Blog

  • You are to provide a training at your agency to provide trauma-informed care to a population experiencing intimate partner violence (you can choose the population, teens, the aging, men, LGBTQ, women, undocumented individuals, individuals with disabilities, et cetera)

    You are to provide a training at your agency to provide trauma-informed care to a population experiencing intimate partner violence (you can choose the population, teens, the aging, men, LGBTQ, women, undocumented individuals, individuals with disabilities, et cetera). Assume the role of clinical supervisor and, in a discussion of at least 350 words, explain how you will help your social work employee apply trauma-informed care to the population of your choice to address intimate partner violence. All posts and responses should be supported by recent scholarly research with proper APA citations and references.

    The post You are to provide a training at your agency to provide trauma-informed care to a population experiencing intimate partner violence (you can choose the population, teens, the aging, men, LGBTQ, women, undocumented individuals, individuals with disabilities, et cetera) first appeared on Courseside Kick.

  • For this assignment, find an online article that refers to a change in the market of a good or service. Once you find an article, answer the following questions. [Note that the word “article” is

    Upload your respond to the Canvas page associated with your assigned Discussion Section 

    For this assignment, find an online article that refers to a change in the market of a good or service. Once you find an article, answer the following questions. [Note that the word “article” is defined loosely. As long as you can provide a link to it and it represents something happening in a real-world market, you can use it.]

    1. What is the title of the article, the date it was written? Paste a link to it.

    2. Summarize what the article says about the change in the market in a few sentences. Be sure that you clearly identify which market you’re talking about.

    3. State if you think that what is described in the article is related to a supply shift, demand shift or both? What direction was the shift or shifts that occurred? Explain the reasoning for your answer.

  • In this assignment you will craft a research paper on a homeland security issue. In the prior assignment, you presented the first three sections of your paper. This week, you

    In this assignment you will craft a research paper on a homeland security issue. In the prior assignment, you presented the first three sections of your paper. This week, you will add the final sections and present the full paper. Be sure to make any changes to your literature review based on instructor feedback. 

    The three main sections you should add to the paper for this submission are the Methodology and Research Strategy, Analysis and Findings, section and the Conclusions/Recommendations section. 

    Methodology and Research Strategy: This section provides the reader with a description of how you carried out your qualitative research project, and the variables you identified and analyzed. It describes any special considerations and defines any limitations and terms specific to this project, if necessary. If you use any data, you will identify the data and its source. This section can be brief or more complicated, depending on the project, written in 1-2 pages. 

    Analysis and Findings: Analysis and findings are not the same as conclusions. In the analysis component of the paper, you identify how you analyzed the data. The second part is the finding you got from your analysis of the data. The findings are the facts that you developed, not your interpretation of the facts. That interpretation is conducted in the conclusions and recommendations section of the paper. Findings will come from the prior research you examined and your analysis of those prior findings to create new findings for your paper. This section should be at least 2-5 pages. 

    Conclusions and Recommendations: is the section where you give your interpretation of the data. Here you tell the reader what the findings mean. Often the conclusions and recommendations sections will mirror the findings in construct as the researcher tells the reader what the researcher sees as the meaning of that data. Then, drawing on those conclusions, the researcher tells the reader what they believe needs to be done to solve/answer the research question. This section may include recognition of any needs for further research and then finishes with a traditional conclusion to the paper as a whole. 

    Remember, your paper should seek to answer a question that helps to solve the research puzzle you identified. 

    Technical Requirements

    • Your paper must be at a minimum of 10-15 pages (the Title and Reference pages do not count towards the minimum limit). This limit includes the earlier sections of the paper completed in the first assignment. Please be sure to read the instructor feedback and incorporate any recommendations for improvement.
    • Scholarly and credible references should be used. At least 8 scholarly sources are required for this assignment.
    • Scholarly sources include peer reviewed articles, government publications, and academic texts.
    • Type in Times New Roman, 12 point, and double space.
    • Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework.
    • Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
    • All submissions will be graded using the assignment rubric.
  • List the risk factors for cerebrovascular accidents and why?

     

    • List the risk factors for cerebrovascular accidents and why?
    • What cultures are at higher risk and why?
    • Describe the 0 to 4+ scale for scoring deep tendon reflexes.
    • What would you expect to find in a patient with diabetic peripheral neuropathy?
    • Share any experience you have encountered and elaborate.

     

    • Your initial post should be at least 500 words, formatted and cited in proper current APA style with support from at least 2 academic sources.

    The post List the risk factors for cerebrovascular accidents and why? first appeared on Courseside Kick.

  • This is designed to deepen your understanding of essential word partsprefixes, roots, and suffixesthat form the foundation of medical terminology

     This is designed to deepen your understanding of essential word partsprefixes, roots, and suffixesthat form the foundation of medical terminology. As you progress, you’ll enhance your language mastery and fluency in the language of medicine.

    Word Part Identification:

    • Review the terms, prefixes, roots, and suffixes from your chapter reading,
    • Identify 10 terms and highlight and define the prefixes, roots, and suffixes within each term.

    Application Exercise:

    • Construct 10 sentences or scenarios using the identified words or word parts.

    The post This is designed to deepen your understanding of essential word partsprefixes, roots, and suffixesthat form the foundation of medical terminology first appeared on Courseside Kick.

  • How can you deal with this patient that insists that his Vodou priest assure him it would be healed without an antibiotics treatment because of the ceremony performed and the spiritual connections he made the night before?

    Instructions:

    You are a provider of a Haitian patient with a severe open wound infection. How can you deal with this patient that insists that his Vodou priest assure him it would be healed without an antibiotics treatment because of the ceremony performed and the spiritual connections he made the night before? 

    Submission Instructions

    • Contribute a minimum of 500 words for your initial post. It should include at least 2 academic sources, formatted and cited in APA.

    The post How can you deal with this patient that insists that his Vodou priest assure him it would be healed without an antibiotics treatment because of the ceremony performed and the spiritual connections he made the night before? first appeared on Courseside Kick.

  • As a leader in the social work field (clinical supervisor, agency director, or academic), how would you frame the issues around the correlation between military service member suicides and moral injury?

    As a leader in the social work field (clinical supervisor, agency director, or academic), how would you frame the issues around the correlation between military service member suicides and moral injury? What steps would you take to identify moral injury and resolve or prevent military members from dying by suicide due to moral injury? Develop a post of at least 350 words, supporting your assertions with properly cited references to recent scholarly research.

    The post As a leader in the social work field (clinical supervisor, agency director, or academic), how would you frame the issues around the correlation between military service member suicides and moral injury? first appeared on Courseside Kick.

  • Part I – Finding Cyber Vulnerabilities (70 Marks)  Task Description and Questions  After implementing the Part I tasks and questions, take screenshots of your work and provide commentary  for each.

    Cyber Vulnerabilities and Data Analytics (MN623 Assessment-3) Assignment Help

    Assessment Details and Submission Guidelines

    Trimester 

    T2, 2024

    Unit Code 

    MN623

    Unit Title 

    Cyber Security and Analytics

    Assessment Type

    Assessment 3 – Group (4-5 Students per group)

    Assessment 

    Title

    Assignment 3 (Cyber Vulnerabilities and Data Analytics)

    Purpose of the 

    assessment (with ULO Mapping)

    This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them. 

    c. Evaluate intelligent security solutions based on data analytics 

    d. Analyze and interpret results from descriptive and predictive data analysis 

    e. Propose cyber security solutions for business case studies

    Weight 

    20%

    Total Marks 

    100

    Word limit for Group Report

    2000-2500 words

    Due Date for submission

    24/9/2024, Week 11

    Submission 

    Guidelines

    All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. 

    The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. 

    Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style.

    Extension 

    If an extension of time to submit work is required, a Special Consideration Application Must be submitted directly through AMS. You must submit this application within three working days of  the assessment due date. Further information is available at: 

    Academic 

    Misconduct

    Academic Misconduct is a serious offense. Depending on the seriousness of the case,penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at. For further information, please refer to the Academic IntegritySection in your Unit Description.

    Use of  

    Generative Artificial  

    Intelligence  (GenAI) in  

    Assessments

    More information about the use of Gen AI in student assessment can be found in the full  policy and procedure available at Further support can be found in the MIT LibGuide: Using Gen AI at MIT 

    Further details on the type of assessment tasks, and whether Gen AI is permitted to be used or  not are provided in the assessment brief.

    Assignment Description 

    The assignment has two parts. 

    Part I: Group Report 

    Part II: Video Demonstration 

    Submission Guidelines: 

    1) Write a group report on the topics listed in Part I. 

    2) Make a group video demonstration of three cyber security tools implemented for writing a  group report. 

    3) Length of Video: The total length of the video presentation should not be more than 9  minutes (marks would be deducted for longer presentation). 

    Note: Put the video link of your group video demonstration in the cover page of your Group Report. 

    Part I – Finding Cyber Vulnerabilities (70 Marks) 

    Task Description and Questions 

    After implementing the Part I tasks and questions, take screenshots of your work and provide commentary  for each. You will create a report based on the following tasks using the vulnerable virtual machines  (vulnerable_vm), including Metasploitable2, DVWA, Mutillidae, and the OWASP Broken Web Applications  Project (OWASP BWA). You may also use OWASP Mantra as your web browser to conduct the tests. 

    Metasploitable2 is a vulnerable virtual machine designed for practicing penetration testing and gaining  unauthorized access to systems. 

    Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application intentionally made vulnerable. It is  divided into sections that focus on different types of vulnerabilities, with lessons and guidelines on how to  exploit them. 

    OWASP Mutillidae is a free, open-source, deliberately vulnerable web application used for web-security  training. It offers numerous vulnerabilities and hints, making it an ideal environment for labs, security  enthusiasts, classrooms, Capture the Flag (CTF) events, and vulnerability assessment tool testing. 

    OWASP Broken Web Applications (BWA) Project provides a collection of vulnerable web applications  designed for security testing. 

    Tasks and Questions

    1. Using the Hackbar Add-on for Parameter Probing: 

    o How can the Hackbar add-on be utilized to streamline parameter probing during security  assessments? (Demonstrate using the SQL injection vulnerability in DVWA). 

    2. Request Viewing and Alteration with ZAP: 

    o How does ZAP facilitate the viewing and alteration of requests to identify potential  vulnerabilities? (Demonstrate using Mutillidae). 

    3. Capabilities of Burp Suite in Security Assessments:

    o What are the capabilities of Burp Suite in viewing and altering requests, and how does it  contribute to security assessments? (Demonstrate using Mutillidae). 

    4. Techniques for Identifying Cross-Site Scripting (XSS) Vulnerabilities: 

    o What techniques are employed in identifying XSS vulnerabilities during security evaluations?  (Demonstrate using DVWA). 

    5. Identifying and Mitigating Error-Based SQL Injection Vulnerabilities: 

    o How can error-based SQL injection vulnerabilities be identified and mitigated during security  assessments? (Demonstrate using DVWA). 

    6. Detecting Blind SQL Injection Vulnerabilities: 

    o What methods are utilized to detect blind SQL injection vulnerabilities, and what are the  associated risks? (Demonstrate using DVWA). 

    7. Identifying and Addressing Cookie Vulnerabilities: 

    o How are vulnerabilities in cookies identified and addressed to enhance web application  security? (Demonstrate using Mutillidae). 

    8. Analyzing SSL/TLS Configurations with SSLScan: 

    o What information can be obtained about SSL and TLS configurations using SSLScan, and how  does it contribute to security assessments? (Demonstrate using OWASP BWA). 

    9. Approaches for Detecting File Inclusion Vulnerabilities: 

    o What approaches are employed in searching for file inclusions as part of security  evaluations? (Demonstrate using DVWA). 

    10. Identifying and Mitigating the POODLE Vulnerability: 

    o How is the POODLE vulnerability identified and mitigated to enhance the security posture of  web applications? (Use the provided script from this link). 

    11. Reporting Defenses Against Cyber Vulnerabilities: 

    o Suggest and report defenses against the cyber vulnerabilities identified and exploited from  points 1 to 10. 

    12. Data Analysis on Selected Datasets: 

    o Demonstrate your data analytic skills on any three datasets available at Fordham  University’s Data Mining Datasets

    13. Classification and Evaluation Using Recent Datasets: 

    o Select a recent dataset from either: 

    IoT-23 Dataset 

    LITNET Dataset 

    o Load the selected dataset into Weka or a tool of your choice, then follow these steps: i. Select the relevant features with rationale (using external references or your own  reasoning). 

    ii. Create training and testing data samples. 

    iii. Classify the network intrusion provided in the sample data. 

    iv. Evaluate the performance of the intrusion detection using available tools and  technologies (e.g., confusion matrix). 

    References: 

    For additional information and to complete Task 13, refer to the following studies: 

    1. Damasevicius, R., Venckauskas, A., Grigaliunas, S., Toldinas, J., Morkevicius, N., Aleliunas, T., & Smuikys, P.  (2020). LITNET-2020: An annotated real-world network flow dataset for network intrusion detection.  Electronics, 9(5), 800.

    2. Larriva-Novo, X., Villagrá, V. A., Vega-Barbas, M., Rivera, D., & Sanz Rodrigo, M. (2021). An IoT-Focused  Intrusion Detection System Approach Based on Preprocessing Characterization for Cybersecurity Datasets.  Sensors, 21(2), 656. 

    3. Tait, Kathryn-Ann, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman,  Wadii Boulila, and Jawad Ahmad. “Intrusion Detection using Machine Learning Techniques: An Experimental  Comparison.” arXiv preprint arXiv:2105.13435 (2021). 

    Part II: Video Demonstration (30 Marks) 

    1. Make a group video demonstration of three cyber security tools implemented for writing a group  report. 

    Marks distribution for this section include marks for Implementation and Demonstration, Presentation  Teamwork and Collaboration, Demo and Viva. 

    Note: 

    If you are using the dataset at a) for your research, please reference it as “Stratosphere Laboratory. A labeled dataset with malicious and benign IoT network traffic. January 22. Agustin Parmisano, Sebastian Garcia, Maria Jose Erquiaga. 

    Students can find “IEEE-Reference-Guide.pdf” available in Assignments Folder after logging into your MOODLE account for referencing purposes.

    Marking criteria for Assignment 3:

    Part I: Group 

    Report

    Description of the section 

    Marks

    Introduction 

    State the general topic and give some background for Part I  points

    5

    Report 

    structure and 

    report 

    presentation

    Writing is clear and relevant, with no grammatical  and/spelling errors – polished and professional. Conforming to the IEEE template and format. 

    Compile a written report along with your evaluations  and recommendations. 

    The report must contain several screenshots of  evidence and a short description for each snapshot that provides 

    proof that you completed the work.

    60

    Conclusion 

    A brief summary of the overall findings in relation to  the purpose of the study. 

    Summary of report argument with concluding ideas that impact the reader.

    3

    References 

    section and 

    body citation

    Must consider at least ten current references 

    from journal/conference papers and books. 

    Strictly follow the order and instruction by IEEE.

    2

    Total 

    Total Marks for Part I: Group Report 

    70

    Part II: Video 

    Demonstration 

    Description of the section 

    Marks

    Implementation  

    and 

    Demonstration

    Implement, analyze and discuss the importance of three  cyber security tools from Part I during group video demo.

    15

    Presentation  

    Teamwork 

    and 

    Collaboration

    The information and technical knowledge are presented clearly and effectively. 

    Excellent teamwork and collaboration skills must be demonstrated

    5

    Demo and Viva 

    Demo and Viva will be conducted in week 11 lab class. 

    10

    Total 

    Total Marks for Part II: Video Demonstration 

    30

    Total 

    Marks

    Total Marks for Part I: Group Report Part II: Video Demonstration

    100

    Example Marking Rubric for Assignment 3

    Grade 

    Mark

    HD 

    80%+

    70%-79%

    CR 

    60%-69%

    50%-59%

    Fail 

    < 50%


    Excellent 

    Very Good 

    Good 

    Satisfactory 

    Unsatisfactory

    Introduction 

    Introduction is 

    clear, easy to 

    follow, well 

    prepared and 

    professional

    Introduction is clear and easy to follow.

    Introduction is 

    clear and 

    understandable

    Makes a basic 

    Introduction to 

    each of your data analytic tools and platforms

    Does not make an introduction to each of 

    your data 

    analytic tools and platforms

    Evaluation

    Logic is clear and easy to follow 

    with strong arguments 

    Demonstrated 

    excellent ability to think critically and sourced reference 

    material 

    appropriately 

    Consistency 

    logical and convincing 

    Demonstrated excellent ability to think critically but did not source reference 

    material 

    appropriately 

    Mostly consistent and convincing 

    Demonstrated 

    ability to think critically and sourced reference material 

    appropriately

    Adequate 

    cohesion and conviction 

    Demonstrated 

    ability to think critically and did not source reference material appropriately

    Argument is confused and disjointed 

    Did not demonstrate 

    ability to think 

    critically and did not source reference 

    material 

    appropriately

    Demonstration

    All elements are present and 

    very well 

    demonstrated.

    Components 

    present with 

    good cohesive

    Components 

    present and 

    mostly well 

    integrated

    Most components present

    Proposal lacks 

    structure.

    Report 

    structure and 

    report 

    presentation 

    Proper writing. Professionally 

    presented

    Properly 

    written, with 

    some minor 

    deficiencies 

    Mostly good, but some structure or presentation 

    problems

    Acceptable 

    presentation

    Poor structure, careless 

    presentation

    Reference style

    Clear styles with excellent sources of references.

    Clear 

    referencing/ 

    style

    Generally good 

    referencing/style

    Unclear 

    referencing/style

    Lacks 

    consistency 

    with many 

    errors

  • Based on what you have learned about business employment law, what three or four concepts, tools, methods, or practices would you recommend as important best-practice approaches to help

    Please respond to the following:

    • Assume you are an HR business partner and leader in a full-size HR department for your organization. Based on what you have learned about business employment law, what three or four concepts, tools, methods, or practices would you recommend as important best-practice approaches to help organizations implement better policies to safeguard against employment law violations? Be sure to explain why you made these particular choices.

    The post Based on what you have learned about business employment law, what three or four concepts, tools, methods, or practices would you recommend as important best-practice approaches to help first appeared on Courseside Kick.

  • This group assignment is the continuation of Assessment 1 case scenarios, MIT’s Alumni  portal project. Students should form groups of three or four members for this assignment.

    Overview of Software Engineering (MN507Assignment-2) Assignment Help

    Assessment Details and Submission Guidelines

    Trimester 

    T2 2024

    Unit Code 

    MN507

    Unit Title 

    Overview of Software Engineering

    Assessment Type 

    Assignment 2-Group Report

    Assessment Title 

    Group Assignment – Design and development of MIT’s Alumni portal

    Purpose of the  assessment (with  ULO Mapping)

    This assignment assesses the basic concepts of professional ethics in IT and maps  with the following ULOs: 

    Understand software engineering principles and design software  processes for business requirements.  

    Understand agile software development practices and analysis, design,  implementation and testing in the context of an agile framework  Compare and contrast different Software Engineering process models:  waterfall, evolutionary, spiral, prototyping and others.  

    Analyze business problems and elicit user requirements using software  engineering methodologies.  

    Use appropriate modeling techniques to model business requirements  and data requirements.  

    Capable of developing architectural designs for software systems and  understanding the different architectural design patterns.  

    Capable of designing and construction of user interfaces.  Software Engineering, specifically related to object-oriented software  engineering.  

    Produce a software system plan and framework including  implementation, deployment, testing, maintenance, and evolution

    Weight 

    20%

    Total Marks 

    100 Marks

    Word limit 

    2,000-2,500 Words or above

    Due Date 

    Friday, 27/09/2024 (Week 11)

    Submission  

    Guidelines

    Generative AI (GenAI) tools may be used with prior permission Students may use GenAI for this formative assessment with prior approval for understanding, learning and research purposes only. Using these tools  to write assignments will be considered as academic misconduct and be  penalized. If students are using any of the information from GenAI, then  he/she must cite the use of Gen AI in their assessment.  

    More information of using GenAI can be found via the following link: 

    All work must be submitted on Moodle by the due date along with a  completed Assignment Cover Page. 

    The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri  (Body) font and 2.54 cm margins on all four sides of your page with 


    appropriate section headings. 

    Reference sources must be cited in the text of the report, and listed  appropriately at the end in a reference list using IEEE referencing style.

    Extension 

    If an extension of time to submit work is required, a Special Consideration  Application must be submitted directly on AMS. You must submit this  application three working days prior to the due date of the assignment.  Further information is available at: 

    Academic  

    Misconduct

    Academic Misconduct is a serious offense. Depending on the seriousness of  the case, penalties can vary from a written warning or zero marks to  exclusion from the course or rescinding the degree. Students should make  themselves familiar with the full policy and procedure available at: For  further information, please refer to the Academic Integrity Section in your Unit Description.

    Assignment Description 

    This group assignment is the continuation of Assessment 1 case scenarios, MIT’s Alumni  portal project. Students should form groups of three or four members for this assignment.  The purpose of this assignment is to analyze, design and implement (coding, building, and  testing) the project. 

    MIT would like your group writing up a report, which contains the following activities for  designing and developing the Alumni portal: 

    1. Product Roadmap to outline a general timeframe (e.g., Gantt Chart) for when your  group will design, develop, and release identified requirements from Assessment 1. 

    2. The SRS document (a sample template in Moodle) which contains the following design  elements (using UML notations): 

    Identify and draw a use case diagram(s) for MIT’s Alumni portal 

    ER diagram with all possible entities and attributes 

    State chart diagram(s) 

    Sequence diagram(s) 

    Class diagram for the entire system with all the attributes, methods, and  associations. 

    3. The design document must include layered architecture and implement using the tools and platform of your choice, a software application with a front-end GUI,  middle layer implementing the business logic and backend database. 

    4. Your group also requires designing a test specification (test cases) based on the project requirements and implementing (verification) them with evidence. 

    The report contents should include the following headings: 

    a. Cover page and your group details 

    b. Executive Summary (state system overview, system users, and system usability) c. Table of Contents 

    d. Introduction 

    e. Discussions (expand and explain your group’s supportive arguments) 

    f. Conclusion and recommendations 

    g. References and appendices 

    References 

    Must consider at least eight references (with at least five current references – not earlier  than 2020). Must follow the IEEE referencing style. 

    Assignment Instructions: 

    Do not use Wikipedia as a source or a reference. 

    • Make sure you properly reference. 

    Marking Guide for Assignment 1

    Description 

    Weight

    Introduction 

    8

    Product roadmap (Gantt Chart) 

    10

    Use Case Diagram (at least 8 use cases) 

    8

    ER diagram 

    8

    State chart diagram(s) 

    8

    Sequence Diagram 

    8

    Class Diagram 

    8

    System Architecture (Layered based) 

    8

    GUI Portal 

    10

    Requirement Verification and Validation 

    15

    Conclusion & Recommendation 

    4

    References and Appendices 

    5

    Total 

    100