Biography/Profile

Final Project -Biography/Profile
Instructions   
Remember, for this Final Project, you will do the OPPOSITE of whichever you chose for the ARGUMENT ASSIGNMENT.
Remember at the beginning of class when I said Mental Health was a topic that I thought was not only important, but one that was close to me. Not enough people talk about it. I know this semester has been a struggle, whether academically, emotionally, professionally, or personally. For your final paper, I want you to explore mental health through the various options below.

If it helps, here are a couple of good books & resources that touch upon mental health from various angles.

Furiously Happy by Jenny Lawson, (Don’t) Call me Crazy by Various, The Wicker King by K. Ancrum

The Suicide Hotline & The Trevor Project

SPECIAL NOTES:
For each of the projects (and suboptions) below, you are to draw on all of the knowledge that you’ve learned so far. Who is your audience (hint – not me), what is your chosen appeal and/or approach? Is it necessary for you to consider a counter-argument or a negative proof (something that works against you) to possibly make your piece stronger?

PROFILE PROJECT
If you chose CLASSICAL ARGUMENT, you must do this version.

The Profile Project will consist of two parts.

Part 1) You will first pick a topic surrounding mental health/mental health advocacy. Research people around you, famous people you admire, works of genius, etc. And pick one person who embodies this topic.

(for example: If I am choosing Jenny Lawson, I could pick her Folder of 24)

Part 2) You are to create some sort of project/display about this topic and educating people on it. I don’t want a Kony 2012 awareness campaign, but something meaningful that not only sheds light on a tough topic, but also a helpful and informative project showcasing resources available.

(for example: continuing from above – I could put together a video that demonstrates resources for talking about and sharing mental health issues in order to help others, the way Jennys book helped those 24).

BIOGRAPHY PAPER
If you chose TOULMIN Method, you must do this version.

The Biography Paper will have two sub choices: A or B.

Version A: Creative-Non Fiction

Write a piece of creative non-fiction (think memoir) about yourself. You could write a contained essay, capture a vignette, or a letter to an editor (style). I want you to explore the prompt below:

What does mental health mean to you (or someone close to you)? <– you don’t have to answer literally. You can simply tell a story.

**Note on this: It doesn’t get shared with anyone except for me, so feel free to be as authentic as you wish. If you find yourself straying into the fiction territory, shelf that project for another day and return to non-fiction.

Version B: Formalized Essay

Pick a topic related to mental health that you can research. This must include a thesis, works cited, appropriate citations, introduction, and conclusion.

Course Outcomes
Review and extrapolate the different goals within each medium (news sources, videos, essays, creative non-fiction, arguments, point-counter points, academic journals, etc.) with the intention of being able to recreate the various achievements from each composition, using appropriate documentation systems, to demonstrate understanding including: determining an exigence/intent, distinguishing design/style/genre conventions, identifying intended/key audience and arguments, examining the author’s purpose/tone, and criticizing choices displayed within the rhetorical

Business Law

-Determine if the contracts with the businesses will be governed by common law or the Uniform Commercial Code (UCC), and explain why.
-Analyze whether the owner formed a contract with the businesses, and apply the five essential elements of an enforceable contract.
-Discuss the different employment types and relationships relevant to agency law, and analyze the advantages and disadvantages of each type specific to Acme Fireworks

please provide reply to discussion 3

Note:Please provide reply to below discussion in 150 words.

Professor Note:”You need to demonstrate to me that you read his or her post and that your response relates to their post and not yours.”Please take care of this note.

sruthi—VPN: Virtual Private Networks are the private networks used by the employees or the users to connect remotely to the network or the sites of an organization. VPNs are usually based on Internet connectivity. VPN uses virtual connections through the internet from the private network to assist and allow to connect from remote locations. A VPN maintains the privacy of the data and follow the protocols.

Benefits: We have two types of VPN available. Site-to-site VPN allows internal multiple offices or teams to connect to each other at the fixed location. Remote access VPN allows users to connect to the network of the business of a company from anywhere or remote location securely. The main benefit of deploying the VPN is it secures the sensitive data. It keeps all the malicious websites at bay and prevents from exposing the important data of the company. An employee can access from anywhere in the world by having a secure connection which is provided by VPNs. The VPNs are affordable, and the cost is considerably low. Every company should have VPNs.

Limitations: If at all the internet connectivity is lost, the VPN is lost too. VPN is solely based on internet connectivity. Installation and management of VPN on the client-side is a big expenditure. Sometimes, the VPN can be hacked too and might end up revealing the important information. The connection might become slow sometimes. The data transfer or connecting to someone else’s system might get things slower than usual. Some devices don’t have VPN supporting operating systems and have to manually configure the VPN connection. Free VPNs are always risky. They have security issues.

For example, I work from home every once in a while. I connect to my company’s applications or software only after I connect to the VPN. That helps me to easily access all the applications of the company without any disturbance. VPN might get slow due to my internet connectivity issues since the VPN is primarily based on internet connectivity. The offshore-team in the IT companies connect and access the applications through VPN. It has been an important factor every company should take care of.

Soumya–

A Virtual Private Network (VPN) has become a requirement for companies to protect their data from Internet. VPN doesn’t make a private network, it just hides your identity and make your communications more secure. VPN keeps your identity secure through encryption. With help of Virtual Private Network one can avoid content restrictions and government monitoring. A Virtual Private Network is mostly used to create a private network over public connections.

There are some other options for securing identity and sensitive information like proxy servers and TOR. Proxy servers are not totally secure, but they are available for free. Another popular option is TOR, a browser that encrypts and bounces the communication over other TOR users. A Virtual Private Network is like a middle man between you and internet. For Instance, if there is an emergency issue over a network and employee who must fix the issue is out of station, then he can connect to network remotely through VPN. There are some organizations which give limited access.

Virtual Private Network is available in different types. Each type of VPN offers differ in their scope and level of security. VPN’s can also use different protocols. Let’s look at different types of VPN that are available for internet users.

PPTP is Point to point tunnel protocol is the most commonly used and have been around long time since Windows 95. PPTP is easy to setup but is vulnerable to third parties and hackers. SSTP is Secure Socket Tunnel Protocol, it uses SSL is more advanced and safer than PPTP. SSTP can also be configured to use AES encryption. IPSec/L2TP is Layer 2 Tunnel Protocol doesn’t encrypt but create a tunnel and IPSec handles encryption. This encryption is most effective but impacts the network performance as traffic has to be converted to L2TP with encryption. Open VPN is the safest option and easily configurable on web. Open VPN uses open-source technology and protocols like SSLv3/TLSv1.IKEv2 is Internet Key Exchange is a request/response protocol. IKEv2 uses X509 certificates and a shared key.

Let us discuss some of the advantages of VPN’s

High end encryption keeps the data secure when browsing over a VPN connection.

Geographical freedom, disguising the actual location of user and use can access secure information sitting at home or anywhere in the world.

Sharing critical file over VPN makes them more secure and keep the integrity of the files.

Securing browsing over a public network to secure personal and business information.

There are some limitations to VPN’s listed below

Efficient encryption also comes with network lag.

Encryption requires a lot processing power, to achieve optimal network speed one must pay for a decent VPN service.

To ensure adequate protection of the network, one need to understand network security issues and understand configuration.

Slow VPN is always a problem to determine which server provides optimal speeds required one must try multiple servers.

VPN technology standards and products from different vendors use different equipment, this can lead to technological incompatibilities.

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post please provide reply to discussion 3 appeared first on Essay Writers.

The poet Seamus Heaney

The exact instructions given to me are in the attached document please review it. Need a works cited page with 2 book sources, two online sources, and three sources for each poem used. I would prefer if the poem “North” by Seamus Heaney was used as one of the three because I had written about it before.