First describe the similarities or differences between the cyclooxygenase-1 (COX-1) and COX-2 pathways and state which (pathologic) physiologic process is mainly responsible for analgesia, antiinflammatory activity, antipyresis, bleeding tendencies, and gastric mucosal damage and discuss the beneficial and adverse actions of nonsteroidal antiinflammatory drugs (NSAIDs) and the basic mechanisms by which they occur. Also, identify situations in which aspirin should not be used, even for relief of mild or episodic headache or fever. Also, state which of the alternative over-the-counter (OTC) analgesic/antipyretic drugs would be a more acceptable alternative to aspirin and why. Not only but also compare and contrast the signs and symptoms of acute poisoning with aspirin and with acetaminophen, the time course of the signs and symptoms and underlying causes, and the management of these conditions.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

First define and then compare and contrast the fee-for-service and prepaid health plan models. What is the best type of health insurance (for the consumer and the organization) and why? Justify your answer. Discuss the various ways in which healthcare reform has affected and may affect the financial delivery of healthcare today and in the near future

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

First, create the lab08 folder using the mkdir command — the folder needs to be inside your Labs folder as well.

Next, copy a file into your lab08 folder using the cp command.

cp /afs/umbc.edu/users/k/k/k38/pub/cs201/given_spend.py spending.py

This will copy the file given_spend.py from Dr. Gibson’s public folder into your current folder, and will change the file’s name to spend.py instead.

The first thing you should do in your file is complete the file header comment, filling in your name, section number, email, and the date.

CMSC 201 – Computer Science I for Majors Page 7

Part 3B: Finishing the Functions

At this point, if you try to run the file, it will only print out the category titles for the expenditures, and nothing else. That is because the file is only partially completed for you.

You will need to update the file to complete the two function definitions, and one function call. If you open the file, you should see comments boxed in by #signs – these are where you need to write new code. Read the function header comments to see the details about the two functions.

You’ll need to think carefully about the two-dimensional spending list and how its contents are organized (and how you can access them). It might be helpful to draw a visual representation, and to label the indexes.

For printSpending() and tallySpending(), you’ll need to write awhile loop. Make sure to pay attention to what the function’s already written code does, as well as things like variable names.

Once both functions are complete, you need to call tallySpending() down in main(), as well as uncommenting the print() statement below it. Youshouldn’t need to write any other code.

(See the next page for sample output.)

CMSC 201 – Computer Science I for Majors Page 8

Here is some sample output of the completed program.

There is no user input, and yours should be identical once it’s complete.

(The printed list of expenditures for eating out is long enough to wrap around in this document, but is should not wrap around when you run it in the terminal.)

bash-4.1$ python spending.pySpending:EAT OUT :49.3VEHICLE :GROCERIES :UTILITIES :PERSONAL :ENTERTAIN :PET CARE :RENTING :8930.27165.31 17.329.1623.1140.71In category EAT OUTIn category VEHICLEIn category GROCERIESIn category UTILITIESIn category PERSONALIn category ENTERTAINIn category PET CAREIn category RENTINGYou spent a total of.49 was spent.78 was spent.19 was spent.63 was spent.43 was spent.69 was spent.56 was spent was spent.77 this month2515.66100130040.525.9948.9833.0442.45

CMSC 201 – Computer Science I for Majors Page 9

Part 4: Completing Your Lab

Since this is an in-person lab, you do not need to use the submit command to complete your lab. Instead, raise your hand to let your TA know that you are finished.

They will come over and check your work – they may ask you to run your program for them, and they may also want to see your code. Once they’ve checked your work, they’ll give you a score for the lab, and you are free to leave.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

First, consider the following infinite collection of real numbers. Describe how these numbers are constructed, then, using Cantor’s diagonalization argument, find a number not on the list. Justify your answer. 

0.123456789101112131415161718…

0.2468101214161820222426283032…

0.369121518212427303336394245…

0.4812162024283236404448525660…

0.510152025303540455055606570…

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

First, complete TRY THIS Exercise 1. Then, if necessary, create a new project named

TryThis8 Project, and save it in the Cpp8Chap04 folder. Enter the C++ instructions

from TRY THIS Exercise 1 into a source file named TryThis8.cpp. Also enter

appropriate

comments and any additional instructions required by the compiler. Test

the program using 250.75, 900, 100.87, and 205 as the food, rent, utilities, and car

payment, respectively. Then test it using your own set of data. (The answers to TRY

THIS Exercises

are located at the end of the chapter.)

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

First, choose a food item or cuisine that interests you. Some will have more information available about them than others, so it’s worth doing some investigation before you settle on one. In general, any well known national cuisine will have adequate information available, as will widespread food items like hamburgers, pizza, and sushi. If you’re not sure if your desired topic is appropriate, please feel free to ask!

Once you have selected your topic, you will then do research to see how each of the following geographic concepts affects or is related to your topic:1. Regions2. Cultural Landscape3. Diffusion4. Distance decayThe first three concepts are well covered in your textbook. Distance decay refers to the fact that influence and interaction between locations decreases as the distance between them increases. As such, it has a significant influence on how things change as they diffuse away from their point of origin. Be sure to address these specific geographic terms and concepts. You don’t need to address them in this order, but you do need to address all of them. You may use “subsets” of these definitions (e.g. contagious diffusion) if such subsets exist. Be sure to refer to your text and other reliable resources to ensure you completely understand these concepts. You should be detailed in your treatment of these concepts – for instance, you should explain both how and why your choice varies by region, and how and why it has been affected by distance decay. Remember that geography, as an academic discipline, seeks to explain why things vary from place to place, not just describe how they do.Your illustrated paper should be 12 to 15 slides long. You should include a title, an introduction to the topic, a main body that covers how the four geographic concepts relate to your topic, a summary, conclusion, and reference list. You should cite your sources using the citation style appropriate for your field. If you’re not sure what that is, use APA style citations. The APUS library APA style guide can be found here: http://www.apus.edu/apus-library/resources-services/Writing/writing-center/apa-style-guide-info.html. You should use the Notes section of the presentation to include image citations or URLs with the slides on which the images appear.This exercise will require some research on your part, and you should be sure to use legitimate sources. Be careful of Wikipedia or other “wiki” sites. Try for official and credible sites and sources. Remember that this is an illustrated paper, so you should make use of images on most, if not all, slides. You should also avoid large blocks of text and use bullet points when possible.

Plagiarism: Your assignment must be in your own words. You may not copy and paste text from your sources unless you enclosing the text in quotes (such direct quotes can be no more than 10% of your assignment). You must paraphrase your sources by putting the information they contain into your own words. This means making significant changes to the text, not just changing a word here and there. Failure to comply with these instructions will be considered plagiarism, and will result in a zero for the assignment and an official plagiarism report being filed with the university.

APA FORMAT for on slide citations and your references on your reference page. Make sure do this correctly, you can also be nailed for plagiarism for not doing this . Look up “APA FORMAT” in google to learn more and for machines to help you generate the correct format! 

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

FIRST CASE ASSIGNMENT:

The following scenario is based on an actual attack deconstructed at a seminar I attended earlier this year. The names and locations have been removed to preserve the privacy of the organization in question.

Background:

No-Internal-Controls, LLC is a mid-sized pharmaceutical company in the Midwest of the US employing around 150 employees. It has grown over the past decade by merging with other pharmaceutical companies and purchasing smaller firms.

Recently No-Internal-Controls, LLC suffered a ransomware attack. The company was able to recover from the attack with the assistance of a third party IT Services Company.

Attack Analysis:

After collecting evidence and analyzing the attack, the third party was able to recreate the attack.

No-Internal-Controls, LLC has a number of PCs configured for employee training

These training computers use generic logins such as “training1”, “training2”, etc. with passwords of “training1”, “training2”, etc.

The generic logins were not subject to lock out due to incorrect logins

One of the firms purchased by No-Internal-Controls, LLC allowed Remote Desktop connections from the Internet through the firewall to the internal network for remote employees

Due to high employee turnover and lack of documentation none all of the IT staff were aware of the legacy remote access 

The main office has only a single firewall and no DMZ or bastion host exists to mediate incoming remote desktop connections

The internal network utilized a flat architecture

An attacker discovered the access by use of a port scan and used a dictionary attack to gain access to one of the training computers

The attacker ran a script on the compromised machine to elevate his access privileges and gain administrator access

The attacker installed tools on the compromised host to scan the network and identify network shares

The attacker copied ransomware into the network shares for the accounting department allowing it spread through the network and encrypt accounting files

Critical accounting files were backed up and were recovered, but some incidental department and personal files were lost

Instructions:

You have been hired by No-Internal-Controls, LLC in the newly created role of CISO and have been asked to place priority on mitigating further attacks of this type.

  • Suggest one or more policies that would help mitigate against attacks similar to this attack
  • Suggest one or more controls to support each policy
  • Identify each of the controls as physical, administrative, or technical and preventative, detective, or corrective.
  • Keep in mind that No-Internal-Controls, LLC is a mid-sized company with a small IT staff and limited budget
  • Do not attempt to write full policies, simply summarize each policy you suggest in one or two sentences.  
  • Clearly indicate how each policy you suggest will help mitigate similar attacks and how each control will support the associated policy
  • 3-5 pages in length.
  • APA format.. citations, references etc…
 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

First assignment 

1.Articles in the scientific literature  over the past several years have implied that computed tomography (CT) may cause cancer and that physicians and patients must exercise caution in its use. What is ypu opinion regarding this subject. Please research and give your input abut the topic.

Rubric : minimun  300 words , APA style , 2 references year 2012 and newer 

Second assignment

2.Vaccines are generally considered to be the most successful public health intervention ever devised, and yet there have been opponents of vaccines ever since there have been vaccines.  Many people often spread misinformation about the vaccine, such as the notion that vaccines weaken the immune system and that children can develop autism after getting vaccinated. What is your opinion on the subject? Please provide your input.

Rubric : minimun  300 words , APA style , 2 references year 2012 and newer 

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

First, let’s start with questions based on your opinion:

Though we focus a lot on the organ systems, is it important to know the types and functions of the different cells and tissues also?  How could that knowledge be useful in understanding disease? Or in a career in healthcare? 

Choose 3 organ systems and complete a Venn diagram illustrating the relationship of the chosen organ systems. List at least 4 functions of each      organ system in each circle. The overlapping sections of each circle      depict the interrelationship between and among the chosen systems.

see attachment

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

First, let’s start with a question based on what you have learned so far this term:

  • Before we can begin to consider a new vision, we must explore the social injustices that are often embedded in even well-intended preventive and treatment initiatives. Based on what you have learned this term, what social injustices need to be addressed?

Now meaningfully applying your readings and videos for the rest of this week, let’s brainstorm evidence-based approaches to promote a new vision for the field of PTSD prevention and treatment:

  • What types of PTSD-focused information, education and services should be available to the general public? Consider what critical components should be a part of these initiatives and how the public should be made aware of their existence.
  • In an ideal response system, what role should governments and/or global organizations should play in maximizing long-term prevention and best practices for the treatment for PTSD? How about us as members of our own communities?
 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW