Entries by Student

write my assignment 24777

Write 14 pages thesis on the topic cognitive psychology and its application to brain, mind, and beliefs of a person. It is from this point that Cognitive Psychology came into being.

In 1879 a laboratory opened at the University of Leipzig in which, for the first time, scientific methods were being used to study human behavior and its antecedent, the origins of thought in human beings. This was the laboratory of Wilhelm Wundt. However, even before Wundt began his experimental studies, others were setting the stage for applying scientific methods to thought processes, most notably Gustav Fechner.

Gustav Fechner was a physician who early in his career suffered (while doing research) a painful injury to his eyes which left him temporarily blind and changed the direction of his studies and research into the realm of thought and perception. In 1848 his first work in this area was published, Nanna, oder Über das Seelenleben der Pflanzen. In Nanna, and in his subsequent work, Zend-Avesta (1851), Fechner proposed a mind/body view that, while it retained some dualism of mind and body, proposed and developed the unity of mind and body working together for processes such as thought and perception to occur. 1 In his Elemente de Psychophysik (1860),

he articulated for the first time science of the relationship between physical and mental phenomena in which he attempted to demonstrate that mind and matter are different means of the conception of the same reality.2 And Fechner also had a contemporary Von Helmholtz who along with him was laying the foundations for what would eventually become cognitive psychology.

Another Prussian physician, Hermann von Helmholtz, a contemporary of Fechner, was also investigating the relationship between the physical and the mental. However, he was specifically focusing on the process of perception. From 1856 to 1866, his Handbuch der physiologischen Optik was published in several parts. His theory of perception was that an automatic and unconscious process of sensation and a conscious, logical process of inference of external characteristics are both needed for perceptions to occur.

 

"Not answered?"


Get the Answer

write my assignment 28897

Read this excerpt from The Time Traveller by H.G. Wells and then answer the question that follows:

“Now I want you clearly to understand that this lever, being pressed over, sends the machine gliding into the future, and this other reverses the motion. I am going to press the lever, and off the machine will go. It will vanish, pass into future Time, and disappear. Have a good look at the thing. Look at the table too, and satisfy yourselves there is no trickery. I don’t want to waste this model, and then be told I’m a quack.”

There was a minute’s pause perhaps. The Psychologist seemed about to speak to me, but changed his mind. Then the Time Traveller put forth his finger towards the lever. He sent forth the model Time Machine on its interminable voyage. We all saw the lever turn. I am absolutely certain there was no trickery. There was a breath of wind, and the lamp flame jumped. One of the candles on the mantel was blown out, and the little machine suddenly swung round, became indistinct, was seen as a ghost; and it was gone要anished!

Which of the following is an example of theme in this excerpt?

Question #1

Time travel

Friends are enemies.

Seeing is believing.

Machinery

Question 2

Which of the following is an example of a common topic?

Anyone can be brave.

Freedom takes sacrifice.

The box was broken.

Bravery

Question 3(

Read this story and then answer the question that follows:

Sarah saw them, again. Out of the corner of her eye she could see the kids ganging up on the new girl, Lara. She was late to her band practice and only had a few minutes to get there. “I barely know her,” she muttered to herself as she walked quickly to the car. “I’m sure she can take care of herself.” Sarah knew this was an important rehearsal and could not miss it. “Hurry up,” shouted her mom from the driver’s seat. Sarah threw her guitar in the back seat and slammed the door. “Let’s go,” she said. As they rounded the corner and stopped at the stop sign揺er heart racing祐arah looked at her mom. “Mom, Lara needs our help. Let’s go back.”

Which of the following is an example of the topic in this story?

Friendship

Violence

Responsibility

Music

Question 4

Read this excerpt from The Time Traveller by H.G. Wells and then answer the question that follows:

“Now I want you clearly to understand that this lever, being pressed over, sends the machine gliding into the future, and this other reverses the motion. I am going to press the lever, and off the machine will go. It will vanish, pass into future Time, and disappear. Have a good look at the thing. Look at the table too, and satisfy yourselves there is no trickery. I don’t want to waste this model, and then be told I’m a quack.”

There was a minute’s pause perhaps. The Psychologist seemed about to speak to me, but changed his mind. Then the Time Traveller put forth his finger towards the lever. He sent forth the model Time Machine on its interminable voyage. We all saw the lever turn. I am absolutely certain there was no trickery. There was a breath of wind, and the lamp flame jumped. One of the candles on the mantel was blown out, and the little machine suddenly swung round, became indistinct, was seen as a ghost; and it was gone要anished!

Which of the following is an example of the topic in this excerpt?

Time travel

Friends are enemies.

Seeing is believing.

Machinery

 

"Not answered?"


Get the Answer

write my assignment 30478

I need help with this project.

Project 1

Scenario Characters:

You: Information Security Specialist, Greenwood Company

Hubert Jenkins: Human Resources Director, Greenwood Company

Mike McBride: (former) engineer, New Product’s Division, Greenwood Co.

**Characters will carry through Project 1, 2 and the Final Project. However, please remain conscience of who you are/what roll you play in EACH project and in regards to specific questions.

For the purposes of this project, imagine you are an Information Security (InfoSec) Specialist,an employee of the Greenwood Company, assigned to the company’s Incident Response Team.

In this case, you have been notified by Mr. Hubert Jenkins, Human Resources Director for the Greenwood Company, that the company has just terminated Mr. Mike McBride, a former engineer in the company’s New Products Division, for cause (consistent tardiness and absences from work).  Mr. Jenkins tells you that at Mr. McBride’s exit interviewearlier that day, the terminated employee made several statements to the effect of “it is okay because I have a new job already and they were VERY happy to have me come from Greenwood, with ALL I have to offer.”  McBride’s statements made Mr. Jenkins fear he might be taking Greenwood’s intellectual property with him to his new employer (undoubtedly a Greenwood competitor).  In particular, Mr. Jenkins is worried about the loss of the source code for “Product X,” which the company is counting on to earn millions in revenue over the next three years.  Mr. Jenkins provides you a copy of the source code to use in your investigation.  Lastly, Mr. Jenkins tells you to remember that the Company wants to retain the option to refer the investigation to law enforcement in the future, so anything you do should be with thought about later potential admissibility in court.

The 4th Amendment to the U.S. Constitution reads, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”  While the 4th Amendment is most commonly interpreted to only affect/restrict governmental power (e.g., law enforcement), the fact that a formal criminal investigation is a possibility (and the Company has no desire to be named in a civil lawsuit) means you must consider its effect your actions.

With the above scenario in mind, thoroughly answer the following questions (in paragraph format, properly citing outside research, where appropriate).

  1. Prior to any incident happening, it is important for any company to implement a “forensic readiness” plan. Discuss the benefits of a forensic readiness plan and name what you believe are the top 3 requirements to establish forensic readiness within a private sector business. Support your answers. (Please note that while cyber security and digital forensics have overlaps in incident response preparation, please limit your answers here to forensic readiness in the digital forensic arena, not cyber security.)
  2. Mr. Jenkins, out of concern for the theft/sharing of the “Product X” source code, is pushing requesting that you or your supervisor start searching the areas in which Mr. McBride had access within the building. Can (or Mr. McBrides’s supervisor) search McBrides’s assigned locker in the Company’s on-site gym for digital evidence?  Support your answer.
  3. Can (or Mr. McBrides’s supervisor) use a master key to search McBrides’s locked desk for digital evidence after McBride has left the premises?  Support your answer.
  4. The police have not been called or involved yet, however, Ms. Jenkins asks how involving the police will change your incident response. Develop a response to Mr. Jenkins that addresses how the parameters of search and seizure will change by involving the police in the investigation at this time. Support your answer.
  5. There is a page in the Company’s “Employee Handbook” that states that anything brought onto the Company’s property, including the employees themselves, is subject to random search for items belonging to the Company.  There is a space for the employee to acknowledge receipt of this notice.  Mr. McBride has a copy of the handbook but never signed the page. Does that matter? Explain.
  6. Greenwood Company uses a security checkpoint at the entrance to the building. A sign adjacent to the checkpoint states that the purpose of the checkpoint is for security staff to check for weapons or other materials that may be detrimental to the working environment or employee safety. Screening is casual and usually consists of verification of an employee’s Company ID card. Can security staff at this checkpoint be directed to open Mr. McBrides’s briefcase and seize any potential digital evidence?  Support your answer.
  7. You know that it is important to document the details of your investigation if the company wants to insure admissibility of any evidence collected in the future. However, Mr. Jenkins has never heard of the term “chain of custody.” Write an explanation to Mr. Jenkins of what the chain of custody is, why it is important, and what could occur if the chain of custody is not documented. Support your answer.

 

"Not answered?"


Get the Answer

write my assignment 8573

This assignment covers 1 story selected from the list below:* Sherman Alexie, “This is What it Means to Say Phoenix, Arizona”* Richard Wright, “Big Black Good Man”* Edgar Allen Poe, “Cask of Amontillado”* James Joyce, “Araby”Identify the story you chose, and answer the following questions thoughtfully:1. Describe what happens in the story and the primary message the story is trying to communicate.2. Describe how this message is portrayed within the story. Is the message portrayed through imagery, description, what happens to the characters, how the characters react, or what the characters say?3. Does the point of view of the story match its characters? Is the story happening to them, or is there more to the story than what we can glean from the point of view of the characters? Provide 2 examples from the story to illustrate your answer.4. What symbols are used in the story? What represents another possible layer of meaning or interpretation?

 

"Not answered?"


Get the Answer