Entries by Student

write my assignment 13048

Compose a 250 words essay on Introduction to Communication-Creating I Messages-discussion. Needs to be plagiarism free!

These situations could be the temperament and personal mood at the time of communication (Bishop 4). Non- assertive communication is in most cases defensive and irrational. I remember one scenario when I was in a meeting with my business partner. We had agreed on the standard terms for our ERP implementation to one of our clients. A disagreement arose on what duration the implementation of the project would take. A series of questions kept on propping up from my partner. There was a heated disagreement and the discussion turned out acrimonious. My partner in deed had some valid concerns.

Assertive communication in this case would have solved the acrimony. Assertiveness is a skill that needs to be incorporated in day to day communication. When one is tactical in his or her communication, they listen more than they talk. The basis of careful listening is to gain a clear understanding of the other person’s perspective. The result would be a balanced reaction to whatever the issues under discussion. I now have an understanding of assertiveness in communication. It is more productive and it results to tangible

 

"Not answered?"


Get the Answer

write my assignment 13562

You have been investigating an apparent internal attack against your company’s Windows Server 2008 file servers. Suspicious packets have been captured during routine audits. You need to configure Snort to log these suspicious files. Your internal network address is 172.20.0.0 with a subnet mask of 255.240.0.0. Your file servers’ addresses are 172.20.0.12 and 172.20.0.13. Each of these file servers is running Snort as an HIDPS.

The suspicious packets have the following characteristics:

  • ● They have come from different systems inside your network.
  • ● The packets all include the word release between the 1000th and 1100th bytes.
  • ● The packets use TCP as their Transport layer protocol.
  • ● The packets appear to be trying to exploit vulnerabilities in the Windows implementation of SMB over IP.

You need to write a rule to be included in the rules directory of each server’s Snort installa- tion. These two rules must be as specific as possible so that the system logs only the packets that meet the signature of the suspicious network activity. The logged packets should be labeled as “Possible Internal SMB over IP Attack.” You must perform research beyond the scope of this chapter to find the needed information and create the rules. 

 

"Not answered?"


Get the Answer

write my assignment 16134

Please help! Will get brainliest! Must use a graphing calculator!

The table lists the number of fixed telephone lines and cell phone subscriptions per 100 people. Use this information to complete parts a through c.

a. Let F(t) be the number of fixed telephone lines per 100 people. The variable t represents the number of years since 2000. Using a graphing calculator find the equation of F. Use the regression features of your calculator along with the data.

F(t)=

(Round to two decimal places as needed)

Let C(t) be the number of cell phone subscriptions per 100 people The variable t represents the number of years since 2000 use a graphing calculator find the equation of C. Use the regression feature of your calculator along with the data.

C(t)=

(Round to two decimal places as needed)

b. Use intersect on a graphing calculator to estimate when the number of fixed telephone lines per 100 people was equal to the number of cell phone subscriptions per 100 people

The number of fixed telephone lines per 100 people was equal to the number of cell phone subscriptions in the year__

(Round to the nearest year as needed)

c. Predict the total number of fixed telephone lines and cellphone subscriptions per 100 people in 2017.

The total number of fixed telephone lines and cell phone subscriptions per 100 people in 2017 will be about___

(Round to the nearest whole number as needed)

Is the result greater than 100? Explain why this must be possible.

 

"Not answered?"


Get the Answer

write my assignment 7589

150 words minimum to the following questions:

  • It is customary for the News media to report about consumer confidence and investor confidence while discussing the national economy. How do you think the confidence of the economic agents affect the economy? From personal or work experience, state factors that could cause increase in consumer spending and investor investment. Do consumer and investor confidence trend reports affect your spending pattern? Explain.
  • The government purchases component of GDP does not include spending on transfer payments such as Social Security. GDP does not also include the value of used goods that are resold. Do you think such exclusion make GDP a less informative measure of economic well-being? What other production of goods and services do you think are excluded from the GDP? What is the impact of such exclusion on the economic welfare?

 

"Not answered?"


Get the Answer