3pages answer

Write an essay about the history of the criminalization of undocumented immigrants in the United States. Your essay should include a discussion of the 1921 and 1924 Immigration Acts that Mae Ngai writes about in “The Strange Career”; why and when ICE was created, how and why Trump “radicalized” it (Franklin Foer); and how it operates today, including 287G, for-profit detention centers, and refugee policy and practice (“Immigration Nation,” New Yorker Radio Hour, and “On the Media”). Your essay should include a discussion of historical continuity. While it may be tempting to say that everything changed once Trump (or Biden) became president, we have learned that there is often more continuity than change. For example, while the Immigration Acts of 1921 and 1924 do represent structural change in immigration law (as does 9/11) what does the historian Tom Wong say in the OTM podcast (2nd link below) about immigrants seeking asylum at the border?

Database

  

Explain in 500 words or more what NIST Is and how it should be used by a dba.  

Reflection paper

At the end of this week, students will be able to:

  • Evaluate the value of this course by posting feedback in a discussion forum
  • Submit a reflection paper to articulate lessons learned in terms of preparing forcareer success.

Submit final Reflection Paper (4 – 5 pages) – in your paper, explain how you use the knowledge gained in this course to prepare for on-the-job success

You have completed item “a” for each section in the attached outline. Now proceed to complete items ‘b’ and ‘c’ for each section.  

Week 7 Discussion Forum: The Future of the Workplace

After watching the video below, post a disussion detailing your response to what was discussed in either or both videos.

Video Link: https://www.youtube.com/watch?v=1PyUbl39dI0

IT214 4

Question 1

 

You are the Primary Programmer on a new project for your company. The helpdesk reports that the program exits prematurely. The help desk attributes the crash to users deleting the file “myfile.txt” from the desktop. Write a Python program module using the try: exception: statement to capture this error and instruct the users the file does not exist. Always thank the users for using the program. Include the helpdesk phone number (888) 555.1515 in your message.

Question 2

 

Upload your answer to this question. NOTE: Your answer must be a Python program.

Write a python program, using dictionary, to print the following list:

PRODUCT              PRICE                QUANTITY  

Banana                     3.24                     10

Mango                       1.10                      3

Guava                        2.13                      5

Orange                       4.56                     1

Peach                         2.33                      1

Question 3

Write the pseudocode to convert feet to meters then to kilometers.

Your code should not exceed 50 lines.

use a digital camera, or even

  

 use a digital camera, or even your cell phone, to take at least five (5) digital photographs. Download the photos to your computer, and use an EXIF Viewer tool (such as the one that can be downloaded for free here: http://download.cnet.com/Exif-Viewer/3000-12511_4-10686903.html; or the online version found here: http://www.exifviewer.org/) to examine the EXIF data for each picture. Compare the results shown to you by EXIF Viewer with the EXIF data reported by your operating system (e.g., Windows 7, OS X, etc.; right-click each photo and view the properties – may need to choose the “Details” tab). Are there any differences? Which method provided more information? Paste the photos into a Word document followed by a list of each photo’s EXIF data, and explain to your instructor how this EXIF data contained within a digital photograph could be used in an investigation of child pornography. Provide THOROUGH discussion

Computer Science

 

Discussion:

Describe and discuss the use of at least five  applications of WEB-GL in the real-world.

Limit you answer to 300 words.

Discuss common forms of attack on Microsoft systems using the Internet

 

Instructions

Assignment Instructions

Week 1 Assignment:

In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Instructions

1. Discuss common forms of attack on Microsoft systems using the Internet, and/or your job as reference for full credit
2. Read the week 1 article on installation and deployment of Windows Server 2012 and list 5 concerns that could result in vulnerabilities during installation.

Article Link

3. Discuss three basic network components and how they are used today.

Submission Instructions: The report must be at least 300 words.

SE494 A 1

 Prepare report on Haptic Interface for Mobile Technology. It should be in IGU writing format

Your two pages MS Word  document  should address the following topics.

  • Definition of haptic interface.
  • The difference between Haptic Touch vs 3D Touch in the mobile technology
  • Classification of haptic interactions with real environments 
  • Haptic interfaces for Body-based devices for mobile healthcare applications
  • Skin-integrated wireless haptic interfaces for mobile healthcare applications
  • Haptic Interface mobile phone examples for mobile healthcare applications