Here specs any help on python how this program?

The general form of a distance query is:

https://maps.googleapis.com/maps/api/distancematrix/json?parameters

where parameters denotes a series of parameters. The parameters we will use are:

·      origins: the origin city and state[1]

·      destinations: the destination city and state

·      sensor: false, which tells the server that your application does not use a GPS locator

·      mode: one of ‘driving’, ‘biking, or ‘walking’

There are no spaces in the query. Parameter assignments are separated using the ampersand (&) symbol and words in the city are separated using the plus (+) sign. 

Some examples are listed next. Copy and paste each one into a browser to see what is returned. Then in own examples to see how changing parameter values changes the response you get back. What happens, for instance, if you make up some city names and/or state abbreviations? What happens if there is not roadway between the origin and destination?

Parsing the Result

As distance calculation is part of the map API, and not its own API, the entire result is returned as a single string, which must be parsed. The string returned by the first query above, which finds the driving distance between New York, NY and Lansing, MI, is as follows:

You will need to parse this string to extract the information required. You need to extract the value , which is the number of meters from Lansing to New York.

In testing queries, you should have discovered that the server “guesses” a location if it cannot exactly match the values indicated for the cities. Your program does not need to check that the response is for the correct location—just assume that the distance returned in a response is correct. But your program does need to handle the situation where the response does not contain a distance. (See below.)

Project Description / Specification

Need class called Tour. An instance of this class is to be instantiated with two US cities, and is used to fetch information from the web. Specifically, the class must define:

  1. __init__ The constructor takes two strings as arguments, each giving a city name and state abbreviation, indicating the origin and destination. For example: Tour(“New York, NY”, “Los Angeles, CA”)represents a tour that starts in New York city and ends in Los Angeles.
  2. distance This method takes a single (optional) argument indicating a mode – one of the strings ‘driving’ (default), ‘biking, or ‘walking’. It returns the total distance (in meters) covered by the tour for the indicated mode. This method is where you will use urllib functions to get data from the web to find the distances between two locations in the tour and calculate the total distance. If a response does not contain a distance value, the method should raise a ValueError exception.

Graphical User Interface Description:

Need class called TourGui. An instance of this class is to be instantiated in the main. Specifically the class must define:

1.    __init__ The constructor doesn’t take any arguments. The constructor creates two frames in the window, a top frame and buttom frame. The top frame contains a label and an entry widget for the following fields: origin, destination, and mode. The bottom frame contains a label and text widget for Distance and a button widget for Get Distnace. The GUI should like the following:

2.    onClick This method is the event handler for the Get Distance Button. When the button is clicked, the origin, destination and mode fields are read, the query is made and the distance between the origin and the destination is displayed. If the user enters an invalid mode, a message box shows up indicating invalid mode was entered:

If the distance was not found between the origin and the destination, a message box shows up indicating the distance was not found:

[1] The parameter names are plural because you can request a distance matrix, indicating distances between a set of potential origins and a set of potential destinations. However, we will just use a single city for each.

  • Attachment 1
  • Attachment 2

Final ProjectParsing the Result*BackgroundAs distance calculation is part of the map API , and not its own API , the entire result is returned as aThe acronym API is short for* Application Programming Interface . " It is usually a collection ofsingle string , which must be parsed . The string returned by the first query above , which finds thefunctions , methods or classes that supports the interaction of an application program ( the program Youdriving distance between New York, NY and Lansing . INIT, is as follows :`write as a developer ; with other programs that run on a remote server . Google has several API’S*available for developers ( https : / / developers . google . com ) to query information from services google*provides such as google map . We will be using the map API for purposes of finding distances between" DESTINATION SQUEEGEES“ [ " LANSING , MI , USA " ] .cities in the U . S Lavon as Google Map Distance Matrix API" DELIQUID. Add^FERRER“ [ "NEW YORK, NY , USA " ] .(https : // developers . google . com maps / documentation distance _ matrix ] . It is based on creating a queryusing the http protocol of the web . Essentially , you send a web address ( with the query embedded in" ELETIENES* " : [the web address ) and a web page is returned with the requested information , albeit in a rather odd form( It is not HINI format ) ." DIEFENCE."" 1, 092 KITI "`$ 1091921The general form of a distance query is :`if" durationhttps : / / maps . google apis . com /’ maps / api /’ distance matrix ,’ jeon ? ParameterE*"10 hours 12 quizz "`KATHIE" : 3571 1Where parameters denotes a series of parameters . The parameters we will use are`" Status. " : " OK?"origins . the origin city and state !*destinations : the destination city and statesensor : false , which tells the server that your application does not use a GPS locator*trade : one of" driving ,"biking , or" walking*" statue* " : " OR "There are no spaces in the query . Parameter assignments are separated using the ampersand (^)symbol and words in the city are separated using the plus ( + ) sign .`You will need to parse this string to extract the information required . In this response , You will need toSome examples are listed next . Copy and paste each one into a browser to see what is returned . Then*extract the value 1091921 , Which is the number of meters from Lansing to New York .create your own examples to see how changing parameter values changes the response you get back.What happens , for instance , if you make up some city mathes and or state abbreviations ? What happensIn testing queries . You should have discovered that the server " guesses" a location if it cannot exactlyif there is not roadway between the origin and destination ?"match the values indicated for the cities . Four program does not need to check that the response is forthe correct location – just assume that the distance returned in a response is correct . But Your programhttps: / / maps . Food leapis . com / maps / api / distance matrix / is on ? origins = New + York’ + NY & destinatidoes need to handle the situation where the response does not contain a distance . ( See below . )Ons = Lansing + M| { mode = driving “ sensor = false aker = AlEasy AFH IF SE 3_ SKQ C Kh H Wudwho E Com NRdavEQProject Description / Specification*https: "/ maps . googleapis . com / maps/ ani/ distancematrix ison ? origins = Lansing + MIT &c destinations = SacranCreate a class called Tour . An instance of this class is to be instantiated with two ITS cities , and isEnto + [ Act_made = bicycling < sensor = False & Key = AlzaSy AF H I F S E 3_ OKD C Kh H Wudwho E Com N RdavEQused to fetch information from the web . Specifically , the class must define :`1 .init, The constructor takes two strings as arguments , each giving a city name and stateabbreviation , indicating the origin and destination . For example : Tour !" NEW York , NY"!" LOS ANGELES ,CA " / represents a tour that starts in New York city and ends in LosAngeles .2.distance. This method takes a single ( optional ) argument indicating a made – one of thestrings " driving ‘ ( default ) . " biking , or "walking ‘ . It returns the total distance ( inmeters ) covered by the tour for the indicated made . This method is where you will use willitfunctions to get data from the web to find the distances between the locations in the tour andcalculate the total distance . If a response does not contain a distance value , the method shouldraise a ValueFRERE exception .The parameter names are plural because you can request a distance matrix , indicating distances*between a set of potential origins and a set of potential destinations . However , we will just use a single

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Final Project Milestone 3: Intervention Strategy and Implementation Plan Draft 

For Milestone Three, building upon your work for Milestone Two, you will submit a draft of the intervention strategy and implementation plan for your grant proposal. Your draft will answer all of the critical elements in Section III (Intervention Strategy) and Section IV (Implementation Draft) of your final project.

Minimum 6 FULL pages formatted in APA

Review Grading Rubric for details (attached)

5 References must be included and should be cited within text and on the Reference Page (***sources recommended from the library)

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Final Project: Literature Review 

Overview: This final project is based on the general topics of Robotics and Artificial Intelligence as they apply to your major. From this, you must develop a specific topic and possibly a research question. You must then locate 4-6 peer-reviewed journal articles which will itemized in your Reference Page (APA, IEEE, AMA, or MLA citation style). Your Lit Review will be about two pages in length or a little longer (academic style), plus a Reference Page.

Details:  1a) Watch at least two of the YouTube videos on the GettingStarted handout (Take notes.).   Read the background articles on Robotics and Artificial Intelligence.

1b) The aim of your Lit Review is to identify a gap in the current research and create a niche.   The Introduction establishes a problem in the current state of understanding and research,    and it concludes with the Research Question and possible Thesis Statement which define a    gap and introduce your niche. The Main Body of the Lit review is where you synthesize    sources according to topics. The Discussion Section describes how your niche might be    exploited to better understand your thesis.

2) Develop a topic related to your major, and narrow this into an ORIGINAL research question.  Use the “Narrowing a Topic” handout for additional guidance.

3) Conduct a Lit Search using key words, quotations, and Boolean logic markers. Choose 4-6  sources that best support your research question. You may briefly cite these in the Lit  Review. You are advised that, for your own protection, you must not recycle a previous  project or share sources.

4) Create a thesis statement (which will define your topic) like this: “The aim of this thesis is to  explore (your topic/thesis). . . “ You may follow this with a research question. All of this  will appear at the end of your introduction.

5) For the Reference Page, you may consult the Purdue Owl (online) for IEEE, APA, AMA, and  MLA 

The aim of a literature review is to show your reader that you have read, and have a good grasp of, the main published work in the context of a particular topic or question in your field. This work may be in any format, including online sources. For this assignment, you should use mostly academic (scholarly) articles from peer-reviewed journals. It is best to use articles that are recent (no more than five years old). A literature review may be a separate assignment, or one of the introductory sections of a report, dissertation, or thesis. In the latter cases in particular, the review will be guided by your research objective or by the issue or thesis you are arguing and will provide the framework for your further work.

It is very important to note that your review should not be simply a description of what others have published in the form of a set of summaries, or a personal observation of a topic, but should take the form of a critical discussion, showing insight and an awareness of differing arguments, theories, and approaches. It should be a synthesis and analysis of the relevant published work, linked at all times to your own purpose and rationale (i.e., your research question).

According to Caulley (1992) of La Trobe University, the literature review should:

  • compare and contrast different authors’ views on an      issue

  • group authors who draw similar conclusions

  • criticize aspects of methodology

  • note areas in which authors are in disagreement
•      highlight exemplary studies

  • highlight gaps      in research

  • show how your study relates to previous studies

  • show how your study relates to the literature in      general

  • conclude by summarizing what the literature says

The purposes of the review are:

  • to define and limit the problem you are working on

  • to place your study in an historical perspective

  • to avoid unnecessary duplication

  • to evaluate promising research methods

  • to relate your findings to previous knowledge in      the context of identifying the gap      and 

establishing your research niche.

A good literature review, therefore, is critical of what has been written, identifies areas of controversy, raises questions, and identifies areas that need further research. Your final paper should include 4-6 sources and should be between 2 pages in length or a little more (NOT including the title and reference pages). At the end of your literature review, you should include a paragraph that predicts or hypothesizes an answer(s) to your research question. DO NOT make this paragraph a separate section. Also, there is no “Conclusion” section to this paper.

Finally, be sure to cite all of your sources. Paraphrase (rather than direct quote) as much as possible. You are limited to two brief direct quotes. Use them wisely, if at all. Check your reference list to be sure it includes all of the sources you cited in your paper. DO NOT include any source in your reference list that you did not cite in your paper.

Discussion OR Conclusion

Here you can bring together your findings of what has and has not been accomplished in previous research related to your thesis. If gaps have not been clearly identified in the introduction or let review section, they should be stated here along with your niche, which is in the form of a research question and/or thesis statement, which describes what you would plan to add to the research conversation 

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Final Project Instructions

A term paper on an environmental problem of your choosing. It should be creative and interesting, and should be a minimum of six pages in length not to exceed eight pages. It should be well-organized and demonstrate an orderly flow of information that clearly addresses the subject chosen.

You should incorporate the following elements in the project:

  1. Problem identification: Clearly indicate the issue you will discuss and the influence this problem has on land, air, water resources, plant life, animal life, and human societies. Discuss the long-term effects this problem will continue to create without a comprehensive solution. The problem can be of local, national, or global scope.
  2. Solutions currently implemented: Discuss how the issue has been addressed historically. Determine the courses of action taken in science, technology, political and economic systems, laws and regulations, community-based initiatives, education, and so forth. Review the successes and limitations of these actions.
  3. Recommendations: Explain the actions that you believe need to be developed and implemented to accomplish change. Discuss your solution from multiple perspectives, such as educational, legislative, scientific, technological, economic, and other points of view.

In addition you should cite at least three other credible sources. Put these on your last page as works cited. You are cautioned to check out internet sources. The web abounds with junk science that is totally unreliable. Be sure to cross check your sources.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Final Project: Incident Response Exercise & Report

Your Task

You have been assigned to work incident clean-up as part of the Sifers-Grayson Blue Team. Your task is to assist in analyzing and documenting the incident described below. The Blue Team has already created a set of enterprise architecture diagrams (see figures 1-4) to help with your analysis of the incident and preparation of the incident report as required by the company’s contracts with the federal government. After completing their penetration tests, the Red Team provided Sifers-Grayson executives with a diagram showing their analysis of the threat environment and potential weaknesses in the company’s security posture for the R&D DevOps Lab (see figure 5).

Your Deliverable

Complete and submit the Incident Report form found at the end of this file. Consult the “Notes to Students” for additional directions regarding completion of the form.

Overview of the Incident

Sifers-Grayson hired a cybersecurity consulting firm to help it meet the security requirements of a contract with a federal agency. The consulting firm’s Red Team conducted a penetration test and was able to gain access to the engineering center’s R&D servers by hacking into the enterprise network through an unprotected network connection (see figure 2). The Red Team proceeded to exfiltrate files from those servers and managed to steal 100% of the design documents and source code for the AX10 Drone System. The Red Team also reported that it had stolen passwords for 20% of the employee logins using keylogging software installed on USB keys that were left on the lunch table in the headquarters building employee lounge (see Figure 3). The Red Team also noted that the Sifers-Grayson employees were quite friendly and talkative as they opened the RFID controlled doors for the “new folks” on the engineering staff (who were actually Red Teamers).

The Red Team continued its efforts to penetrate the enterprise and used a stolen login to install malware over the network onto a workstation connected to a PROM burner in the R&D DevOps lab (See Figure 3). This malware made its way onto a PROM that was then installed in an AX10-a test vehicle undergoing flight trials at the Sifers-Grayson test range (See Figures 1 and 4). The malware “phoned home” to the Red Team over a cellular connection to the R&D center. The Red Team took control of the test vehicle and flew it from the test range to a safe landing in the parking lot at Sifers-Grayson headquarters.

Background

Sifers-Grayson is a family owned business headquartered in Grayson County, Kentucky, USA. The company’s physical address is 1555 Pine Knob Trail, Pine Knob, KY 42721. The president of the company is Ira John Sifers, III. He is the great-grandson of one of the company’s founders and is also the head of the engineering department. The chief operating officer is Michael Coles, Jr. who is Ira John’s great nephew. Mary Beth Sifers is the chief financial officer and also serves as the head of personnel for the company. 

Recent contracts with the Departments of Defense and Homeland Security have imposed additional security requirements upon the company and its R&D DevOps and SCADA labs operations. The company is now required to comply with NIST Special Publication 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. The company must also comply with provisions of the Defense Federal Acquisition Regulations (DFARS) including section 252-204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting. These requirements are designed to ensure that sensitive technical information, provided by the federal government and stored on computer systems in the Sifers-Grayson R&D DevOps and SCADA labs, is protected from unauthorized disclosure. This information includes software designs and source code. The contract requirements also mandate that Sifers-Grayson report cyber incidents to the federal government in a timely manner.

SCADA Lab

The SCADA lab was originally setup in 1974. It has been upgraded and rehabbed several times since then. The most recent hardware and software upgrades were completed three years ago after the lab was hit with a ransomware attack that exploited several Windows XP vulnerabilities. At that time, the engineering and design workstations were upgraded to Windows 8.1 professional. A second successful ransomware attack occurred three months ago. The company paid the ransom in both cases because the lab did not have file backups that it could use to recover the damaged files (in the first case) and did not have system backups that it could use to rebuild the system hard drives (in the second case).

The SCADA Lab is locked into using Windows 8.1. The planned transition to Windows 10 is on indefinite hold due to technical problems encountered during previous attempts to modify required software applications to work under the new version of the operating system. This means that an incident response and recovery capability for the lab must support the Windows 8.1 operating system and its utilities.

R&D DevOps Lab

The R&D DevOps Lab was built in 2010 and is used to develop, integrate, test, support, and maintain software and firmware (software embedded in chips) for the company’s robots, drones, and non-SCADA industrial control systems product lines. The workstations in this lab are running Windows 10 and are configured to receive security updates per Microsoft’s monthly schedule. 

Enterprise IT Operations

The company uses a combination of Windows 10 workstations and laptops as the foundation of its enterprise IT capabilities. The servers in the data center and the engineering R&D center are built upon Windows Server 2012. 

Issues Summary:

  1. Newly won government contracts now      require compliance with DFARS §252.204-7008, 7009, and 7012 

– http://www.acq.osd.mil/dpap/dars/dfars/html/current/252204.htm 

– http://www.acq.osd.mil/se/docs/DFARS-guide.pdf 

  1. Derivative requirements include:

– Implementation of and compliance with NIST SP 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations  https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r1.pdf 

– Compliance with DFARS 252.239-7009 Representation of Use of Cloud Computing and 7010 Cloud Computing Services (see https://www.acq.osd.mil/dpap/dars/dfars/html/current/252239.htm#252.239-7009

  1. Additional Contractual Requirements      for Lab Operations include:

– Incident Response per NIST SP-800-61 (Computer Security Incident Handling Guide)

– SCADA Security per NIST SP 800-82 (Guide to Industrial Control Systems Security)

– Software / Systems Development Lifecycle (SDLC) Security per NIST SP 800-64 (Security Considerations in the System Development Life Cycle)

– Configuration Management per NIST SP 800-128 (Guide for Security-Focused Configuration Management of Information Systems) 

Notes to Students: 

1. Your final deliverable should be professionally formatted and should not exceed 10 pages. The goal is to be clear and concise in your reporting of your analysis of this incident. This report should reflect your learning and analysis. For that reason, the citation rules are relaxed and you may write from your own knowledge as an “expert.” BUT, if you paste exact phrases, sentences, or paragraphs from another document or resource, you must cite that source using an appropriate citation style (e.g. footnotes, end notes, in-text citations).

2. You may include annotated diagrams if necessary to illustrate your analysis and/or make your point(s). You may use the figures in this assignment as the foundation for diagrams in your final report (no citations required).

3. Use the NIST Incident Handling Process (see Table 1) to guide your incident analysis. You do not need to cite a source for this table.

4. You may assume that the company has implemented one or more of the IT products that you recommended in your Case Studies for this course. You may also assume that the company is using the incident response guidance documents that you wrote for your labs and that the associated operating systems utilities are in use (e.g. you can assume that system backups are being made, etc.). 

5. DOCUMENT YOUR ASSUMPTIONS about people, processes, and technologies as if they were fact. But, don’t change any of the factual information provided in the incident report from the Red Team. 

6. Use the incident report form that appears at the end of this file. Copy it to a new MS Word document. Insert a title page at the beginning of your file and include the title of the report, your name, and the due date. 

7. After you perform your incident analysis, fill in the required information in the provided form (see the end of this file). Attach the file to your assignment folder entry, and submit it for grading as your final project.

8. For section 1 of the form, use your own name but provide reasonable but fictitious information for the remaining fields. 

9. For section 2 of the form, assign IP addresses in the following ranges to any servers, workstations, or network connections that you need to discuss.

a. R&D Center 10.10.120.0/24

b. Test Range 10.10.128.0/24

c. Corporate Headquarters 10.10.135.0/24

10. For sections 2, 3, and 5, you should use and interpret information provided in this file (Overview, Background, Issues Summary). You may use a judicious amount of creativity, if necessary, to fill in any missing information. 

11. For section 4 of the form you may provide a fictitious cost estimate based upon $100 per hour for IT staff to perform “clean-up” activities. Reasonable estimates are probably in the range of 150 to 300 person hours. What’s important is that you document how you arrived at your cost estimate.

12. Discuss the contract requirements and derivative requirements for cybersecurity at Sifers-Grayson in 3 to 5 paragraphs under “Section 6 General Comments.”

Words for   the Wise …

Do not let “perfection” be a barrier to completing this   assignment. It’s more importation to be on-time and provide SOME analysis in   a professional format than to find and document every single possible   vulnerability.

Figure 1. Overview of Sifers-Grayson Enterprise IT Architecture 

Figure 2. Combined Network and Systems Views:

Sifers-Grayson Headquarters, R&D Center, and Data Center

Figure 3. Combined Network and Systems View for Sifers-Grayson R&D DevOps Lab

Figure 4. Combined Communications and Systems Views for Sifers-Grayson Test Range

Figure 5. Threat Landscape for Sifers-Grayson R&D DevOps Lab

NIST Incident Handling Checklist by Phase

Detection and Analysis 

1. 

Determine whether an incident has   occurred 

1.1 

Analyze the precursors and   indicators 

1.2 

Look for correlating information 

1.3 

Perform research (e.g., search   engines, knowledge base) 

1.4 

As soon as the handler believes an   incident has occurred, begin documenting the investigation and gathering   evidence 

2. 

Prioritize handling the incident   based on the relevant factors (functional impact, information impact,   recoverability effort, etc.) 

3. 

Report the incident to the   appropriate internal personnel and external organizations 

Containment, Eradication, and Recovery   

4. 

Acquire, preserve, secure, and   document evidence 

5. 

Contain the incident 

6. 

Eradicate the incident 

6.1 

Identify and mitigate all   vulnerabilities that were exploited 

6.2 

Remove malware, inappropriate   materials, and other components 

6.3 

If more affected hosts are   discovered (e.g., new malware infections), repeat the Detection and Analysis   steps (1.1, 1.2) to identify all other affected hosts, then contain (5) and   eradicate (6) the incident for them 

7. 

Recover from the incident 

7.1 

Return affected systems to an   operationally ready state 

7.2 

Confirm that the affected systems   are functioning normally 

7.3 

If necessary, implement additional   monitoring to look for future related activity 

Post-Incident Activity 

8. 

Create a follow-up report 

9. 

Hold a lessons learned meeting   (mandatory for major incidents, optional otherwise) 

Source: NIST SP 800-61r2

Cichonski, P., Millar, T., Grance, T., & Scarfone, K. (2012). Computer security incident handling guide (NIST SP 800-62 rev. 2). http://dx.doi.org/10.6028/NIST.SP.800-61r2

SIFERS-GRAYSON CYBERSECURITY INCIDENT REPORT FORM

1. Contact Information for the Incident Reporter and Handler 

– Name 

– Role 

– Organizational unit (e.g., agency, department, division, team) and affiliation 

– Email address 

– Phone number 

– Location (e.g., mailing address, office room number) 

2. Incident Details 

– Status change date/timestamps (including time zone): when the incident started, when the incident was discovered/detected, when the incident was reported, when the incident was resolved/ended, etc. 

– Physical location of the incident (e.g., city, state) 

– Current status of the incident (e.g., ongoing attack) 

– Source/cause of the incident (if known), including hostnames and IP addresses 

– Description of the incident (e.g., how it was detected, what occurred) 

– Description of affected resources (e.g., networks, hosts, applications, data), including systems’ hostnames, IP addresses, and function 

– If known, incident category, vectors of attack associated with the incident, and indicators related to the incident (traffic patterns, registry keys, etc.) 

– Prioritization factors (functional impact, information impact, recoverability, etc.) 

– Mitigating factors (e.g., stolen laptop containing sensitive data was using full disk encryption) 

– Response actions performed (e.g., shut off host, disconnected host from network) 

– Other organizations contacted (e.g., software vendor) 

3. Cause of the Incident (e.g., misconfigured application, unpatched host) 

4. Cost of the Incident 

5. Business Impact of the Incident 

6. General Comments 

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Final Project

For your final project, you will complete a virtual art museum visit and thoroughly discuss two to four works. Please pay close attention to the following assignment criteria.

Go to this “gallery” website for referencing your Final Project: http://smarthistory.khanacademy.org/

You should already be familiar with this website from your previous weeks’ work. As you may have remembered, the site is broken down by dates. Cruise the dates and artworks located in those eras of art influence and address the following final project guidelines:

  1. Be no less than three pages, but no more than four pages in length.
  2. Compare and contrast a minimum of two artworks (no more than four) in which you will relate specific terminology and facts from your textbook and glossary readings.
  3. Discuss the relevance and/or influence of each work to history/ art history (via historical context, i.e What was going on in the world at that time that influenced the works and/or vise, versa?).
  4. Include a minimum of three resources per work of art from the book and/or internet to support your claims.
  5. Include a citation for each source used.
  6. Incorporate correct art history vocabulary in your examination.

use this cite the one at the top don’t work

Hi everyone,

The link in the directions for the week 8 assignment isn’t working. Here’s an alternative:

https://smarthistory.org/ 

Click on “Histories of Art”. You may choose from the following categories:

  • EUROPE 1800-1900
  • MODERNISMS 1900-1980
  • GLOBAL CULTURES 1980–NOW
 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Final Project: Part III, Pathogens and Health

View a video introduction to the Assignment by clicking here. Be sure to adjust your audio settings. A transcript of this video presentation is available in Course Resources.

Unit 9: End of Term Project — Final Project: Part III, Pathogens and Health

Unit outcomes addressed in this assignment:

  • Discuss standard methods used in the field of microbiology
  • Explain the importance of plasmids in bacterial genetics and in genetic engineering
  • Explain Human/microbe relationships
  • Analyze virulence factors of pathogens including public health importance

Course outcomes assessed with this assignment:

HS320-4: Discuss the principles of microbial genetics in health science.

HS320-5: Analyze the role of microbes in human disease and public health.

GEL 1.02: Demonstrate college-level communication through the composition of original materials in Standard English.

Instructions

  • Write an essay that analyzes “The role of any chosen pathogen in human health and disease and public health”
  • Using the knowledge you have gained throughout this course, your final paper must include the following:
  • Appropriate microscopic, cultivation and non-cultivation methods for the chosen pathogen
  • Importance of plasmids in bacterial genetics and in genetic engineering
  • Human / microbe relationships
  • Analysis of the virulence factors of microorganisms (include public health importance)
  • Prevention and treatments strategies

Requirements

  • Essay should be a minimum of 1000 words.
  • The paper you submit must be your own work.
  • The viewpoint and purpose of this Assignment should be clearly established and sustained.
  • Assignment should follow the conventions of Standard American English (correct grammar, punctuation, etc.).
  • Your writing should be well ordered, logical, and unified, as well as original and insightful.
  • Your work should display superior content, organization, style, and mechanics.
  • Follow APA style format, including Times New Roman 12 point font and double spacing.
  • Include a minimum of five references, one of which should be your textbook. All internet sources must be original articles or government resources. Wikipedia or other non-peer reviewed resources are not acceptable.
  • Include a title page and reference page.
  • Use APA style for all citations.
  • Here is the link for APA Style Central
 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Final Project: Part III, Pathogens and Health

View a video introduction to the Assignment by clicking here. Be sure to adjust your audio settings. A transcript of this video presentation is available in Course Resources.

Unit 9: End of Term Project — Final Project: Part III, Pathogens and Health

Unit outcomes addressed in this assignment:

  • Discuss standard methods used in the field of microbiology
  • Explain the importance of plasmids in bacterial genetics and in genetic engineering
  • Explain Human/microbe relationships
  • Analyze virulence factors of pathogens including public health importance

Course outcomes assessed with this assignment:

HS320-4: Discuss the principles of microbial genetics in health science.

HS320-5: Analyze the role of microbes in human disease and public health.

GEL 1.02: Demonstrate college-level communication through the composition of original materials in Standard English.

Instructions

  • Write an essay that analyzes “The role of any chosen pathogen in human health and disease and public health”
  • Using the knowledge you have gained throughout this course, your final paper must include the following:
  • Appropriate microscopic, cultivation and non-cultivation methods for the chosen pathogen
  • Importance of plasmids in bacterial genetics and in genetic engineering
  • Human / microbe relationships
  • Analysis of the virulence factors of microorganisms (include public health importance)
  • Prevention and treatments strategies

Requirements

  • Essay should be a minimum of 1000 words.
  • The paper you submit must be your own work.
  • The viewpoint and purpose of this Assignment should be clearly established and sustained.
  • Assignment should follow the conventions of Standard American English (correct grammar, punctuation, etc.).
  • Your writing should be well ordered, logical, and unified, as well as original and insightful.
  • Your work should display superior content, organization, style, and mechanics.
  • Follow APA style format, including Times New Roman 12 point font and double spacing.
  • Include a minimum of five references, one of which should be your textbook. All internet sources must be original articles or government resources. Wikipedia or other non-peer reviewed resources are not acceptable.
  • Include a title page and reference page.
  • Use APA style for all citations.
  • Here is the link for APA Style Central

Submitting Your Final Project

Put your Final Project in a Word document. Save it in a location and with the proper naming convention: username-HS320-section-unit9-Project.doc (username is your school username, section is your course section). When you are ready to submit it, go to the Dropbox and submit

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Final Reflection:

Student Guide to Creating a Final Professional Portfolio Purposes and Definition The purposes of a Portfolio are to do the following: 

 Provide a repository for your educational and professional accomplishments (i will  complete)

 Document your educational progression and growth throughout the program

  Evaluate your achievement of program learning outcomes 

 Project a professional image through the organization and presentation of the material 

 Communicate accomplishments to colleagues and the professional community

Then complete a final summary on evidence collected from semester on topic chosen ( hospital readmission / related to homecare)

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Final Reflection is a summary of your journey, and as such should include a second review of your status on all seven dimensions of wellness. In addition the Final Reflection should summarize and review your six week journey, and finish with a setting of short, intermediate and long term goals (for the next few weeks, months, and out to the next year or two). Final Reflection should be neatly presented (typed), with no grammatical errors, in four pages or less (double spaced), and with all “borrowed” concepts appropriately cited and referenced (in an APA format). See Blackboard for evaluation criteria and more information.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW