Hi, How Can We Help You?
  • Address: 1251 Lake Forest Drive New York
  • Email Address: assignmenthelpcentral@gmail.com

Blog

October 30, 2025
October 30, 2025

Layered Network Design

The process of implementing security frequently opens one’s eyes to other forms of security not previously considered. In this two-part assignment, you should experience just that. This assignment focuses on a model of implementing security in layers, which, in many cases, requires a network that is designed accordingly.

The specific course learning outcome associated with this assignment is:

  • Recommend best security practices to achieve business objectives based on risk assumptions.

Layered Network Design

Instructions

Design a network that incorporates the following:

  • One corporate site (Chicago).
    • All servers exist here (web server, file server, print server, mail server, FTP server).
    • Connection to the Internet (50 MBps).
    • 300 employees who only need access to local corporate resources and the Internet.
  • One remote site (8 miles away).
    • 20 employees who need access to all resources at corporate, plus the Internet.
    • Connection to the Internet (3 MBps).

Part 1

Use Microsoft Visio or an open-source alternative, such as Dia Diagram Editor, to:

  • Create a network diagram with defense in depth in mind, citing specific, credible sources that support the design and depicting at least four-fifths of the following:
    • All necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others).
    • The interconnections between network devices.
    • Connections to end-user (client) devices (desktops, laptops).
    • Connections from the Internet cloud to the network input.

Part 2

Write a 6-10 page paper in which you:

  • Describe the flow of data through the network, citing specific, credible sources.
    • Assume data begins at the remote site.
    • Data flow may be monitored by an IDS.
  • Explain all three elements of the CIA triad and how isolating by network functions helps deliver a layered approach, citing specific, credible sources that support your assertions and conclusions.
  • Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.
    • Cite each source listed on your source page at least one time within your assignment.
    • For help with research, writing, and citation, access the library or review library guides.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all supports. Check with your professor for any additional instructions.

Submission Requirements

Import completed diagrams or charts into your paper before submitting your work.

  • Create a network diagram with defense in depth in mind, citing specific, credible sources that support the design and depicting at least four-fifths of the following: All necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others), The interconnections between network devices, Connections to end-user (client) devices (desktops, laptops), Connections from the Internet cloud to the network input,

  • Describe the flow of data through the network citing specific credible sources. Assume data begins at the remote site. Data flow may be monitored by an IDS,

  • Explain all three elements of the CIA triad and how isolating by network functions helps deliver a layered approach citing specific credible sources that support your assertions and conclusions,

  • Support your main points assertions arguments or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence,

  • Import completed diagrams or charts into your paper before submitting your work,

October 30, 2025
October 30, 2025

Firewall Security Discussion

For this discussion:

  • Examine two advantages and two disadvantages for both hardware and software firewalls. Explain whether you recommend a hardware or software firewall. Provide the rationale for your response.
  • Consider the importance of your home or personal network security. Discuss where to use a firewall to secure a home office. Provide a rationale for your response.

Firewall Security Discussion

  • Two advantages of hardware firewalls?,

  • Two disadvantages of hardware firewalls?,

  • Two advantages of software firewalls?,

  • Two disadvantages of software firewalls?,

  • Hardware or software firewall recommendation and why?,

  • Where to use a firewall to secure a home office and why?,


✅ Comprehensive General Answer

Firewalls act as a protective barrier between trusted and untrusted networks, inspecting traffic and blocking potential threats. Both hardware and software firewalls are commonly used to secure networks, but each comes with strengths and limitations.


🔹 Hardware Firewall

A hardware firewall is a physical device placed between a network and the internet, often within routers.

Advantages

  1. Network-wide protection
    One device can protect all connected systems simultaneously—ideal for multi-user environments.

  2. Better performance
    Dedicated processing reduces the load on individual devices, offering faster filtering of traffic.

⚠️ Disadvantages

  1. Higher cost and complexity
    Hardware firewalls can be more expensive and require networking knowledge to configure.

  2. Less customizable per device
    Harder to tailor security policies to individual computers compared to software firewalls.


🔹 Software Firewall

Installed directly on individual devices (PCs, laptops, smartphones).

Advantages

  1. Customizable protection
    Rules can be set per application or per user—useful for blocking specific programs.

  2. Better visibility
    Users receive alerts when suspicious activity occurs on their own system.

⚠️ Disadvantages

  1. Resource consumption
    Uses system memory/CPU and may reduce performance, especially on older devices.

  2. One device at a time
    Protection does not extend to other devices on the same network.


✅ Recommendation & Rationale

I recommend using both hardware and software firewalls together (a layered approach).

Rationale:

  • Hardware firewalls block threats before reaching devices

  • Software firewalls offer additional application-level protection

  • Defense-in-depth is considered a best practice in cybersecurity

This combination minimizes vulnerabilities and strengthens overall network resilience.

October 29, 2025
October 29, 2025

Government Power & Constitutional Limits

Throughout this course, you will be reading and learning about the various limitations that the U.S. Constitution places upon the power of the government (i.e., law enforcement) to investigate crimes.  Before you truly begin to study these rules it would be interesting to start discussing some of your opinions and reactions to different investigatory practices.  Consider and respond to the following questions.

Government Power & Constitutional Limits

  1. Do you think that the police should be entitled to search through a citizen’s trash for evidence of a crime?  If so, why?  If not, why not?  What limitations do you think the law does or should impose upon the power of the police to use such an investigative practice?
  2. In most instances, the government may be entitled to x-ray the contents of your bags at locations such as airports, schools, courts, train depots, and bus terminals.  However, suppose for a moment that such x-ray technology had become available to police officers on the street in a hand-held device.  Should officers on the street be entitled to x-ray the backpacks, briefcases, purses and other items of citizens on the street?  If so, why?  If not, why not?  What limitations do you think the law does or should impose upon the power of the government (the police) to use such technologies?
  3. If you were responsible for drafting the Constitution of a new country what three limitations do you feel would be the most important to place upon the power of the government to investigate and prosecute crimes or in the punishing of offenders?
  4. \
  • Do you think police should search trash for evidence and why?,

  • What limitations should law impose on trash searches?,

  • Should police use handheld x-ray devices to search citizen belongings and why?,

  • What limitations should exist on handheld x-ray technology?,

  • What three constitutional limitations would you include in a new country?,


✅ Comprehensive General Answer

October 29, 2025
October 29, 2025

Agency Program Evaluation

ll discussions and written assignments in this course will focus on a program evaluation of one specific agency. Each week’s discussion will help you clarify key concepts and prepare for the written assignment.

This week, you will select an agency from the options below and begin developing a logic model that visually outlines the program’s purpose, services, inputs, activities, outputs, and outcomes.

Use only publicly available information (agency websites, annual reports, published materials).

In this discussion, please address the following:

1. Agency Selection

Agency Program Evaluation

Choose one agency to evaluate for this course:

Explain why you selected this agency and what drew your interest.

2. Program Overview

Based on the agency’s website or materials:

  • What population does the program serve?
  • What services or interventions are offered?
  • What are the stated goals or intended outcomes?

3. Information Gathering for Your Logic Model

Using your textbook (Fink, Fig. 1.3, p. 28) as a guide, identify:

  • What inputs (resources, staff, funding) does the program likely use?
  • What activities (specific services) does the program provide?
  • What outputs (# clients served, sessions provided) would be measurable?
  • What short-term, intermediate, and long-term outcomes would be appropriate given the program’s goals?

4. Ethical Considerations

Discuss the ethical issues involved in program evaluation:

  • How will client confidentiality be maintained? (Note: You’ll work with de-identified data.)
  • Which ethical principles guide evaluation practice?
  • Are there potential conflicts of interest or other ethical concerns to consider?

5. Missing Information

What information would you like to know but couldn’t find on the website? How will you address these gaps when you create your logic model?

  • Explain why you selected this agency and what drew your interest,

  • What population does the program serve?,

  • What services or interventions are offered?,

  • What inputs activities outputs and outcomes would be appropriate given the program’s goals?,

  • What information would you like to know but couldn’t find on the website?,

October 29, 2025
October 29, 2025
October 29, 2025
October 29, 2025

Personal Brand & Identity

Leaders must understand the importance of the brand to business success and sustainability. It is important for you to reflect on the last nine weeks and the relevance of marketing to optimizing a brand. The theme park scenario you have worked on will, someday, not be a purely hypothetical situation to you. You will be faced with real-world crises and challenges. There will be critical roles for marketing and other functional departments to play when they arise.

One of the important factors in your personal success will be how you brand yourself. What do you represent? Why should you be the “go-to” future leader of an organization? Why should you be the first choice as that leader? You are being asked to self-reflect on what you want your personal brand to be.

Personal Brand & Identity

In your initial post, you should address the following questions based on what you learned in this course:

  • What are at least three key course takeaways that resonate with you and that you may use in your current or future workplace? Explain how they resonate with you.
  • When thinking of attributes of an effective leader, what personal brand traits do they appear to possess?
  • Describe your desired personal brand. How can being a lifelong learner help with reaching your desired personal brand image?

QUESTION 2

  • What are the various levels of your social ecosystem? In what ways have they changed in the past 5 or 10 years?
  • If something has changed within your social ecosystem, was it intentional? Or did your social ecosystem change you?
  • How have your relationships with specific aspects of your social ecosystem helped to shape your identity?
  • Do you think people act more based on who they are or based on their group’s behavior? Please provide a specific example to support your position.
  • How does the concept of identity and the group apply to any of the following programmatic course themes:
    • Self-care
    • Social justice
    • Emotional intelligence
    • Career connections
    • Ethics
  • What are at least three key course takeaways that resonate with you and that you may use in your current or future workplace? Explain how they resonate with you,

  • When thinking of attributes of an effective leader, what personal brand traits do they appear to possess?,

  • Describe your desired personal brand. How can being a lifelong learner help with reaching your desired personal brand image?,

  • What are the various levels of your social ecosystem? In what ways have they changed in the past 5 or 10 years?,

  • If something has changed within your social ecosystem, was it intentional? Or did your social ecosystem change you?,

October 29, 2025
October 29, 2025

Business Ethics Breach

Our study of ethics in business can sometimes seem esoteric and removed from day-to-day management responsibilities, but media are filled with real-life examples of unethical business behavior that harms the businesses involved, as well as their shareholders, customers, employees, and other stakeholders. This paper assignment asks you to find such an example, examine what went wrong, and apply the materials we’ve been reading to develop preventions and solutions. Take an in-depth look at the situation through the lens of secular legal and ethical principles but also through the lens of a Biblical worldview.

Business Ethics Breach

Instructions

Identify a news story that has been published within the 30 days preceding the due date of this assignment that describes a breach of business ethics. You may find this through a web search, library research, professional journals, professional association websites, newspapers, etc. The breach may be criminal, based in tort, or otherwise unethical.

Your paper will:

· Briefly explain the situation and the parties involved.

· Identify your ethical standard; explain how this situation violated that standard.

· Explain how you would have prevented this situation and would now respond, including support from scholarly and Biblical sources.

Support your analysis with at least 3 scholarly sources other than the course materials (your article will be one), properly cited in APA format in in-text citations and in a reference list. You must also integrate Biblical worldview analysis, including at least 2 Biblical principles with APA citations.

 

This paper must contain at least 800 words and follow current APA format but does not require an abstract. The title page and reference list do not count towards the length requirement. Submit your paper as a Word document.

 

Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.

  • Briefly explain the situation and the parties involved,

  • Identify your ethical standard; explain how this situation violated that standard,

  • Explain how you would have prevented this situation and would now respond including support from scholarly and Biblical sources,

  • Support your analysis with at least 3 scholarly sources other than the course materials, properly cited in APA format in in-text citations and in a reference list,

  • Integrate Biblical worldview analysis including at least 2 Biblical principles with APA citations,

October 29, 2025
October 29, 2025

WISC-V Stability Study

Find and read a peer-reviewed research journal article using intelligence or achievement testing in research and share what you learned from this article with your classmates. Specifically (and in your own words):

1. Why was the study conducted?  What hypotheses were being tested?

2. What test(s) were used?

3. What findings were reported, and what conclusions were drawn

WISC-V Stability Study

  • Why was the study conducted? What hypotheses were being tested?,

  • What test(s) were used?,

  • What findings were reported and what conclusions were drawn?


Response (concise, in my own words)

1) Purpose & hypotheses. Watkins et al. (2021) examined the long-term temporal stability of WISC-V scores in a clinical outpatient sample because most published reliability evidence for the WISC-V focuses on short retest intervals or normative samples. The study tested whether WISC-V composite scores (e.g., Full-Scale IQ, index scores) and subtest scores remain sufficiently stable over a multi-year interval (mean ≈ 2.6 years) to support clinical decisions. Implicitly, the authors expected omnibus and broad indices to be more stable than individual subtests or within-person difference (profile/ipsative) measures.

2) Tests used. The researchers administered the ten primary WISC-V subtests on two occasions to 225 children/adolescents seen in an outpatient neuropsychology clinic. From those subtests they derived the five primary index scores and the Full-Scale IQ (FSIQ). Analyses included mean comparisons, test-retest correlations (stability coefficients), and measures of replication for intraindividual (idiographic) score patterns.

3) Findings & conclusions. Mean composite scores were relatively constant, but subtest stability was modest (average r ≈ .66). Only the Verbal Comprehension Index (VCI), Visual Spatial Index (VSI), and the FSIQ exceeded the commonly cited 0.80 threshold for long-term stability. Intraindividual difference scores and “profile scatter” showed poor replication across administrations (low kappa), indicating that observed strengths/weaknesses on subtests often did not recur at retest. The authors conclude that while FSIQ and some broad indices may be defensible for nomothetic (between-person) comparisons over years, ipsative/person-relative interpretations (e.g., treating a single subtest peak as a stable strength) are not reliable enough for confident clinical decision-making. Practically, clinicians should rely more on composite scores for long-term high-stakes decisions and be cautious when using subtest/profile differences to guide eligibility or intervention without corroborating evidence or repeat assessment.

Reference (APA 7)
Watkins, M. W., Canivez, G. L., Dombrowski, S. C., McGill, R. J., Pritchard, A. E., Holingue, C. B., & Jacobson, L. A. (2021). Long-term stability of Wechsler Intelligence Scale for Children–Fifth Edition scores in a clinical sample. Applied Neuropsychology: Child, 11(3), 422–428. https://doi.org/10.1080/21622965.2021.1875827

October 29, 2025
October 29, 2025

Better Listening Skills

  • What do you find most interesting about the skill of listening?
  • Do you agree with Treasure’s warning about the dangers of losing the ability to listen?
  • What listening strategy presented by Treasure, would you like to try?
  • Finally, in light of the assessment, share any personal listening goals you may have to improve your listening skills.

Better Listening Skills

Be sure to respond to at least 2 others as well.

As a reminder, always connect to a scholarly source.

As a note, integrating a scholarly source for this post should go beyond mentioning the TED Talk. Aim for full credit and connect to a scholarly source beyond the TED Talk to show how the discussion ties to your studies in the course.

Incorporate material found in the unit presentations, the textbook, or other professional academic resources. Remember to cite sources appropriately.

  • What do you find most interesting about the skill of listening?,

  • Do you agree with Treasure’s warning about the dangers of losing the ability to listen?,

  • What listening strategy presented by Treasure, would you like to try?,

  • Finally, in light of the assessment share any personal listening goals you may have to improve your listening skills.


Comprehensive Response (APA-7 cited | ~250 words)

The most interesting aspect of listening is that it is an active skill rather than a passive one. Julian Treasure (TEDGlobal, 2011) emphasizes that intentional listening shapes our understanding of the world and strengthens human connection. Listening requires cognitive engagement, empathy, and presence—making it a fundamental component of effective communication in both personal and professional settings.

I strongly agree with Treasure’s warning about the dangers of losing our ability to listen. With digital distractions, constant noise, and fast communication platforms, our capacity to focus and process meaningfully is diminishing. Poor listening can negatively affect relationships, workplace collaboration, and even safety in fields such as healthcare and education. Research shows that effective listening improves relational satisfaction and reduces miscommunication (Weger et al., 2014), highlighting why Treasure’s concern is valid.

One listening strategy presented by Treasure that I would like to try is the “RASA” technique: Receive, Appreciate, Summarize, Ask. This approach encourages being fully present, providing acknowledgment, and confirming understanding—skills that support active and empathetic listening.

After completing the listening assessment, I recognized the need to improve my patience and attentiveness, especially when conversations are long or complex. My goal is to reduce distractions—like phones—and practice summarizing what I hear to strengthen retention and demonstrate engagement. By applying these strategies, I can become a more mindful, respectful, and effective communicator.


References