Questions
Your blog post should have a unique title. It should summarize the current event source with...

Your blog post should have a unique title. It should summarize the current event source with the hyper link to the source. The blog post should connect to our textbook and sociological concepts. It should be at least 400 words. Lastly, it should be grammatical correct.
To complete this assignment you should:

First, student must create a blog, which I provide another document showing step by step instructions. Student will only have to do this once. After that is done, every time the assignment is due students just have to copy and paste their entry onto the website and share their link. Therefore, students may write their post in a word documents or any other preferred writing system.


In the blogs, students must find a current or relevant item from any of the following: films, YouTube videos, scholarly articles, and newspaper articles, and students must relate it to the sociological topic of the week (source must not too old, it need to be present). This will be the space to keep up with current events related to sociology and social problems. After the research is done, students must summarize in this information in their own words. Next, students will connect this current or relevant item to what the sociology course is covering that week. You do this by defining and quote the sociological concept from the textbook or lecture, and then describing how the current event reminds you of this concept. Students may also discuss what they learned from it. Students may not use any clips that were already used for the lectures or assigned films/docs. Hence, each blog post will consist of, at least overall, 400 words by summarizing and reflecting on the relevant item and using an outside resource to engage and enhance your connection to the reading(s).
My suggestion is to use wordpress.com, but there are other options. Blogs are free; you should not pay anything to create a blog. Please make sure to insert your word count at the end of the blog entry and the relevant item link is posted. Grammar, spelling, sentence structure, and organization is important!


My suggestion is one, strong paragraph on the summary and reflection on the source (200 words), and a second paragraph on the week’s reading and how it connects to your source (200 words). In the latter paragraph, you should be using sociological concepts and citing its source. Please make sure to insert you word count at the end of each entry.

In: Psychology

Write a Java program to encrypt and decrypt a phrase using two similar approaches, each insecure...

Write a Java program to encrypt and decrypt a phrase using two similar approaches, each insecure by modern standards.

The first approach is called the Caesar Cipher, and is a simple “substitution cipher” where characters in a message are replaced by a substitute character.

The second approach, due to Giovan Battista Bellaso (b 1505, d 1581), uses a key word, where each character in the word specifies the offset for the corresponding character in the message, with the key word wrapping around as needed.


⦁   Using loops
⦁   String and character processing
⦁   ASCII codes


⦁   Data Manager class – CryptoManager.java
⦁   Implement each of the methods specified in this file. This version as provided will print error messages in the console, because they are just the skeletons.
⦁   Each of the methods are static, so there is no need to create an instance of the Data Manager.
⦁   Document each of your methods with a simple description and document the class with a simple description and your name using in-line comments (//…). (Just a short sentence fragment will suffice for each documentation string.)
⦁   The methods are described below.
⦁   public static boolean stringInBounds (String plainText);
   This method determines if a string is within the allowable bounds of ASCII codes according to the LOWER_BOUND and UPPER_BOUND characters. The parameter plainText is the string to be encrypted. The method returns true if all characters are within the allowable bounds, false if any character is outside.
⦁   public static String encryptCaesar(String plainText, int key);
This method encrypts a string according to the Caesar Cipher. The integer key specifies an offset and each character in plainText is replaced by the character the specified distance away from it. The parameter plainText is an uppercase string to be encrypted. The parameter key is an integer that specifies the offset of each character. The method returns the encrypted string.
⦁   public static String decryptCaesar(String encryptedText, int key);
This method decrypts a string according to the Caesar Cipher. The integer key specifies an offset and each character in encryptedText is replaced by the character "offset" characters before it. This is the inverse of the encryptCaesar method. The parameter encryptedText is the encrypted string to be decrypted, and key is the integer used to encrypt the original text. The method returns the original plain text string.
⦁   public static String encryptBellaso(String plainText, String bellasoStr);
This method encrypts a string according to the Bellaso Cipher. Each character in plainText is offset according to the ASCII value of the corresponding character in bellasoStr, which is repeated to correspond to the length of plaintext. The method returns the encrypted string.
⦁   public static String decryptBellaso(String encryptedText, String bellasoStr);
This method decrypts a string according to the Bellaso Cipher. Each character in encryptedText is replaced by the character corresponding to the character in bellasoStr, which is repeated to correspond to the length of plainText. This is the inverse of the encryptBellaso method. The parameter encryptedText is the encrypted string to be decrypted, and bellasoStr is the string used to encrypt the original text. The method returns the original plain text string.
⦁   Add additional methods if you wish to make your logic easier to follow.
⦁  
⦁   GUI Driver class – (provided)
⦁   A Graphical User Interface (GUI) is provided. Be sure that the GUI will compile and run with your methods. The GUI will not compile if your method headers in CryptoManager.java are not exactly in the format specified. When you first run the application, your methods will all throw exceptions, which will be caught by the GUI and printed out in the console.
⦁   Do not modify the GUI.
⦁   The GUI takes care of capitalizing your input strings.
⦁  
⦁   JUnit Test/Test Driver
⦁   Once your methods are implemented, run the test driver. Ensure that the driver file results in the following output, as shown in RED (of course the output will not be in red when you run the test driver):
⦁   "THIS TEST SHOULD SUCCEED" Is it in bounds? true
⦁   "THIS TEST THAT SHOULD FAIL BECAUSE { IS OUTSIDE THE RANGE" Is it in bounds? false
⦁   "This test should fail because of lowercase letters" Is it in bounds? false
⦁   Caesar cipher of "THIS IS ANOTHER TEST" should return "WKLV#LV#DQRWKHU#WHVW": WKLV#LV#DQRWKHU#WHVW
⦁   Bellaso cipher of "THIS IS ANOTHER TEST" should return "WU\VR9F#N!RF88U-'HED": WU\VR9F#N!RF88U-'HED
⦁   Caesar decryption of "WKLV#LV#DQRWKHU#WHVW" should return "THIS IS ANOTHER TEST": THIS IS ANOTHER TEST
⦁   Bellaso decryption of "WU\VR9F#N!RF88U-'HED" should return "THIS IS ANOTHER TEST": THIS IS ANOTHER TEST
⦁   Run the JUnit test file (provided). Ensure that the JUnit tests all succeed.
⦁   Include CryptoGFATest.java and CryptoManagerTest.java with the rest of your submission.

The first approach is called the Caesar Cipher, and is a simple “substitution cipher” where characters in a message are replaced by a substitute character. The substitution is done according to an integer key which specifies the offset of the substituting characters. For example, the string ABC with a key of 3 would be replaced by DEF.
If the key is greater than the range of characters we want to consider, we “wrap around” by subtracting the range from the key until the key is within the desired range. For example, if we have a range from space (‘ ‘) to ‘_’ (i.e., ASCII 32 to ASCII 95), and the key is 120, we note that 120 is outside the range. So we subtract 95-32+1=64 from 120, giving 56, which in ASCII is the character ‘8’. If the key is even higher, we can subtract the range from the key over and over until the key is within the desired range.
Since our specified range does not include lower-case letters, the GUI (provided) will change strings to upper case. You can find the ASCII table at http://www.asciitable.com/, or many other places on the Internet.
The second approach, due to Giovan Battista Bellaso (b 1505, d 1581), uses a key word, where each character in the word specifies the offset for the corresponding character in the message, with the key word wrapping around as needed.
So for the string ABCDEFG and the key word CMSC, the key word is first extended to the length of the string, i.e., CMSCCMS. Then A is replaced by ‘A’ offset by ’C’, i.e., ASCII 65+67=132. The range of the characters is also specified, and again we’ll say ‘ ‘ to ‘_’ (i.e., ASCII 32 to ASCII 95). The range is then 95-32+1=64. In our example, the offset is “wrapped” by reducing 132 by the range until it is the allowable range. 132 is adjusted to 132-64=68, or character ‘D’ in the encrypted phase. Then the same logic is applied to the second letter of the plain text ‘B’ shifted by the second letter of the key word ‘M’. This results in the character ‘O’ as the second letter in the encrypted phase, and so on. In each approach, if the resulting integer is greater than 95 (the top of our range), the integer is “wrapped around” so that it stays within the specified range. The result is “DOVGHSZ”.
Your program will implement several methods that are specified in the file “CryptoManager.java”. A Graphical User Interface is provided, as well as a test file, that you should use to make sure your methods work correctly. Be sure to follow the naming exactly, as the tests will not work otherwise.
There are several features of Java that we have not yet covered in class. Just follow the syntax specified in this document and in the file CryptoManager.java. First, the required methods are “static”, which just means that they are available from the class even if an instance has not been created. To call a static method, for example, “public static void myMethod();” the syntax is CryptoManager.myMethod();. Another feature that may be useful in this project is the method charAt(i) on a string, which returns a character at position i of a string (zero-based). So “thisString”.charAt(3); would return the char ‘s’.
Notes:
⦁   Proper naming conventions: All constants, except 0 and 1, should be named. Constant names should be all upper-case, variable names should begin in lower case, but subsequent words should be in title case. Variable and method names should be descriptive of the role of the variable or method. Single letter names should be avoided.
Indentation: It must be consistent throughout the program and must reflect the control structure

In: Computer Science

Robert Campbell and Carol Morris are senior vice-presidents of the Mutual of Chicago Insurance Company. They...

Robert Campbell and Carol Morris are senior vice-presidents of the Mutual of Chicago Insurance Company. They are co-directors of the company’s pension fund management division. A major new client has requested that Mutual of Chicago present an investment seminar to illustrate the stock valuation process. As a result, Campbell and Morris have asked you to analyze the Bon Temps Company, an employment agency that supplies word processor operators and computer programmers to businesses with temporarily heavy workloads. You are to answer the following questions.

What happens if the growth is constant, and g > rs? Will many stocks have g > rs?

In: Finance

Robert Campbell and Carol Morris are senior vice-presidents of the Mutual of Chicago Insurance Company. They...

Robert Campbell and Carol Morris are senior vice-presidents of the Mutual of Chicago Insurance Company. They are co-directors of the company’s pension fund management division. A major new client has requested that Mutual of Chicago present an investment seminar to illustrate the stock valuation process. As a result, Campbell and Morris have asked you to analyze the Bon Temps Company, an employment agency that supplies word processor operators and computer programmers to businesses with temporarily heavy workloads. You are to answer the following questions.

What is a constant growth stock? How do you value a constant growth stock?

In: Finance

Arrange the following items in the appropriate income statement and balance sheet formats. Determine in which...

Arrange the following items in the appropriate income statement and balance sheet formats. Determine in which of these two documents each of these items belongs, then include all appropriate items in outlines of an income statement and balance sheet. Prepare your response as a Word document.

  • Sales
  • Cash
  • Depreciation expense
  • Inventory
  • Accounts payable
  • Cost of goods sold
  • Long-term debt
  • Accrued expenses
  • Accounts receivable
  • Income tax payable
  • Income tax expense
  • Retained earnings
  • Accumulated depreciation
  • Prepaid expenses
  • Interest expense
  • Sales tax payable
  • Operating expenses
  • Gross profit
  • Contributed capital

In: Accounting

The COVID-19 pandemic is first and foremost a human tragedy. Measures introduced to deal with the...

The COVID-19 pandemic is first and foremost a human tragedy. Measures introduced to deal with the pandemic could save lives but are having wide-ranging economic effects and inducing economic contagion. Greater focus is needed on the transmission mechanisms of the economic contagion and how assessments of the economic impacts are made.

Q1       Assess the impacts of Covid-19 outbreak on regional trading agreements such as ASEAN and European Union.

Q2       Discuss the impacts of Covid-19 crisis on global financial market and the role of International Monetary Fund (IMF) in overcoming the crisis.

-The answer most be more then 1700 word withe references

In: Economics

Give two examples of brands where manufacturing costs are well below the selling price. With that...

Give two examples of brands where manufacturing costs are well below the selling price. With that in mind provide answers to the below questions;

1. How have the companies been successful in charging high prices to the brand’s consumers, despite the low costs of manufacturing?

2. How is customer information used as a part of the pricing strategy?

Be prepared to discuss and defend your choices with your classmates.

Your Discussion should be a minimum of 250 words in length and not more than 750 words. Please include a word count. Use APA citations and references for the textbook and any other sources used.

In: Economics

Function Name: rhyme() Parameters: ● words - one stringcontaining multiple words Return Value: none Description:...

Function Name: rhyme() Parameters: ● words - one string containing multiple words Return Value: none Description: I don’t care what all English teachers have said, I think it is a cRHYME against humanity to write a poem that doesn’t rhyme! Dr. Seuss and the Cat in the Hat would agree with that, so we are going to write a function that takes in a string of words and finds the words that rhyme with “cat” (HINT: A word that rhymes with “cat”b has to end with “at”).

Test Cases: >>>rhyme("that,rat,Holt,moose,thermostat")

Words that rhyme with cat:

that

rat

thermostat

In: Computer Science

Write a program using C to read a list of your friend names which ends by...

Write a program using C to read a list of your friend names which ends by the word end. The program builds a linked list using these names and prints the names in the order stored into the linked list The list can be created using insertion at the beginning or insertion at the end; Use switch case to select the type of insertion;

Case 1:insertion in the beginning;

Case2:insertion in the end.

Once the list is printed after insertion; count the total number of names(nodes) in the link list and then,remove the name from the list (entered by the user at run time) and then print the list and count of nodes.

In: Computer Science

Instructions EHR Systems As with Surveillance Systems, it is critical to understand the various systems used...

Instructions

EHR Systems

As with Surveillance Systems, it is critical to understand the various systems used in healthcare to collect data in a clinical setting. It is also critical to understand the various standards, which allow the sharing of information about a patient to provide quality care.

Tasks:

Based on your reading, create a 5- to 6-page document in Microsoft Word, which includes the answers to the following questions:

Describe and explain the basic components and benefits of an EHR System.

Describe and defend your opinion on the current status of hospitals meeting the requirements of MU today and in the future?

Examine and discuss briefly the HIE and the need for standards.

In: Nursing