Persuasive essay, must be done APA style
Essay should include a thesis statement, clear position on chosen topic, acknowledgement of the opposing view, clear purpose and direction, and effective conclusion.
Three reliable sources with in text and reference citations are required to support your position.
Topic can be any except:
Abortion, Euthanasia, Capital Punishment, Cloning, Affirmative Action, Gun Control, Eating Disorders, Legalization of Marijuana, Same Sex Marriage, Animal Rights, any other topic that has been done millions of times before
Requirements:
1000 words
APA Format with title page, introduction, body, conclusion, and reference page
Author: admin
-
Title: The Benefits of Implementing Mandatory Recycling Programs in Schools
-
“Finding the Equation of a Circle Passing Through Given Points”
Learning Goal: I’m working on a mathematics writing question and need the explanation and answer to help me learn.
A circle centre C(5, 5) passes through points A(1, 3) and B(a, 9). Find the equation of the circle and hence the possible values of a. -
Title: “Examining the Impact of the US Tax Structure on Low-Income Individuals: An Analysis of its Design and Effectiveness” References: 1. Smeeding, T. M., & Thompson, J. P. (201
US Tax Structure is it designed to help the poor? Research Paper
Provide at least 5 references/2 must be scholarly books or journals.
double spaced without the title page and the page on references -
“Strengthening Your Argument: The Importance of Credibility and Evidence in Effective Writing”
In this module, we start the synthesis paper, which is 25% of the class grade. In this essay, you all will create an argument in response to one of two questions about effective ways of writing and, throughout the essay, will establish your credibility, your ethos, by providing a section that informs your reader about the topic, two sections defending your claim, and a section acknowledging and responding to the opinions of others. You all will also provide evidence for your claim using other sources, you will address an academic audience, and you will establish a clear purpose: to argue a position. If all of this seems familiar, it is because you all are applying the academic writing standards discussed in the beginning of the course and evaluated in the previous essay.
For this essay, I am not requiring an outline but will provide one for those who would like to use it. This module’s discussion board is meant to act as another form of prewriting that will familiarize you all with the sources available to back up or develop your thoughts in essay three and to plot your course using them. To accomplish this, you all will be completing an exercise that combines two familiar composition techniques. The first is somewhat of an abbreviated outline, and the second emulates an annotated bibliography, which is often used to help students evaluate and plot the placement of sources. The main idea behind this is to examine the sources closely and decide what information will fit best where. Many of my students express frustration with not knowing what kind of information to borrow and include in their essays, and this exercise tends to exactly that. Normally an annotated bibliography would also provide a summary of each source, but you all did that for some of them last week. After this, the hardest part is over and all that is left is filling in your own thoughts. Many English 1023 teachers assign annotated bibliographies, in their complete form, so please use this as an opportunity to prepare for what might come.
I am also releasing some supplementary web sites and videos on argumentation. As you all complete this essay, remember that it is important to formulate your own opinion before seeking the opinion of others; in any paper such as this, though, your opinion might change, and that is perfectly fine. I created these prompts, these questions (each of you has the option to respond to one of two prompts), because the topic is relatable to you all, which will hopefully make the assignment somewhat easier. Please make sure to read and observe the guidelines and regulations on the assignment sheet; the regulations for this essay, the synthesis paper that requires you all incorporate a minimum of three sources in an essay of a set length, are the standard requirements for all English 1013 courses. My best advice in creating this essay is to use what you know! Based on you all’s experiences using the process throughout this semester, everyone should be able to write essay with no sources at all (but don’t do that), which is all part of the plan: I wanted to reinforce the idea that personal opinions and experiences are important and are used in all forms of communication, but how you all present those opinions is what matters. -
“Uplifting LGBTQ+ Voices in History: A Proposal for the Congressional Statue of Audre Lorde” Introduction Throughout history, the contributions of marginalized communities, including the LGBTQ+ community, have often been overlooked and underrepresented. This is
In 2020, there has been a great deal of discussion over historical statues of the past that offend our modern-day sensibilities due to the atrocities those who have statues dedicated to them participated in or the values that they stood for. We are going to be positive. Every state in the country has two statues erected in the congressional dome memorializing individuals from their home state. Now, I am not going to limit you to only choosing an individual from Illinois. But you will need to choose one LGBTQ+ individual who you believe deserves their statue in the Congressional rotunda. You will be required to write a five-page argument to Congress explaining why they need to erect a statue to this individual. This paper is to be written in the style of a formal proposal—you will be constructing an argument, with evidence, explaining why Congress should erect this statue.
There should be a title page with all identifying information that is separate. Please use 1.5 spacing in this paper; you must cite if you borrow from other sources. You must use MLA or the Chicago style (Turabian) when writing this paper. You are certainly encouraged to write more than five full pages, but anything less than five will be substantially reduced. -
Basic Wireshark Lab Assignment “Exploring Network Commands, Timestamps, and Event Identification: A Comprehensive Analysis” Basic Wireshark and Nmap Lab Assessment “Network Scanning and Intrusive Techniques: A Comprehensive Analysis Using Nmap” “NMAP and Zenmap Lab: Network Enumeration and Identification” Part 1: Screenshots: 1. Windows 10 IP address: [insert screenshot of Windows 10 IP address] 2. Kali IP address: [insert screenshot of
1st task:
This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
Basic Wireshark Lab – Rubric
Rubric Criteria:
Criteria Desсrіption
Part 1: Screenshots
5. Target
12 points
Includes all of the screenshots of Wireshark tasks, including: Kali Linux VM starts a Wireshark packet capture and shows all network traffic, identification of the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark, adds an ICMP filter and pings the Windows 10 VM, adds an IP Address filter with the Windows 10 VM IP Address and runs an NMAP Service Scan against the Windows 10 VM IP Address, researches and applies two additional filters that demonstrate their effect on the capture, saves the captured packets to a file using their last name as the file name, and closes the capture session and then loads the capture file that was saved.
4. Acceptable
10.44 points
Includes most of the screenshots of Wireshark tasks, including: Kali Linux VM starts a Wireshark packet capture and shows all network traffic, the identification of the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark, adds an ICMP filter and pings the Windows 10 VM, adds an IP Address filter with the Windows 10 VM IP Address and runs an NMAP Service Scan against the Windows 10 VM IP Address, researches and applies two additional filters that demonstrate their effect on the capture, saves the captured packets to a file using their last name as the file name, and closes the capture session and then loads the capture file that was saved.
3. Approaching
9.48 points
Includes some of the screenshots of Wireshark tasks, including: Kali Linux VM starts a Wireshark packet capture and shows all network traffic, the identification of the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark, adds an ICMP filter and pings the Windows 10 VM, adds an IP Address filter with the Windows 10 VM IP Address and runs an NMAP Service Scan against the Windows 10 VM IP Address, researches and applies two additional filters that demonstrate their effect on the capture, saves the captured packets to a file using their last name as the file name, and closes the capture session and then loads the capture file that was saved.
2. Insufficient
8.88 points
Includes a few of the screenshots of Wireshark tasks, including: Kali Linux VM starts a Wireshark packet capture and shows all network traffic, the identification of the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark, adds an ICMP filter and pings the Windows 10 VM, adds an IP Address filter with the Windows 10 VM IP Address and runs an NMAP Service Scan against the Windows 10 VM IP Address, researches and applies two additional filters that demonstrate their effect on the capture, saves the captured packets to a file using their last name as the file name, and closes the capture session and then loads the capture file that was saved.
1. Unsatisfactory
0 points
Does not include the screenshots of Wireshark tasks, including: Kali Linux VM starts a Wireshark packet capture and shows all network traffic, the identification of the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark, adds an ICMP filter and pings the Windows 10 VM, adds an IP Address filter with the Windows 10 VM IP Address and runs an NMAP Service Scan against the Windows 10 VM IP Address, researches and applies two additional filters that demonstrate their effect on the capture, saves the captured packets to a file using their last name as the file name, and/or closes the capture session and then loads the capture file that was saved.
Criteria Desсrіption
Part 2: Kali IP Address, Windows IP Address, and Commands
5. Target
4 points
Specifically includes the Kali IP address, the Windows IP address, and the command used to change directory/folder, move a file, remove a file, and create a new directory/folder; comprehensively identifies and explains the commands.
4. Acceptable
3.48 points
N/A
3. Approaching
3.16 points
Partially includes the Kali IP address, the Windows IP address, and the command used to change directory/folder, move a file, remove a file, and create a new directory/folder; broadly identifies and explains the commands.
2. Insufficient
2.96 points
N/A
1. Unsatisfactory
0 points
Does not include the Kali IP address, the Windows IP address, and the commands used to change directory/folder, move a file, remove a file, and creates a new directory/folder; does not identify and/or explain the commands.
Criteria Desсrіption
Part 2: Importance of a Timestamp and Other Logging Tools
5. Target
4 points
Includes a thorough explanation of why a timestamp is important on Wireshark, as well as other logging tools.
4. Acceptable
3.48 points
Includes a clear explanation of why a timestamp is important on Wireshark, as well as other logging tools.
3. Approaching
3.16 points
Includes a surface-level explanation of why a timestamp is important on Wireshark, as well as other logging tools.
2. Insufficient
2.96 points
Includes a vague and/or incomplete explanation of why a timestamp is important on Wireshark, as well as other logging tools.
1. Unsatisfactory
0 points
Does not include an explanation of why a timestamp is important on Wireshark, as well as other logging tools.
Criteria Desсrіption
Part 2: List of Well-Known Ports and Associated Protocols
5. Target
4 points
Includes an in-depth list of well-known ports and associated protocols.
4. Acceptable
3.48 points
Includes an appropriate list of well-known ports and associated protocols.
3. Approaching
3.16 points
Includes a minimal list of well-known ports and associated protocols.
2. Insufficient
2.96 points
Includes an incomplete list of well-known ports and associated protocols.
1. Unsatisfactory
0 points
Does not include a list of well-known ports and/or associated protocols.
Criteria Desсrіption
Part 2: Explanation of the Differences Between a Port and a Protocol
5. Target
4 points
The explanation of the differences between a port and a protocol is accurate and comprehensive.
4. Acceptable
3.48 points
The explanation of the differences between a port and a protocol is accurate.
3. Approaching
3.16 points
The explanation of the differences between a port and a protocol is brief.
2. Insufficient
2.96 points
The explanation of the differences between a port and a protocol is inaccurate.
1. Unsatisfactory
0 points
Does not include an explanation of the differences between a port and a protocol.
Criteria Desсrіption
Part 2: Identifying Events
5. Target
4 points
Expertly describes how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
4. Acceptable
3.48 points
Succinctly describes how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
3. Approaching
3.16 points
Generally describes how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
2. Insufficient
2.96 points
Poorly describes how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
1. Unsatisfactory
0 points
Does not describe how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
Mechanics of Writing
4 points
Criteria Desсrіption
Includes spelling, capitalization, punctuation, grammar, language use, sentence structure, etc.
5. Target
4 points
No mechanical errors are present. Skilled control of language choice and sentence structure are used throughout.
4. Acceptable
3.48 points
Few mechanical errors are present. Suitable language choice and sentence structure are used.
3. Approaching
3.16 points
Occasional mechanical errors are present. Language choice is generally appropriate. Varied sentence structure is attempted.
2. Insufficient
2.96 points
Frequent and repetitive mechanical errors are present. Inconsistencies in language choice or sentence structure are recurrent.
1. Unsatisfactory
0 points
Errors in grammar or syntax are pervasive and impede meaning. Incorrect language choice or sentence structure errors are found throughout.
Format/Documentation
4 points
Criteria Desсrіption
Uses appropriate style, such as APA, MLA, etc., for college, subject, and level; documents sources using citations, footnotes, references, bibliography, etc., appropriate to assignment and discipline.
5. Target
4 points
No errors in formatting or documentation are present. Selectivity in the use of direct quotations and synthesis of sources is demonstrated.
4. Acceptable
3.48 points
Appropriate format and documentation are used with only minor errors.
3. Approaching
3.16 points
Appropriate format and documentation are used, although there are some obvious errors.
2. Insufficient
2.96 points
Appropriate format is attempted, but some elements are missing. Frequent errors in documentation of sources are evident.
1. Unsatisfactory
0 points
Appropriate format is not used. No documentation of sources is provided.
Assignment one.
Basic Wireshark Lab
Assessment Desсrіption
By gaining an understanding of the basic protocol analyzer (Wireshark), students will be able to set up and read basic digital traffic, including:
· Gaining a foundational understanding of logging
· Identifying the source and destination IPs
· Translating IP addresses into websites
· Identifying ports and protocols
· Creating a timeline of events
View ″2-3 Wireshark Lab,″ from the video playlist located in Class Resources. In this lab, you will explore some basic Wireshark and Linux commands. (https://www.youtube.com/watch?v=jVG7Yoghphc&list=PLfSk-dHOm3SC32JVL_set6NumaLO221Zn&index=8)
Part 1:
Complete the following Wireshark tasks and capture screenshots of each task result:
· On the Kali Linux VM, start a Wireshark packet capture and show all network traffic.
· Identify the IP addresses for the Kali Linux and Windows 10 VMs from within Wireshark.
· Add an ICMP filter and ping the Windows 10 VM.
· Add an IP Address filter with the Windows 10 VM IP Address and run an Nmap service scan against the Windows 10 VM IP Address.
· Research and apply two additional filters to demonstrate their effect on the capture.
· Save the captured packets to a file using your last name as the file name.
· Close the capture session and then load the capture file that you saved.
Part 2:
Write a 250- to 500-word summary addressing the following:
· Your Kali IP address.
· The Windows IP Address.
· For both Windows and Linux, identify and explain the following commands:
– Command used to change directory/folder
– Command that moves a file
– Command that removes a file
– Command that creates a new directory/folder
· An explanation for why a timestamp is important on Wireshark, as well as other logging tools.
· A list of 10 well-known ports and associated protocols.
· A brief explanation of the difference between a port and a protocol.
· Describe how Wireshark can be used to identify events that indicate an attack is in progress or has happened.
Place all screenshots in a Microsoft Word document and submit it to the assignment dropbox. When submitting screenshots as part of your assignment, you must always include a full image of your desktop window, including the date and time in the lower right-hand corner of the Windows desktop or the upper-right corner of the macOS desktop.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines.
2nd task:
Nmap and Zenmap Lab – Rubric
Rubric Criteria
This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
Criteria Desсrіption
Part 1: Screenshots
5. Target
20 points
Includes all of the screenshots of the Windows 10 IP address, student′s Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video.
4. Acceptable
17.4 points
Includes most of the screenshots of the Windows 10 IP address, student′s Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video.
3. Approaching
15.8 points
Includes some of the screenshots of the Windows 10 IP address, student′s Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video.
2. Insufficient
14.8 points
Includes a few of the screenshots of the Windows 10 IP address, student′s Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video.
1. Unsatisfactory
0 points
The screenshots of the Windows 10 IP address, student′s Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video are not included.
Criteria Desсrіption
Part 2: Operating System
5. Target
4 points
Clearly identifies what operating system is running on the Windows 10 system.
4. Acceptable
3.48 points
N/A
3. Approaching
3.16 points
Identifies what operating system is running on the Windows 10 system in an unclear and/or in concise manner.
2. Insufficient
2.96 points
N/A
1. Unsatisfactory
0 points
Does not identify what operating system is running on the Windows 10 system.
Criteria Desсrіption
Part 2: Intrusive Scan
5. Target
4 points
Comprehensively describes what is meant by an intrusive scan.
4. Acceptable
3.48 points
Clearly describes what is meant by an intrusive scan.
3. Approaching
3.16 points
Broadly describes what is meant by an intrusive scan.
2. Insufficient
2.96 points
Incomprehensively describes what is meant by an intrusive scan.
1. Unsatisfactory
0 points
Does not include a desсrіption of what is meant by an intrusive scan.
Criteria Desсrіption
Part 2: Nmap Summary
5. Target
4 points
Summary of what the two additional Nmap scans do is compelling, with screenshots.
4. Acceptable
3.48 points
Summary of what the two additional Nmap scans do is desсrіptive, with screenshots.
3. Approaching
3.16 points
Summary of what the two additional Nmap scans do is basic, but screenshots are included.
2. Insufficient
2.96 points
Summary of what the two additional Nmap scans do is lacking details, but screenshots are included.
1. Unsatisfactory
0 points
Summary of what the two additional Nmap scans do is not included.
Criteria Desсrіption
Includes spelling, capitalization, punctuation, grammar, language use, sentence structure, etc.
5. Target
4 points
No mechanical errors are present. Skilled control of language choice and sentence structure are used throughout.
4. Acceptable
3.48 points
Few mechanical errors are present. Suitable language choice and sentence structure are used.
3. Approaching
3.16 points
Occasional mechanical errors are present. Language choice is generally appropriate. Varied sentence structure is attempted.
2. Insufficient
2.96 points
Frequent and repetitive mechanical errors are present. Inconsistencies in language choice or sentence structure are recurrent.
1. Unsatisfactory
0 points
Errors in grammar or syntax are pervasive and impede meaning. Incorrect language choice or sentence structure errors are found throughout.
Criteria Desсrіption
Uses appropriate style, such as APA, MLA, etc., for college, subject, and level; documents sources using citations, footnotes, references, bibliography, etc., appropriate to assignment and discipline.
5. Target
4 points
No errors in formatting or documentation are present. Selectivity in the use of direct quotations and synthesis of sources is demonstrated.
4. Acceptable
3.48 points
Appropriate format and documentation are used with only minor errors.
3. Approaching
3.16 points
Appropriate format and documentation are used, although there are some obvious errors.
2. Insufficient
2.96 points
Appropriate format is attempted, but some elements are missing. Frequent errors in documentation of sources are evident.
1. Unsatisfactory
0 points
Appropriate format is not used. No documentation of sources is provided.
Nmap and Zenmap Lab
Assessment Desсrіption
Using NMAP and Zenmap set the foundation for enumeration and network identification.
View ″2-2 NMAP and Zenmap Lab″ and ″Warriors of the Net,″ from the playlist located in Class Resources. (https://www.youtube.com/watch?v=js2vtJBGH0o&list=PLfSk-dHOm3SC32JVL_set6NumaLO221Zn&index=7)
Part 1:
In this lab, you will use NMAP and Zenmap setup, basic scanning, and network topology. Provide screenshots of your Windows 10 IP address, your Kali IP address, Netdiscover, nmap -sn (Ping) scan, nmap -sV (Services) scan, nmap -A (Intrusive) scan, Zenmap network topology, and two additional nmap scans not covered in the video.
Part 2:
Write a 250- to 500-word summary addressing the following:
· Identify what operating system is running on your Windows 10 system.
· Describe what is meant by an intrusive scan.
· Summarize what your two additional NMAP scans do and provide screenshots.
Place all screenshots in a Microsoft Word document and submit it to the assignment dropbox. When submitting screenshots as part of your assignment, you must always include a full image of your desktop window, including the date and time in the lower right-hand corner of the Windows desktop or the upper-right corner of the macOS desktop.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines. -
Title: Addressing Socio-Economic Disparities in Doctor-Patient Communication for Equitable Health Care
Based on reading https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3317830/Links to an external site.
“A prerequisite for equity in health is equity in health care, defined as equal care for people in equal need of care.”
Discuss one (1) aspect of doctor-patient communication that varies according to the socio-economic status of the patient – be specific about what aspect of the consultation is affected.
Discuss one (1) proposed solution. You can agree or disagree and state why. -
Title: Case Management for the Homeless Population in Massachusetts Case Management Manual: “Homeless Services Case Management Manual” by the Massachusetts Department of Housing and Community Development (DHCD) Link: https://www.mass.gov/doc/homeless-services-case
Massachusetts please
Research case management manuals on the internet.
Then, select a case management manual, which serves one of the populations described in chapter 9 and report on how they work with the population in your initial post. Suggested populations include health care including hospice or chronic illness, mental health, addictions, child welfare, geriatrics, criminal justice, HIV/AIDS, military and veterans, rural communities or the homeless population.
In your post, provide a link to the case management manual you have chosen and state which model of case management is being used. Then, answer one of the following questions:
What are some of the evidence-based interventions and community resources they utilize?
How do they deal with problematic situations (such as some of those discussed in chapter 9)?
Does the agency run into any ethical or legal issues? If so, how they dealt with them?
In your response to your classmates, identify a different case management theory and intervention strategy than the one your classmate observed and describe how that case management model and intervention strategy could work for the agency and why. -
Title: Analyzing the Legal Implications of the XYZ Case
Please view the edits suggested by the teacher in the Word document. Teacher edits are in yellow. The case pertaining to the essay is attached as well.
-
“Transforming Healthcare Leadership: Organizational Structure and Workflow Diagram for the Capstone Project”
Assignment Content
Capstone Project: Part 4 – Organizational Structure and Workflow Diagram
Part 4 – Organizational Structure and Workflow Diagram of your Capstone Project invites you to consider the shapes leadership can take when ideas in transformational leadership are applied to running a health care program.
Review and complete Part 4 – Organizational Structure and Workflow Diagram. Rely on the reading and resources for this week to inform your work.
Capstone Project
Capstone Project Formulas and Examples
Cite any references to support your assignment.
Format your citations according to APA guidelines.
Submit your assignment.