What kinds of ethical challenges do research in nanotechnology and nanocomputing pose? (Minimum word count: 60)

The purpose of this activity is to reinforce what you have learned so far about bioethical issues.

1. What is “technological convergence” in the context of cybertechnology? (Minimum word count: 60)

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

2. Why do some converging technologies raise special ethical and social issues? (Minimum word count: 60)

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

3. Describe key aspects of pervasive (or ubiquitous) computing. How is it different from conventional or traditional computing? (Minimum word count: 60)

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

4. What is bioinformatics, and how is it different from computational genomics? (Minimum word count: 60)

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

5. Identify three kinds of ethical issues associated with bioinformatics. (Minimum word count: 60)

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

6. How does the practice of storing personal genetic data in privately owned computer databases raise issues affecting information ownership and property-rights? (Minimum word count: 60)

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

7. What is machine ethics? (Minimum word count: 60)

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

8. What is nanotechnology? (Minimum word count: 60)

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

9. What are nanocomputers? (Minimum word count: 60)

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

10. What kinds of ethical challenges do research in nanotechnology and nanocomputing pose? (Minimum word count: 60)

_____________________________________________________________________________________

_____________________________________________________________________________________

_____________________________________________________________________________________

Do you think the management needs to encourage their companies to have joint ventures with other companies or other countries and why?

Please answer the questions of following chapters in detail with citing the textbook (we using APA citing, means just add it at the end of your assignment). or other research sites.

Please answer Discussion questions of following chapters in detail with citing the textbook or other research sites:

Chapter 4, discussion questions #1,2,3,4,5, pg #129

Chapter 5 – assignment: Discussion questions #1,2,3,4 pg 157

Chapter 6 assignment, Discussion questions #1,2,3,4,5, pg184

Due before 11:55 PM on 06/29

Sample of citing:

Works Cited

Journal, The Wall Street, Stephen Gosling, and Women Impacting Public Policy. “Should the Small Business Administration Be Abolished?” The Wall Street Journal. Dow Jones & Company, 20 Mar. 2012. Web. 27 Feb. 2017.

Pride, William M., Robert James Hughes, and Jack R. Kapoor. Foundations of business. Boston: Cengage Learning, 2016. Print.

“The pros and cons of independent business ownership and franchises.” Guidant Financial | The pros and cons of independent business ownership and franchises. Guidant Financial, N.p., n.d. Web. 27 Feb. 2017.

One Discussion

 

This week’s  class forum discussion:

Do you think the management needs to encourage their companies to have joint ventures with other companies or other countries and why?

What behavioral observations do you make about the client after reading the case vignette?

You can identify the referral question from the case vignette you choose. You might also consider the following referral questions in formulating your hypothesis:

  • As a forensic mental health professional, what factors do you need to consider in your psychological testing for the forensic assessment report?
  • What behavioral observations do you make about the client after reading the case vignette?
  • What are your assessment options in working with the client?
  • What standard and accepted psychological tests might you apply to your client in forensic settings?
  • How will you recognize and evaluate your client’s offender behaviors associated with malingering and deception?

Explain the importance of the reliability rate metric. Part 2 – Based on these statistics, what is the reliability rating of the cloud service’s reporting capability?

1)  Over the past two years a cloud service consumers have made 24,531 attempts to invoke a cloud service’s reporting capability. Of those attempts, 22,904 resulted in the successful execution of this capability.

Part 1 – Explain the importance of the reliability rate metric. Part 2 – Based on these statistics, what is the reliability rating of the cloud service’s reporting capability?

2) Over the past two years a cloud service consumers have made 24,531 attempts to invoke a cloud service’s reporting capability. Of those attempts, 22,904 resulted in the successful execution of this capability.

Part 1 – Explain the importance of the reliability rate metric. Part 2 – Based on these statistics, what is the reliability rating of the cloud service’s reporting capability?

The OSI model is inefficient; each layer must take the work of higher layers, add some result, and pass the work to lower layers. This process ends with the equivalent of a gift inside seven nested boxes, each one wrapped and sealed. Surely this wrapping (and unwrapping) is inefficient. Cite a security advantage of the layered approach. 

 1. Explain under what crecumstances:

(a) Packets can get lost

(b) Packets may be delivered out of order

(c) Duplicate copies of a packet may be delivered

(d) Packets can be delayed for a long timekjj

2. Explain The role of:

(a) Round Trip Time (RTT) in Time Out (TO) calculation. Why estimation of RTT is not trivial?

(b) Explain The role of Address Resolution Protocol (ARP). What is its vulnerability?

(c) Explain The role of Domain Name System (DNS). What is its vulnerability?

3. The OSI model is inefficient; each layer must take the work of higher layers, add some result, and pass the work to lower layers. This process ends with the equivalent of a gift inside seven nested boxes, each one wrapped and sealed. Surely this wrapping (and unwrapping) is inefficient. Cite a security advantage of the layered approach.

4. TCP is a robust protocol: Sequencing and error correction are ensured, but there is a penalty in overhead (for example, if no re-sequencing or error correction is needed). UDP does not provide these services but is correspondingly simpler. Cite specific situations in which the lightweight UDP protocol could be acceptable, that is, when error correction or sequencing is not needed.

Explain under what crecumstances:  (a) Packets can get lost 

 1. Explain under what crecumstances:

(a) Packets can get lost

(b) Packets may be delivered out of order

(c) Duplicate copies of a packet may be delivered

(d) Packets can be delayed for a long timekjj

2. Explain The role of:

(a) Round Trip Time (RTT) in Time Out (TO) calculation. Why estimation of RTT is not trivial?

(b) Explain The role of Address Resolution Protocol (ARP). What is its vulnerability?

(c) Explain The role of Domain Name System (DNS). What is its vulnerability?

3. The OSI model is inefficient; each layer must take the work of higher layers, add some result, and pass the work to lower layers. This process ends with the equivalent of a gift inside seven nested boxes, each one wrapped and sealed. Surely this wrapping (and unwrapping) is inefficient. Cite a security advantage of the layered approach.

4. TCP is a robust protocol: Sequencing and error correction are ensured, but there is a penalty in overhead (for example, if no re-sequencing or error correction is needed). UDP does not provide these services but is correspondingly simpler. Cite specific situations in which the lightweight UDP protocol could be acceptable, that is, when error correction or sequencing is not needed.

Explain what controls climate and basically how are they determined and classified.

Need in 3 hours or less . APA format. Must be 300 words and include references.

Explain what controls climate and basically how are they determined and classified.

Research Methods in Health and Human Services.

My name is Celeste M. I have two discussion post due tomorrow at 10: pm. I am a student in a new class HHS 460 Research Methods in Health and Human Services. Discussion One is Research Steps and Application and the other discussion is Intake Process Can anyone help me with this please. I am in a bind as I am ill and wish not to start the new class of with a bad grade. Thank you if someone answers. Celeste M. Ashford University

. Describe the key elements of the Disaster Recovery Plan to be used in case of a disaster and the plan for testing the DRP.

Please select a Disaster Recovery Plan (DRP) for any selected scenario. You can choose any organization’s plan or create your own.

1. Describe the key elements of the Disaster Recovery Plan to be used in case of a disaster and the plan for testing the DRP.

2. Briefly discuss the internal, external, and environmental risks, which might be likely to affect the business and result in loss of the facility, loss of life, or loss of assets. Threats could include weather, fire or chemical, earth movement, structural failure, energy, biological, or human.

3. Of the strategies of shared-site agreements, alternate sites, hot sites, cold sites, and warm sites, identify which of these recovery strategies is most appropriate for your selected scenario and why.

4. For each testing method listed, briefly describe each method and your rationale for why it will or will not be included in your DRP test plan.

• Include at least Eight (8) reputable sources.
• Your final paper should be 1,000-to-1,250-words, and written in APA StyleDi

  Would you describe yourself as a progressive educator?  Why/Why Not?  Be specific.

Think about the key aspects of Progressive Education.  Would you describe yourself as a progressive educator?  Why/Why Not?  Be specific. You must cite at least two sources from the readings, using APA format.  Your response should be no less than three paragraphs.  Respond to at least two other students with no less than one paragraph each.