Learning Activity #1: Week Six Devotional – custom papers

Learning Activity #1: Week Six Devotional
Order Description
Learning Activity #1: Week Six Devotional
Discuss the assigned section of Mere Christianity in this week’s devotions. Specifically consider the quote provided in the devotional section.
Week Six Devotional
The devotional each week is taken from Mere Christianity by C. S. Lewis (which can also be found at https://www.dacc.edu/assets/pdfs/PCM/merechristianitylewis.pdf ). Read through Book III, 11: Faith.
Week Six (From Book 3, Christian Behavior, Faith, pp. 123-124).
Now Faith, in the sense in which I am here using the word, is the art of holding on to things your reason has once accepted, in spite of your changing moods. For moods will change, whatever view your reason takes. I know that by experience. Now that I am a Christian I do have moods in which the whole thing looks very improbable: but when I was an atheist I had moods in which Christianity looked terribly probable.
This rebellion of your moods against your real self is going to come anyway. That is why Faith is such a necessary virtue: unless you teach your moods “where they get off,” you can never be either a sound Christian or even a sound atheist, but just a creature dithering to and from with its beliefs really dependent on the weather and the state of its digestion. Consequently one must train the habit of Faith.
The first step is to recognize the fact that your moods change. The next is to make sure that, if you have once accepted Christianity, then some of its main doctrines shall be deliberately held before your mid for some time every day. That is why daily prayers and religious reading and church going are necessary parts of the Christian life. We have to be continually reminded of what we believe. Neither this belief nor any other will automatically remain alive in the mind. It must be fed. And as a matter of fact, if you examined a hundred people who had lost their faith in Christianity, I wonder how many of them would turn out to have been reasoned out of it by honest argument? Do not most people simply drift away?
Post your thoughts in the discussion forum titled Week Six Devotional. Feel free to respond to other students’ thoughts that enlighten you.

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post Learning Activity #1: Week Six Devotional – custom papers appeared first on The Nursing Hub.

Assignment 1: Standards Research

The following Website may be used for reference to complete this assignment. The Website represents an electronic document titled “Standards Organizations” written by William Stallings (2009), located at http://www.box.net/shared/9dtnzvwys8/1/15730219/164146343/1.

Write a three to four (3-4) page paper in which you:

  1. Select one (1) of the working groups in the IETF or IEEE and briefly summarize what this group is working on.
  2. Justify the need of the IEEE 802 standard used in networking.
  3. Evaluate the three (3) standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.
  4. Take a position on the need for a federal standards agency such as NIST. Include supporting evidence to justify your opinion.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the needs of communication networks in a business environment.
  • Use technology and information resources to research issues in communication networks.
  • Write clearly and concisely about communication networks using proper writing mechanics and technical style conventions.

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post Assignment 1: Standards Research appeared first on My Nursing Experts.

Miscellaneous Poetry Discussion

Answer ALL of the following questions with a well-developed paragraph each.  Please use a quotation from the poem in question to support your answer.  As always, you are encouraged to leave thoughtful feedback on the posts of your peers for possible extra credit.

1) Most people think of poetry as being kind of “decorative” or pretty, but Julia Alvarez clearly believes it can change lives.  Do you agree or disagree?  How does it change the lives of the individual people in the poem?

2) In Edna St. Vincent Millay’s poem, what has the relationship between the woman and men been like when she was young?  What is it like now?  How does she feel about this change?

3) In lines 9 -14, the poem uses a metaphor – it equates the woman with a tree.  Explain this connection and what the metaphor means in terms of the woman’s feelings/relationships/age.a

4)  Write out the rhyme scheme of “What Lips My Lips Have Kissed.”  Review the “Introduction to Poetry” Power Point if you need help.

5) Etheridge Knight, who wrote “Hard Rock Returns,” really did spend time in prison and wrote most of his poems, this one included, while incarcerated.  Do you think that lends his poem more credibility?  How is the tone/content/diction of this poem different from “traditional” poetry?

6) In the last three lines of “Hard Rock Returns…,” Knight uses the following simile:
“The fears of years, like a biting whip,
Had cut deep bloody grooves
Across our backs.”
What image is Knight trying to evoke with this simile, and how does the story of Hard Rock relate to it?

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”

The post Miscellaneous Poetry Discussion appeared first on Nursing Experts Help.

Strayer cis109 week 5 midterm (100% answer)

Question

CIS 109 Week 5 Midterm Exam Intro Mgt. Info Systems

Exam consists of 40 multiple choice questions and covers the material in Chapters 1 through 7

Question 1

The purpose of an information system’s ________ component is generating the most useful type of information for making decisions.

Answer

process

internal data

external data

database

Question 2

Management information system’s (MIS) ________ include programs developed in-house.

Answer

human elements

data processes

hardware components

software components

Question 3

Microsoft Access is an example of ________ in an information system.

Answer

internal data

external data

database management system

knowledge base management system

Question 4

A typical PDA includes a(n) ________.

Answer

external monitor

calendar

mouse

external keyboard

Question 5

The output of an information system is ________.

Answer

data

a database

a process

information

Question 6

Transistor was the major technology used during the _______ generation of hardware.

Answer

first

second

third

fourth

Question 7

In a(n) _______ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number.

Answer

EBCDIC

Unicode

ASCII extended

ASCII

Question 8

Computers and communication systems use ________ to represent and transfer information between computers and network systems.

Answer

Optical character reader (OCR)

light pens

data codes

Magnetic ink character recognition (MICR)

Question 9

________ is a function performed by control programs that controls the transfer of data among parts of a computer system, such as exchange of information between the CPU and I/O devices.

Answer

Job management

Resource allocation

Data management

Communication

Question 10

A _______ is the size of a character.

Answer

nibble

bit

byte

word

Question 11

A(n) _______ is a type of memory that stores data sequentially.

Answer

RAM

magnetic tape

optical disk

RAID

Question 12

Data in a data warehouse can be differentiated from data in a database in that the former _______.

Answer

captures raw transaction data

is used for capturing and managing transactions

comes from a variety of sources

only keeps recent activity in memory

Question 13

The _______ approach to setting up a distributed DBMS combines fragmentation and replication.

Answer

optimization

allocation

encapsulation

normalization

Question 14

Which of the following is true of a database?

Answer

Complex requests can be difficult to handle.

More storage space is required.

Programs and data are interdependent.

More information can be generated from the same data.

Question 15

_______ gives users subtotals of various categories.

Answer

Summary data

Raw data

Open data

Metadata

Question 16

A _______ key uniquely identifies every record in a relational database.

Answer

secondary

foreign

primary

 surrogate

Question 17

A _______ operation searches data in a table and retrieves records based on certain criteria.

Answer

project

join

find

select

Question 18

A database _______ is responsible for data storage, manipulation, and retrieval.

Answer

program

index

system

engine

Question 19

_______ has created decency concerns, because these e-mails often contain explicit language or nudity.

Answer

Phishing

Spoofing

Sniffing

Spamming

Question 20

In the context of the important concepts regarding Web and network privacy, _______ refers to issues involving both the user’s and the organization’s responsibilities and liabilities.

Answer

phishing

nonrepudiation

spoofing

accountability

Question 21

You make two copies of a software package you just bought for personal use, in case the original software fails and you need a backup. This action is ________.

Answer

illegal and unethical

legal but unethical

illegal but ethical

legal and ethical

Question 22

In the context of the important concepts regarding Web and network privacy, ________is a method for binding all the parties to a contract.

Answer

phishing

nonrepudiation

cybersquatting

synchronous

communication

Question 23

Dell, Microsoft, and Unisys Corporation created a partnership to design a voting system for several U.S. states. This is an example of _______.

Answer

cybersquatting

the digital divide

a virtual organization

telecommuting

Question 24

Which of the following is a type of access control?

Answer

Steel encasements

Passwords

Firewalls

Identification badges

Question 25

_______ are usually placed in front of a firewall and can identify attack signatures and trace patterns.

Answer

Intrusion detection systems

Proxy servers

Physical security measures Biometric security measures

Question 26

Which of the following is a physical security measure?

Answer

Electronic trackers

Passwords

Firewalls

Signature analysis

Question 27

_______ security measures use a physiological element to enhance security measures.

Answer

Physical

Social

Biofeedback

Biometric

Question 28

A(n) _______ is often used so remote users have a secure connection to the organization’s network.

Answer

biometric security system

intrusion detection system

virtual private network

terminal resource network

Question 29

A _______ travels from computer to computer in a network, but it does not usually erase data.

Answer

Trojan program

worm

virus backdoor

Question 30

_______ are computer security experts who specialize in penetration testing and other testing methods to ensure that a company’s information systems are secure.

Answer

Script kiddies

Black hats

White hats

Hex editors

Question 31

The amount of data that can be transferred from one point to another in one second is called _______.

Answer

bandwidth

controller

router

protocol

Question 32

The Transmission Control Protocol (TCP) operates at the OSI model’s _______ layer.

Answer

Data link

Physical

Transport

Network

Question 33

The _______ layer of the OSI model serves as the window through which applications access network services.

Answer

Application

Presentation

Network Data link

Question 34

The _______ topology is costly and difficult to maintain and expand.

Answer

star

mesh

ring

bus

Question 35

The most common n-tier architecture involves _______ tiers.

Answer

two

three

four

 five

Question 36

A(n) ____ is an electronic audio file that is posted on the Web for users to download to their mobile devices or computers.

Answer

podcast

RSS feed

blog wiki

Question 37

Which of the following protocols is used for retrieving messages?

Answer

SMTP

POP

HTTP

VoIP

Question 38

A(n) ____ is the address of a document or site on the Internet.

Answer

TLD

URL

IP

DNS

Question 39

The Federal Express Tracking System allows customers to enter a package’s tracking number and locate any package still in the system as well as prepare and print shipping forms, get tracking numbers, and schedule pickups. Federal Express is an example of a(n) ____.

Answer

intranet

Internet

extranet

DMZ

Question 40

A(n) ____ is a journal or newsletter that is updated frequently and intended for the general public.

Answer

podcast

RSS feed

blog

wiki