You will create a 15 slides PowerPoint Presentation (the cover slide and Works C

You will create a 15 slides PowerPoint Presentation (the cover slide and Works Cited Slide do not count towards the 15 slides) that covers how important elements of The Rise and Fall of Jim Crow are interwoven into Lorraine Hansberry’s “A Raisin in the Sun.” You must go back and review your questions and the videos to pinpoint a minimum of 5 examples and show how they are interwoven in the play by using examples of characterization, examples of symbolism, and examples of the setting.
In laymen terms, What 5 things did you identify from the videos? List them
1.
2.
3.
4.
5.
Now, how are they interwoven into Hansberry’s use of characterization, symbolism, and setting of the play? 
Here is an example: Jim Crow is interwoven in the jobs Walter, Ruth, and Mama have. Provide an example from the play that supports this belief.  When you provide an example, it should be a direct quote followed by an intext citation. Now, explain it.
Another example where Jim Crow is visible in Hansberry play is through Walter’s desire for a liquor store. On page… Walter state,” provide the quote” (Hansberry 342). Now, explain the significance of the quotes.
You must use direct quotes with intext citations and explain your information thoroughly.
Slides Must Haves (Use a readable font and color, use a creative but appropriate background)
Quotes and paraphrases from all Acts of the Play-you must use quotes. Support your stance. You must use information from the video. Refer to the Rise and Fall of Jim Crow Announcement to cite information from a video
Examples of Characterizations (Walter Lee Younger, Ruth, Lena, Beneatha)
Examples of Symbolism
Examples of Setting
*You must offer an analysis for each example you provide. Make your you thoroughly explain your example.
You must include a cover slide which does not count towards your 15 slides of content.
The 17th slide will be the Works Cited Slide
Avoid waiting until the last minute to complete your work. Your work must be your own. Plagiarism results in automatic failure.
See the sample slide below from a student. Be sure you proofread your slides. Below, you will see capitalization errors, citing errors, and making the connection between the example of Walter Lee Younger and Booker T. Washington. This student should elaborate more to connect the two examples.

Choose from one of the following options. Be sure to include the option number i

Choose from one of the following options. Be sure to include the option number in your response.
1. Job Search
Use Indeed.com, Monster.com, or LinkedIn.com to research IT job careers that require Linux Administration skills in your area. You can use keywords such as “Linux Administrator” or “Linux Engineer.”
Examine three job openings that you think match the skills you learned during the course.
Which parts of the course do you think helped you prepare for these job openings?
What skills, qualifications, or experience do these jobs require?
What do you think about the salary range for this position? Did you find the salary expectations or anything surprising about the salary range?
Are you finding jobs in your area? Would you be willing to relocate?
Did any of the jobs require certifications? If yes, which certifications?
Did any of the jobs require nontechnical skills?

2. Share Your Job Search Experiences
If you are currently working in a technology-related field, can you share your experience finding this position or any other past jobs that you have worked in?
Can you describe how you found the job? This could include networking, job searches, job fairs, staffing agencies, and any other methods that you can share with the class.
What are some of the skills that this position requires? This can include both technical and nontechnical skills. Which skills do you think are most important?
How well do these skills align with what you have learned during the course?
What advice can you provide for someone who is pursuing a career in technology?

You have now learned about recognizing security threats, vulnerabilities, and ho

You have now learned about recognizing security threats, vulnerabilities, and how to mitigate them. Almost every day, there are reports of an intrusion, breach of confidentiality, or some other high-profile attack.
Find a news article about a recent network attack (no more than one year ago). Answer the following questions in a paragraph:
What type of attack occurred?
Was the attacker successful in penetrating the system or network?
What, if anything, was the attacker able to access or obtain?
What is the effect to the organization and customers because of the attack?
What can you learn from this incident? If you are the network engineer or the person in charge of the network/infrastructure/data, what would you have done differently to prevent this from happening again?

You’ve won the business! Faster Computing has agreed to the project. As the fina

You’ve won the business! Faster Computing has agreed to the project. As the final stage of pre-implementation, you have been asked to produce a training guide that will demonstrate how to install Linux and provide an overview of several common commands, as follows:
(11.1.3: Install the software.)
Use a hypervisor of your choice to install Linux. Many hypervisors are available, such as Oracle’s VirtualBox, which is a free download. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. See below for specific screenshot requirements. You should include at least 3 screenshots (e.g., disk partitioning, timezone selection, creating the default account). Each screenshot should be accompanied by a brief explanation of what you did.
NOTE: It is not necessary to include screenshots of installing the hypervisor software.
(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)
Demonstrate command-line operations that will provide the following information:
A listing of files in a directory and common file attributes
The current directory (hint: also known as the present working directory)
Create a file, then copy it to a different directory
Create a second file and move it to a different directory
Remove the first file, as well as the copy you created
The manual page for a given command
Create a text file, then use an editor to modify the content. Then display the content of the modified file
(1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.)
In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., ls, cp, mv, rm) in your documentation as well as in your screenshots.
(11.2.1: Configure technology according to stakeholder specifications and requirements.)
Show running processes on the system. Demonstrate how to search for a specific process
Forcibly stop a running process
In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., top, kill, -9, ps) in your documentation as well as in your screenshots.
(13.1.1: Create documentation appropriate to the stakeholder.)
The deliverable for the final phase of the project is a written paper with screenshots. There is no minimum or maximum page requirement, but all of the requirements must be met.  Use the Training Guide Template to record your work. This section will be graded upon the overall usefulness of the training guide to the organization.
(11.3.1: Add and update systems as required.)
This portion of the training guide helps determine your submission is unique.
Important Requirement
On the final screenshot, you need to open a command line and type in the following commands (without the quotes):
“date”
“echo CMIT391”
“echo ” (Replace your name here with your name)
The recommended format is to provide screenshots incorporated within the written narrative. The screenshots must all be your own. Screenshots from external sources are not permitted. You must include the specific screenshot listed above or your project will not be accepted.
(1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.)
The training guide must have a cover page, an introduction, summary, and at least 3-5 references.
(1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.)
Employ proper spelling and grammar. All Linux commands must be lower case.
(2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.)
In your conclusion of at least a paragraph, summarize why using Linux is beneficial for employees, management, and the organization as a whole.

Next week, the final element of your project will be due. In this phase, you’ll

Next week, the final element of your project will be due. In this phase, you’ll install Linux into a virtual machine and demonstrate some Linux commands.
A vital element of the project is virtualization. Have you previously used virtualization tools, such as VMware, VirtualBox, HyperV, or others? If so, share your experiences. If not, what are your observations? How do you think virtualization might be beneficial?
For your follow-up postings, feel free to ask any questions as you begin working on the virtual install. Have you run into any issues so far? What questions do you have about virtualization?
In addition to your primary forum response, post at least two follow-up responses to your classmates.

If you haven’t already done so last week, download the Troubleshooting and Tools

If you haven’t already done so last week, download the Troubleshooting and Tools Report Template and use it to record your work.
The SITREP (Situation Report) Sample Report is provided so that you can understand what Cyber Command is expecting in your report. Your report will vary depending on the problem and tool selected.
Select one of the seven network problems and develop a troubleshooting and tool report that details the solution.
On Day 2 of full operational capability (FOC), our connection to the internet was becoming intermittent. We could establish connections to our globally hosted servers some of the time. The connection would drop at seemingly random periods and we don’t know why. We have experienced this day and night, and it has been consistent for the past three days.
When our connection to the internet is working, we seemingly cannot reach out to our globally dispersed servers from our hosts. We use the globally dispersed servers for command and control and must be able to connect to them. We need a method to determine where the packets are going and why they are not reaching their destination. Because these servers are globally distributed, we can’t just pick up and deploy to them.
Our internal network servers are also spotty. Sometimes they are up, and sometimes they are down. For example, the DHCP server appears to provide IP addresses to hosts that are turned on sometimes, but other times when the host is turned on, it receives an Automatic Private IP Address (APIPA). These hosts can communicate with our networked hosts locally, but they can’t reach out to our global servers. These hosts enable our persistent engagement capability, so they must be functional, and we need to determine the problem ASAP!
We have a team that can troubleshoot from afar, but the members are located 25 miles west of this location. We have one of the tech support personnel deployed on site, but there are just too many issues for one person. The support team that is 25 miles west is centrally located to support multiple operational outfits. That team has a virtual private network (VPN) and secure access to our internal servers. At times, support team members need to determine which of our hosts are functioning. We use both Microsoft Windows and Linux operating systems, but we don’t know what tool will help determine host functionality from afar.
This next part is classified, but I need your help, and I need it fast. Bottom line, we believe there may be an insider threat. At times, we have reason to believe a nonapproved device is connecting to the network and reaching out to the internet. We need a method to determine what devices exist on the same subnet of our network. What can help us do that?
When we begin operations in 72 hours, it will be of utmost importance for us to know what device name is associated with what IP address. This will allow us to know what exists internally and what we need to defend should the adversary begin operations against us. We need to understand what options exist to achieve this task.
When we first arrived and established our connection to the internet, we noticed inbound connection requests. What tool can we use to determine if any adversary is reaching into our systems through a particular port or protocol?
Your report should be about a page in length and address the following:
Choose and restate one of the problems identified as you understand it and explain why it is a problem.
Describe how you would apply the steps in the Network+ troubleshooting model to this problem.
Name and provide a brief overview of the tool that could solve this problem (refer to Lesson 17 in uCertify).
Describe how the tool can be used to solve similar problems in the future.
Provide a detailed overview of the tool’s functionality and options.
Include a screenshot of your selected tool from the appropriate uCertify lab.
https://leocontent.umgc.edu/content/umuc/tus/cmit/cmit265/2238/course-resource-list/troubleshooting-and-tools-report-resource.html?ou=918240
https://umgc.ucertify.com/app/?func=ebook&chapter_no=18

Our startup is looking to get some information on event experiences at carnivals

Our startup is looking to get some information on event experiences at carnivals/outdoor events so that we can shape our product direction in the new year. We are looking to build an app that can accompany specific kinds of experiences. Our first topic is understanding the carnival Dunk Tank experience deeply. We are looking for a person to write about their first-hand experience (in the style of a detailed recap blog) in participating in such an event. Your content will not be used for commercial purposes, and we are looking just to collect aggregate information.
Questions you should answer in your write-up:
1. When was the event, and approximately how old were you when you participated?
2. What was the event, and how did you get involved?
3. Who organized the event, and what was the occasion?
4. How was your preparation for the event? What were your outfit considerations?
5. What was the physical and emotional sensation before, during, and after the experience? Include as much details as possible about your first dunk, including the anticipation
6. Would you do this experience again? If not, why not?
7. Please include pictures if you have them!

    **all the requirements are included in the instructions tab.            

    **all the requirements are included in the instructions tab.
                                                                                            analyze his distribution company by using a PivotTable to answer the questions on the Solution tab.                                                                                                   
                                                                                                       
    Using a PivotTable, answer the questions on the Solution tab, save your results using the format:                                                                                                   
    [last name][first initial]-EA03.xlsx.  For example, pumphreyd-EA03.xlsx                                                                                                   
                                                                                                       
    Upload your file to Excel Assignment 03 in the Excel Assignment area of Blackboard.                                                                                                   

I need to write a report about AI that includes Title page, abstract, table of c

I need to write a report about AI that includes Title page, abstract, table of contents , introduction and etc you can find the rest in the file image file in the attachment. all instructions are written in the attached files as well, if you need additional details pls let me know.
(While some people may see Ai as a negative inclusion to society, others see the overwhelming
importance to society’s advancement. Ai allows for rapid productivity in a business world where
“time is money” and many people prefer immediate satisfaction. Write a literature review about
how artificial intelligence has helped improve society economically and/or culturally.) also, I attached a sample of the report about robotics.