quiz question 31
QUESTION 1
QUESTION 2
QUESTION 3
QUESTION 4
QUESTION 5
Slowing Down Global Warming
As Hite and Seitz (2016) discuss in Chapter 5: Climate Change, reputable scientific studies continue to show that the Earth is warming at an unsustainable rate because of a rise in the release of CO2 and methane gases.
What is the relationship between population increases and climate change? Do you think fertility control is an effective strategy to halt climate change? Why or why not?
Review the posts of your classmates and respond to at least one other post, offering a substantive comment on that classmate’s position on the issue(s).
Discussion Group Six: Your community has been struck by a tornado at 7:30 am on a September Wednesday. Right now you know that the school gymnasium, which was to be the temporary shelter was struck, but reports are at best sketchy. Right now power is out, people are confused and the phone is ringing off the hook. What would you do to bring order and assistance to your community in the first two hours of the emergency? Post this to both the Discussion Group Six folder and the discussion board (insure that you check off submit for grading) and reply to at least two other student’s postings. See the attached Rubric.
Please develop a PowerPoint presentation. Assignment details are attached as well as the rubric.
Class – Please review the attached lessons learned from Hurricane Sandy.
1. Review the key phases of disaster recovery as outlined in chapter 10 of your textbook
2. Briefly discuss the disaster recovery phases in chapter 10 and their relation to the lessons learned from Hurricane Sandy article. I need to see information systems related planning.
3. Discuss how you would alter sample plan based on the lessons learned from Hurricane Sandy Article. (Do not give me a copy of the altered plan, simply explain in the paper what you would alter)
• Include at least Six (6) reputable sources.
• Your final paper should be 1,250-to-1,500-words, and written in APA Style.
write some feedback about this chapter
max 200-250words
Read chapter 12 in Rosewall and add your main takeaways to the word document.
Read the Innovation at International Foods Case Study on pages 234-238 in the textbook. Answer the Discussion Questions at the end of the Case Study.
Your responses must be complete, detailed and in APA format. All work must be 1 FULL page, single spaced, 12 font Times New Roman. The cover and reference page must be on separate pages. Please DO NOT include the question in your work as only your findings should be submitted.
APA
References
Substance abuse as a community health problem.
Violence and nursing response.
Read chapters 26 and 27 of the class textbook and review the attached PowerPoint presentations. Once done answer the following questions.
As stated in the syllabus present your assignment in an APA format word document, Arial 12 font attached to the forum in the discussion tab of the blackboard titled “Week 6 discussion questions†and the SafeAssign exercise in the assignment tab of the blackboard. If you don’t post your assignment in any of the required forums you will not get the points. A minimum of 2 evidence-based references besides the class textbook no older than 5 years must be used. You must post two replies to any of your peers sustained with the proper references no older than 5 years as well and make sure the references are properly quoted in your assignment. A minimum of 700 words is required. Please make sure to follow the instructions as given and use either spell-check or Grammarly before you post your assignment.
For your guidance, there is a rubric attached in the assignment.
Please check your assignment after the week is due because I either I made comments or ask for clarification in some statements.
Initial discussion response should be 300 words. This is not the only criteria utilized for evaluation; substantive content is imperative. All questions in the topic must be addressed. Please proofread your response carefully for grammar and spelling. Do not upload any attachments. All responses need to be supported by a minimum of one scholarly resource. Journals and websites must be cited appropriately. In -text Citation and reference must adhere to APA format (6th Ed.).make sure when citing references include DOI
Select 3 of the following conditions to discuss:
Hello,
I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.
Instructions:
Discuss how to secure Node.js applications.
Student one:
JavaScript has been around since 1995, and originally was mainly used to to execute scripts within web browsers. This limited developers in a sense because they had to use different languages when working client side, and server side applications. In 2009 Node.js was created which allows JavaScript to run within a computers process itself. This means that Node can be used to write server applications that can access operating systems, file systems, and other needs to build fully functioning applications. With the development of Node.js developers have had to learn how to secure their applications. There are multiple ways to secure Node.js applications, and the website https://medium.com provides a great list of some of those way.
Number one on medium.com’s list is to embrace linter security rules. They suggest that using a security plugin will help to catch security issues, and vulnerabilities in the early stages of coding. Another way to help with security concerns is to limit concurrent requests using a middleware. Doing this will help applications from being overwhelmed by too many requests at once. Number four on the list is the idea that developers should prevent query injection vulnerabilities with ORM/ODM libraries. These types of libraries are good at preventing SQL/NoSQL injections, and other malicious attacks. One more of the multiple security ideas for Node.js is to avoid DOS attacks by explicitly setting when a process should crash. When errors are not handled a Node process will crash. However a common best practice is to recommend an exit even if an error was handled. These are just a few of the many ways that Node.js can be secured.
References:
Goldberg, Martin, & Scheufler. We’re under attack! 23+ Node.js security best practices. 25 July 2018. https://medium.com/@nodepractices/were-under-attac…
Patel, Priyesh. What Exactly is Node.js? 18 April 2018. https://www.freecodecamp.org/news/what-exactly-is-…
-Rory
Student two:
Good day class, this week we are talking about Node.js and how to secure it. This is a large and broad topic that can cover many areas and facets of coding. One of the key things to remember and keep in mind when talking about node.js is that it is a java script application that primarily runs on a server side and handles data. This means that it deals directly with the data on the server, which poses a great risk as if malicious code was introduced into it, this code would then have access to the actual data on the server.
Hackers are and those with malicious intent will look for the easy target with the biggest payoff. In terms of security, node.js is a prime target. One of the main jobs of node.js is to get and manipulate data on a server. This could be calling files, open web pages, pulling in content from third party sources, ect. For this reason, and its increasing popularity, node.js is vulnerable. A recent review by Snyk, showed that 83% of users found at least one vulnerability in their node.js code (7 tools to secure node.js applications from online threats, 2019).
There are a few ways of secure your applications that are created. Some of these include using known third party apps that your calls will pass through before passing onto the server that contains the data. I realize the irony of saying that malicious injections of sql code into your application or malicious third party program calls are a threat but using a third party can also secure your app.
There are a number of methods that a hacker could use to inject bad code or to view the source code of your application or to attempt to inject bad or malicious returns form valid scripts. These can include the ability to execute code modifications or intercepting of the sql requests or calls for data from the server.
Another vulnerability comes from that of the fact that many developers and people operate on the honor code and believe that most people do not have ill intent. They believe that if they make calls from third party apps or locations that the data requested or traffic is secure and safe. this is not always the case and one should be cautious before doing so form untrusted or unvetted sources. this also opens one up to the vulnerabilities of any third party source that is called.
Interesting read this week while researching and reading on this topic.
References:
7 Tools to Secure Node.JS Application from Online Threats. (2019, March 11). Retrieved from https://geekflare.com/how-to-secure-nodejs/
-Steven
Email:
support@homeworkassign.com
Call us:
+1 (914) -607-8799
Hi there! Click one of our representatives below and we will get back to you as soon as possible.