effort APA Format 5.0 pts Paper is formatted to include all 7 of the following: title page, 1- 4.25 pts Paper is formatted to include 6 of the following: title page, 1-inch 3.75 pts Paper is formatted to include 5 of the following: title page, 1-inch 3.0 pts Paper is formatted to include 4 of the following: title page, 1-inch 0.0 pts No effort 5/22/20, 4:45 PM Page 3 of 4 Total Points: 75.0 5.0 pts 10.0 pts inch margins, double-spaced, 12-point font, Times New Roman, running header, and page numbers. margins, double-spaced, 12-point font, Times New Roman, running header, and page numbers. margins, double-spaced, 12-point font, Times New Roman, running header, and page numbers. margins, double-spaced, 12-point font, Times New Roman, running header, and page numbers. APA Citations & References Page 10.0 pts All sources are properly cited in the text and references page demonstrating a mastery of APA format.. 8.5 pts Most sources are cited in the text and references page. Some minor errors may exist in citation, but it does not interfere with understanding the source of the information. 7.5 pts Most sources are cited in the text and references page. Some errors may exist in citation that need to be addressed to clarify the source of information. 6.0 pts Sources are not properly/cited in the text/references page. Formatting contains several errors that suggest a lack of understanding of APA format. 0.0 pts No effort 5/22/20, 4:45 PM Page 4 of 4