This assignment will involve you using a tool called Wireshark, It works on almost all operating system. This is a powerful tool that can be used to explore networking.

Click here to order this assignment @Tutoriage.us. 100% Original.Written from scratch by professional writers.

Assignment 3:

This assignment will involve you using a tool called Wireshark, It works on almost all operating system. This is a powerful tool that can be used to explore networking.

The link is:

http://www.wireshark.org/download.html

The assignment provides a quick start guide to help you get started and involves completing 5 basic exercises and then 3 specific exercises which include HTTP, IP and SSL, for a total of eight exercises.

1) Wireshark Exercises (this includes 5 exercises to help get started)

2) WiresharK_HTTP

3) Wireshark_IP

4) Wireshark_SSL

Since organizations involve many components and systems, the ability to effectively communicate any changes throughout the organization becomes a critical component of employee morale and commitment.

Click here to order this assignment @Tutoriage.us. 100% Original.Written from scratch by professional writers.

Change involves moving from one circumstance or situation to another. Since organizations involve many components and systems, the ability to effectively communicate any changes throughout the organization becomes a critical component of employee morale and commitment.

In this scenario, assume you are serving as a Human Resource Manager/Professional of a company within the KSA and announced that your organization must lay off 20% of total employees. Discuss how you would advise management about how best to communicate this message. Include the following areas: the specific process they should follow, the format/channels they should use, the components to include in the message.

Draft a short, one-paragraph message that you believe should be sent to the organization to announce these layoffs.

During the week, review and offer suggestions to your fellow students on how they can modify their message to make it more palatable to employees, offering suggested words and approaches that they may consider.

1 page including references

Identify your specialty area of professional practice.

Click here to order this assignment @Tutoriage.us. 100% Original.Written from scratch by professional writers.

Identify your specialty area of professional practice. Select a nursing theory from the list of specialty track specific theories provided in the lesson plan or one of your own findings. Address the following: (1) briefly identify concepts of the nursing metaparadigm (remember the selected theory may not include all four concepts); (2) provide an example how the theory could be used to improve or evaluate the quality of practice in your specific setting.

Search entries or author

Many social network apps and location-based services require or encourage users to post their geo-location

Click here to order this assignment @Tutoriage.us. 100% Original.Written from scratch by professional writers.

Homework 4 (Due 12/02 Sunday)

Introduction:

Many social network apps and location-based services require or encourage users to post their geo-location information. While enabling interesting features in mobile applications, disclosing location information may lead to privacy breaches.

In this homework, you will explore the location privacy issue in mobile applications. The demo app has two tabs: USER and ATTACKER. In USER tab, the app mimics the movement of a user and posts messages at a set of pre-defined locations associated with the location information. In ATTACKER tab, the app displays the view of an attacker after crawling the user’s messages with the location information. Then you will identify the privacy issues and explore the possible mitigations by using geofencing and adjusting the location granularity in user reports.

Objectives:

  1. Understand how to load GPX/KML files with a sequence of mock locations in Android emulators to test with user mobility.
  2. Understand the privacy threat of posting location information.
  3. Investigate two mitigation/defense schemes, enforcing geofencing and adjusting location granularity.

Detailed Steps:

Download hw4_base.zip and Quinn2MFA.gpx from the course web page. Upzip hw4_base.zip, and open it in Android Studio. Compile it and run the app in your emulator.

  1. Open the app, choose USER tab (default tab), and check “Coordinate” option. This is the default option for reporting the geo-location with the messages where the exact GPS coordinates will be attached with each message.

 

  1. Load the provided gpx file (Quinn2MFA.gpx) into the emulator (see the figure below). This file includes a sequence of GPS coordinates, and will be used to emulate the user’s movement. You can select the play speed, and then press the play button (the green triangle). The GoogleMap fragment will show the movement of the user. Along the movement, you will see some toast messages indicating that some messages are posted by the user with the location information. In this app, those message/location data are actually stored in a file (“/sdcard/Download/data.txt”).

 

  1. When the movement stops, you can switch to ATTACKER tab, and click “Update” button. You will see 7 markers representing the messages that the user posted and have been crawled by the attacker. Apparently, the attacker can easily trace the movement of the user.

 

Load a gpx file
“play” button
Screen snapshot
  1. Next, you will try two mitigation schemes to protect the location privacy. Assume the user consider “JFK/UMASS Station” and “Boston Medical Center” (message 3 and message 5) are two sensitive locations that shouldn’t be disclosed to others.

 

  1. Geofencing: Switch back to USER tab and select “Geofencing” option. In this option, the app will setup two circular regions as geo-fences. Once the user enters the regions, the app will not post any messages to protect the location privacy. In this app, the two center points have been hard-coded to be the location of “JFK/UMASS station” and “Boston Medical Center”. You need to type in a radius value (in the unit of meters) and press the button. The GoogleMap fragment will show the two regions. Then repeat the user movement in step 2 (the gpx file should have been loaded, and you just need to press the “play” button to start). Repeat step 3 and observe from the attacker’s view. Adjust the radius value and repeat this step. Find the appropriate radius values for protecting each of the two locations, and answer question Q1.

 

  1. Region: In the “Region” option, every location will be reported as a circular region. The center point is randomly selected and its distance to the actual location is no longer than the radius. Type in a radius value and press the button. And then launch the movement process again (step 2). When it ends, repeat step 3 to observe the disclosed location information. Adjust the radius value and answer question Q2.

 

Submission:

Complete the answer sheet and the survey form, and rename the file as

your_firstname.your_lastname-hw4.docx

And email it to the TA (Tengpeng.Li001@umb.edu)

Answer Sheet

 

Our goal is to prevent the attacker from realizing that the user has visited the two sensitive locations: (loc1: “JFK/UMASS station”) and (loc2: “Boston Medical Center”). Think about the possible strategies that an attacker may use to make a conclusion/guess based on the available location information.

 

Q1. When using Geofencing scheme, what radius value can protect loc1? What radius value can protect loc2? Why? (Please attach two screen snapshots, one for each case, from the ATTACKER tab)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Q2. When choosing Region scheme, what radius value can protect loc1? What radius value can protect loc2? Why? (Please attach two screen snapshots, one for each case, from the ATTACKER tab)

 

 

 

 

 

 

 

 

 

 

 

 

 

Q3. Compare loc1 and loc2, which location is easier to protect (i.e., harder for the attacker to identify), and why?

 

 

 

 

 

 

 

 

 

 

 

 

Q4. Compare Geofencing and Region options, which scheme do you think is more effective for protecting the location privacy and why?

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Student Pre-HW Survey (for HW4)

 

 

  1. On average, how much time do you spend each day using location-centric social media?

 

 

______________

 

 

  1. Do you Opt Out or Opt In with Apps that include location tracking?

 

In

Out

Sometimes Out, sometimes In

 

 

 

  1. Do you know the definition of location privacy and the attacks that breach it?

 

Yes

No

 

 

  1. Are you interested in location protection?

 

Yes

No

 

 

 

 

  1. What mobile devices do you use daily? (check all that apply)
 

Smart phone

 

Tablet

 

Wearable devices

 

Automobile GPS devices

 

 

Other electronic devices

 

 

 

 

  1. If you were to lose your smart phone, what would worry you about someone gaining access to your phone? (check all that apply)

 

Photos / Images

Location Data

Email

Texts

 

 

             Sports events in Australia

Click here to order this assignment @Tutoriage.us. 100% Original.Written from scratch by professional writers.

 

                                                                Sports events in Australia

Students Name

School

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Identify key community values and organizational philosophy

Cricket is considered to be the most popular sports events in Australia, cricket in Australia is recognized both at the locals and the international levels of the country and the world as well. The organizational body for the cricket sports games in Australia is the Cricket Australia that organizes and oversees the performance of cricket games from the begging till the end .a number of people in Australia loves and plays cricket in Australia that is why cricket is recognized and placed as the number one sports game in Australia.

Cricket has been a critical portion of the Australian way of life for over a century. It is portion of our national mind and immovably dug in in Australian culture. Celebrated players like Sir Donald Bradman and Steve Waugh are adored and a few of the awesome Test Matches – such as the scandalous Bodyline arrangement – have gotten to be imperative minutes in our nation’s brief history. Cricket is our nation’s fundamental summer don in terms of members, spectators and media scope. Be that as it may, it is now and then seen as an elite diversion, one saved for certain bunches in Australian society. Cricket Australia is firm this can be not the case and needs to alter this sensitivity Veal et al (2012). Cricket Australia Chief Executive Officer (CEO) James Sutherland said: “Cricket could be a truly national wear and for that to proceed into long haul, we must guarantee that  it remains a diversion for all Australians to get to, to take an interest and to be included in” Li & Jago (2013).

Community profile

With the composition of Australia’s population quickly changing, so as well is the consideration given to distinctive sports in this nation. Whereas cricket may have a solid put in Australian culture nowadays, it does not cruel that it’ll stay that way unless the pleasure advances and proceeds to stay important to the wide community. The cricket diversions is made up of six part affiliations: Cricket Modern South Grains; Queensland Cricket; South Australian Cricket Affiliation; Tasmanian Cricket Affiliation; Cricket Victoria; and Western Australian Cricket Affiliation. The Australian Capital Region Cricket Affiliation and the Northern Region Cricket Affiliation are partner affiliations MacMahon et al (2013).

Cricket Australia gets it that 25 per cent of Australians citizens  are born abroad and numerous have arrived within the nation without any information of cricket, its rules and its culture Hudson(2012) .3 Portion of Cricket Australia’s Vital Arrange ‘From Patio to Loose Green’ recognizes the require 70 l What’s the score? An overview of social differing qualities and prejudice in Australian don for cricket to grasp the changing population, to energize cooperation and association from non-traditional cricket bunches, and to create techniques to cultivate more noteworthy support and incorporation Hudson (2012). In acknowledgment of this fact, one of the foremost vital ranges of Cricket Australia is their Amusement Improvement Office, which is mindful for supervising all cricket improvement exercises. Among other things, one of the department’s obligations is to extend cricket cooperation over the country Hudson (2012). The yearly Australian Cricket Census is a critical device to survey this bolster and an imperative data framework which is utilized for MacMahon et al (2013).

Pre-existing sport event or facility services.

Cricket Australia advises that all partners included within the arranging, administration, and support and utilize of cricket offices allude to these facility Rules when starting unused or returning to ancient ventures. They are given for State and Domain Cricket Affiliations, Clubs and Affiliations, Nearby Boards, State Government divisions, organizers, specialists, industry providers, engineers, schools and other crest donning bodies Sissons & Stoddaryt (2014). A center part of the Rules is to educate partners included within the particular components that make strides member encounters in cricket and to bridge the information hole between partners and their understanding of the don and its prerequisites MacMahon et al (2013).

Categories or determine sport event needs faced by the community or organization.

Types and formats of tournaments  

T20, 10 overs and 15 overs are the popular tournament formats. You choose the format based on the time limit and number of teams. Remember, stick with the same format for one tournament every year to maintain consistency and identity. A cricket league contains league matches and knockout. A cricket league is a good option if there are number teams participating Sissons& Stoddart (2014).

Cricket Tournaments

Neighborhood cricketers play cricket with diverse sorts of balls, pitches and range. Distinctive sorts of neighborhood competitions are being played based on these components. Cricket Competitions Based on Range

  • Indoor Tournaments
  • Outdoor Tournaments
  • Indoor Cricket
  • An Indoor Cricket Match

Cricket Tournament Based on The type of Ball Used in Matches

Leather Ball Tournaments- Ordinarily red in color, white and pink lather balls are utilized to play lather ball competitions.

Tennis Ball Tournaments

Underarms Tournaments- A Plastic ball is used to play underarms tournaments.

Tape Ball Tournaments- A tape ball is a tennis ball wrapped in electrical tape. Tape ball tournaments are famous in Pakistan.

Define Tournament Rules

Discover a right title for your competition. Naming with the put title that the competition is sorting out makes a difference to urge prompt consideration from the neighborhood group of onlookers. E.g.: Indian Head Association, Karnataka Head Association Sissons & Stoddart (2014). Characterize proper rule for the tournament to form beyond any doubt the proper stream of the competition. You’ll characterize color of the shirt, sort of ball, interims, code of conduct, the greatest number of players can have for one group, etc.

The capital for the tournament

This portion is exceptionally pivotal for the victory of a competition. You would like to discover sponsors to pay the costs. Intrigued within the Sport- this individual or businesses cherish the don and needed to help within the advancement of the don in their zone. Regularly these sponsorships come from individuals as of now included with the club in a few way. Inviting teams to take part on the event invite nearby groups to take an interest in your competition Vickery et al (2013). In this advanced period, you’ll make utilize of distinctive advanced strategies to discover groups. It is simpler and speedier way to reach more number of teams MacMahon et al (2013).

Post your competition declaration in Fb profile and share it with important bunches. You can post it on Twitter with relevant hashtags.

Cricket gatherings are another great way to reach a number of people.

Depend on any cricket scoring stage to discover cricket groups. You’ll be able discover cricket groups that as of now enrolled in that scoring stage and you’ll challenge them Vickery et al (2013).

Development proposal

 

Sport may be an exceptionally critical portion of modern Native and Torres Strait Islander life. It is a implies to enhance better wellbeing and has the potential to make positive person and community prosperity and life choices for Inborn peoples. Indigenous cricketers have a long history of inclusion within the diversion in Australia, dating back to mid-nineteenth century Vickery et al (2013). It was at this time that the diversion was presented by pastoralists to the individuals of separated communities, stations and missions.11 in 1866 an innate squad was chosen to visit Britain. The group comprised of 13 Aborigines from the Western Locale of Victoria and an English captain/coach, and played add up to of 47 matches in 115 days abroad Vickery et al (2013).

This spoken to the primary event on which an Australian sporting team had ventured overseas. Intrigued within the history of Innate cricket in Australia was subsequently revived when an agent group was chosen to visit Britain in 1988 as a implies of commemorating the encounter of 1868 Vickery et al (2013). Aboriginal and Torres Strait Islander people groups illustrate remarkable capacity in a diverse range of sports MacMahon et al (2013). For illustration, among a population that’s 2.8 per cent12 of the entire Australian population, they constitute eight per cent of Australian Football Alliance players MacMahon et al (2013). At this point in time, be that as it may, few Native and Torres Strait Islander people groups participate in standard cricket and indeed less have competed at to begin with course and international levels.13 In truth, as it were two Native individuals have spoken to Australia at the national level Vickery et al  (2013).

Reference

Veal, A. J., Toohey, K., & Frawley, S. (2012). The sport participation legacy of the Sydney 2000 Olympic Games and other international sporting events hosted in Australia. Journal of policy research in tourism, leisure and events4(2), 155-184.

Li, S., & Jago, L. (2013). Evaluating economic impacts of major sports events–a meta analysis of the key trends. Current Issues in Tourism16(6), 591-611.

Hudson, S. (2012). Sport and adventure tourism. Routledge.

Sissons, R., & Stoddart, B. (2014). Cricket and Empire (RLE Sports Studies): The 1932-33 Bodyline Tour of Australia. Routledge.

Vickery, W., Dascombe, B., Duffield, R., Kellett, A., & Portus, M. (2013). Battlezone: An examination of the physiological responses, movement demands and reproducibility of small-sided cricket games. Journal of Sports Sciences31(1), 77-86.

MacMahon, C., Baker, J., & Farrow, D. (2013). Developing sport expertise: Researchers and coaches put theory into practice. Routledge.

Mangan, J. A. (2013). The games ethic and imperialism: Aspects of the diffusion of an ideal. Routledge.

 

 

Imagine you and your team have been asked to give a presentation at a health care expo about consumers

Click here to order this assignment @Tutoriage.us. 100% Original.Written from scratch by professional writers.

Imagine you and your team have been asked to give a presentation at a health care expo about consumers and their health care choices. To accomplish this presentation, your team has decided to select a health care company or product to use as an example during your presentation.

Pick companies to use in your presentation:

  • Hospital system launching a new diabetes program

Create a 3-slide presentation with speaker notes that includes the following:

Impact of Outside Agencies

  • Analyze the impact government agencies have on services companies offer or products that are available to the health care consumer.

Cite 3 peer-reviewed, scholarly, or similar references.

Format your assignment according to APA guidelines, including a title and references slide and speaker notes.

A saver wants $100,000 after ten years and believes that it is possible to earn an annual rate of 8 percent on invested funds.

Click here to order this assignment @Tutoriage.us. 100% Original.Written from scratch by professional writers.

A saver wants $100,000 after ten years and believes that it is possible to earn an annual rate of 8 percent on invested funds.
a) What amount must be invested each year to accumulate $100,000 if
(1) The payments are made at the beginning of each year or
(2) If they are made at the end of each year?
b) How much must be invested annually if the expected yield is only 5 percent?

In a paper of 1,250-1,500 words, research a key social justice movement in United States history

Click here to order this assignment @Tutoriage.us. 100% Original.Written from scratch by professional writers.

In a paper of 1,250-1,500 words, research a key social justice movement in United States history. Trace the evolution of historical interpretation of this idea from its inception to modern day. Have historians’ interpretations changed over time?

Prepare this assignment according to the guidelines found in the Turabian Style Guide

You and your company have been contracted to upgrade the existing network to include the following expansions.

Click here to order this assignment @Tutoriage.us. 100% Original.Written from scratch by professional writers.

You and your company have been contracted to upgrade the existing network to include the following expansions. A network proposal has to be developed for a manufacturing company. The design is an L-shaped building approximately 1500 square feet. They will have 1 reception and 5 offices. Each office employee has a personal printer. They are not using a network to communicate.

Currently: President’s Office (4), Accounting (3), and Business and HRM (2)

Future Plans: HR (6), Accounting (5), and Breakroom (2)

They are moving to a larger building 3500 square feet. They are expanding and will add 15 more offices. They will add network printers and wireless network for employees and guest. They will need to share files between departments.

Design a network for this company to incorporate a network server, printer and wireless network. Provide a security solution for them. What type of topology? What type of cabling will need to be used? You will need to determine cabling, hardware and software needs. Include a timeline and cost analysis for the executives.

You and your company have been contracted to upgrade the existing network to include the following expansions. A network proposal has to be developed for a manufacturing company. The design is an L-s