choose 2 3 words from quot gulliver s travels quot part iv a voyage to the country of the houyhnhnms and create an argument about how those words are important to the text

In this project, you will use Voyant Tools to analyze the most common words in a text or texts in

the satire unit. In your essay, choose 2-3 of the words and create an argument about how those

words are important to the text, shape its meaning, reveal information about characters, create

themes, etc. You must refer to specific passages, quotes, and evidence from the story in your

exploration of each of the words. Your essay must be a well-developed, thesis-driven,

argumentative piece. You do not need outside research for this essay. Your analysis should be

driven by your reading of the text(s). Think about the following questions:


What do your selected words show about the themes/main ideas of the work(s)?


What do they reveal about the methods of satire?


What do the words reveal about the author’s style, tone, diction, etc?


How do these words contribute to the deeper meaning of the text?


How do these words connect to the overarching themes of Irish literature?

final project milestone two second part of workbook

In this second milestone of your final project, you will complete the pre-opening strategy tabs in your workbook. You must analyze the cost behaviors and systems of your industry, and conduct the relevant financial calculations to determine appropriate costing solutions. Be sure to use your work from Milestone One to inform your analysis.

To complete this assignment, review the prompt and grading rubric in the Milestone Two Guidelines and Rubric document. When you have finished your work, submit the assignment here for grading and instructor feedback.

Note: Once you submit this assignment, you will be able to view the Milestone Three Income Statement Revenue Information document, which contains additional information you will need in order to complete Milestone Three, which is due next week.

infotech in a global economy 19

Chapter 7 presents a comparative analysis of various tools useful in policy making. Select two tools described in chapter 7 from different categories, and describe how these tools could be used to develop policy for optimizing bus and local train schedules to minimize energy use and passenger wait times in a SmartCity environment.

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, select two tools described in chapter 7 from different categories, and describe how these tools could be used to develop policy for optimizing bus and local train schedules to minimize energy use and passenger wait times in a SmartCity environment.

B) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

discussion 4 provide replies to discussion 7

provide replies to below students posts:

Discussion 7:In terms of network security, what should organizational management allow and what should they block?


Network security management allows the administrator to manage a network consisting of physical and virtual firewalls in a central location. Administrators need network security management solutions to gain high visibility into network behaviors, automate device configuration, enforce global policies, view firewall traffic, create a unique interface for managing and reporting, and manage them.

Organizations now face threats against their information assets. At the same time, they are increasingly dependent on these assets. The rapid increase in the size and complexity of organizational networks will soon be the way forward for manual management. Most information systems are not inherently secure and technical solutions are only part of the holistic approach to information security. In recent years, a number of tools have been developed to automate this process. Establishing information security requirements is essential. However, organizations need to understand their unique threat environment. There are tools that allow to scan networks with multiple vulnerabilities and scan for attacks. In that network security after network security management. (Utz, L. (2018))

In network security organizational management allow :

1. First of all they have to setup a local firewall to prevent some trojans and backdoors.

2. They must install a descent antivirus to prevent from sort of viruses.

3. They must apply authentication and authorization for their services on the basis of layers, that who can access certain stuff, in which some authentication method will be there, like password protection to each user, so particular user if has rights to access then only he or she can.

4. They also has to block some sites which provoke viruses, on the basis of their content.

Saving only the work related data in the network.Complex passwords has to be encouraged. Use network and virus protection tools Provide two step authentication Block. saving employees personal information. Simple passwords has to be blocked intimate the employee the consequences of it. Don’t allow to disclose the company’s sensitive information. (Liu, J. (2018, August)


Organizational management plays a very integral role in the promotion of better delivery and achievement of optimal network security levels. The rationale for the above ideology can be explained from the fact that in as much as best policies guarantee better performance, users of computers and network systems must be closely monitored to ensure that their approach in work does not jeopardize the efforts of the organization in improving network security (Stewart, 2014). In light of the above, there are a number of things that organizational management may allow or block to ensure that network security levels are efficiently optimized.

For instance, management could allow access to the server room. This is because it is important to have an expert, or a team or expert with ready access to the server room in case of the occurrence of any emergency concerning the security of information. However, leaving the server room open should be blocked. That is, it is fundamental that the server room stays locked up and is only accessible by the authorized personnel – all other employees in the organization, without clearance to enter the server room, should be blocked. Notably, the server room stands out as the literal heart of the network security in a given organization and unauthorized access to switches, cables, routers, and the servers, among others, may result to destructive tampering (Kartch, 2017).

The management may allow the employees to bring their own devices to work. More so, they might be allowed the freedom to access any online resoruces using the corporate internet network. However, the above two workplace conveniences are countered with the disallowance of a few related practices. For instance, the management should block the use of home network for work purposes. The reason for the above is because the firewall robustness for the home network cannot be matched with that of the workplace, it is easier for hackers to take that advantage and use it as a loophole to enter into the corporate network system. Additionally, management should ensure that unused computers in the workstation are always disconnected or removed from the systems since they pose as easy entry points for intruders.

Discussion 4:Provide an example based on your professional experience of what motivate hackers to attack computer networks?

16 mins ago

need help with discussion posts 2

Discussion 1:

New/Emerging HIT

Investigate a new or emerging health information technology and describe how and where it is being used. Needs to be a minimum of 250 words and should contain at least 2–3 credible/peer-reviewed references with in-text citations.

Discussion 2:


The development of a work breakdown structure can be challenging. It requires a good understanding of the problem and a good understanding of the proposed solution. The proposed solution must be “broken down” into its major parts, each of which may be further broken down. Comment on your experience in developing a work breakdown structure for your individual project. What was easy? What was difficult? What problems did you encounter and how did you solve them? Needs to be a minimum of 250 words and should contain at least 2–3 credible/peer-reviewed references with in-text citations.

biodiversity how important it is

Biodiversity is incredible important for life on Earth. Every bit of genetic code on this planet to billions of years to develop, and allows for variations and adaptations that we have only begun to explore.

Option 1 – Write up a 3 FULL Page Double Spaced Report on the Importance of Biodiversity

-Title Page Doesn’t Count-
-12 Point Font-
-No Pictures-

Option 2 – Complete a 10 Slide Powerpoint Presentation explaining the Importance of Biodiversity

answer the question and watch the video

Discussion/Response #5: Jazz

    1. Choose one of the pieces from this unit’s listening. OR

    1. Pick one that stands out to you and briefly (1-2 sentences) explain why this particular piece “caught your ear.”
    2. What are the piece’s unique characteristics? BE SPECIFIC and use your textbook as your reference! This should be the main part of your mini-essay. This is not opinion – these are facts that you have researched.
    3. Cite your sources (Links to an external site.) – including your textbook. Points deducted for not citing references. You may use MLA format. (Links to an external site.)
    4. Response should be one-two paragraphs. Use full sentences, no abbreviations, and check your spelling for full credit.

    After posting your response, comment on TWO students’ responses. You may ask a question or demonstrate further understanding of the topic. Questions about CITING your SOURCES? Contact the Writing Center (Links to an external site.)!

social democracy discussion

Socialism was started as a system to protect the laborer from the economic mechanisms of capitalism. Although it does not allow for citizens to reach the economic heights that they can here in the United States, it also is set up to guarantee that the citizens have certain services available to them at all times.


As you have learned in this section, there are several differences between socialist and capitalist economies. Among the most significant of these differences is the high level of consumerism that exists in capitalist countries. Americans, for example, spend 3 to 4 percent more of their time shopping than Europeans. This consumerism in the United States dates back several decades, when it reached new heights in the mid-twentieth century. The trend even received something of an official sanction in 1953 when Arthur Burns, the Chairman of the Economic Advisors Council under President Eisenhower, said that the American economy’s ultimate purpose is to produce more consumer goods.

Consumerism received a further boost from advertisements on television, a new medium that exploded in popularity in the 1950s. In the decades that followed, television commercials, radio spots, magazines, newspapers, and, in recent years, the Internet bombarded consumers with advertisements for an endless array of products. The average American views 3,000 ads in a single day. These advertisements have proven highly effective at creating a desire among the public to buy goods and services in ever increasing amounts. Economists have estimated that consumer spending accounts for 70% of the U.S. economy.

Go online and research social democracy, including some specific examples of how it works in various countries, and then consider the following discussion questions:

  1. What examples, such as health care, social security or employment, can you give that may work better in a socialist nation than a capitalist one? What about in a capitalist nation over a socialist one?
  2. Which system do you feel protects the freedoms of the individual better? Given an example.
  3. As you prepare for life outside of high school, whether it be a job or college, which economic system would you prefer to be a part of right now? Support your answer.


sales management task 8

Task 8

Welcome to Task 8!

An effective recruiting process is the cornerstone of an effective staffing system. Conversely, if recruiting fails to attract enough qualified applicants, none of the other components of the staffing system can function properly.

While the revenue side of a selling organization is important, of equal importance is costs. In fact effectively managing costs distinguishes a thriving business from one that struggles.Another aspect of effective salesforce management include managing sales people performance. Performance evaluation provides a forum for meaningful discourse between the sales associate and the sales manager and orchestrating a plan for future professional development and performance success. However, in order to effectively conduct a performance evaluation it is mandatory that sales managers have a comprehensive understanding of the myriad of performance measures congruent with the particular selling situation.

Read chapters 11, 12, and 13 in your textbook.

We know that the use of selling teams, sometimes including both salespeople and others from the firm, to accomplish relationship selling is common practice today. As with individual salespeople, the success of these teams depends, in part, on the reward system used to motivate and recognize performance. How would you develop a compensation plan that motivates members of a selling team? How can you ensure the plan is fair for everybody involved?

Upload your task using one Word file.

1050 word adolescent essay uop

Consider the following:

Is the experience of being an adolescent the same for males and females? Is it the same across different historical times or eras? What about across different cultures or subpopulations within a culture? This assignment involves exploring similarities and differences in one of these areas. Using the University Library, search for articles that address gender, historical, cultural, or sub-cultural differences in adolescence.

Write a 1,050- to 1,400-word paper summarizing your findings. Your paper should include a brief introduction to the topic, a review of research findings, and a conclusion.

Include at least four references from professional peer-reviewed journals.

Format your paper consistent with APA guidelines.