Examine the strategy of the opening address, show the movement of how socrates argues against the three charges against him, and describe the plan of his defense.

Assignment is as follows: “Given your reading of plato’s dialogue, The apology, discuss what your consider the main points of socrates self-defense. Examine the strategy of the opening address, show the movement of how socrates argues against the three charges against him, and describe the plan of his defense.” “For your conclusion analyze socrates final speech to the jury (both those who found him guilty and those who did not) and his meditation which is better to die having had a life of excellence or to live and unexamined life”

Assemble enough relevant and richly-detailed evidence to sufficiently backup the claim, and integrate it through a combination of quotations and paraphrases.

Instructions Essay #2 Character-Analysis Essay Literature reminds its audience that the critical evaluation of an author’s power to create memorable characters remains a mainstay of a literary study. This conventional, although enlightening, approach often assumes E. M. Forster’s method that assesses characters for flatness, their two dimensionality and resistance to change, or roundness, their three dimensionality and vulnerability to change. All the texts by the following authors reveal round and flat characters of one kind or another: John Updike, Eudora Welty, Katherine Anne Porter, and ZZ Packer. Choose a round or flat figure from one of their stories, and write an essay in which you outline the transformation or stasis that the character experiences. Claim (Thesis). Make a clear, arguable claim that identifies the character under assessment as well as a specific description of the change or lack of change undergone. For example, you might explore the presentation of Updike’s Queenie for how she unchangingly represents order, confidence, and power. Remember that a claim must be debatable and, therefore, requires a strong supply of evidence for demonstration. Development. Assemble enough relevant and richly-detailed evidence to sufficiently backup the claim, and integrate it through a combination of quotations and paraphrases. Moreover, craft an introduction, body, and conclusion to give your essay the shape and focus demanded by its audience as well as give a suitable title. Audience. Attend to your academic audience’s needs. Anticipate its knowledge level, concerns, and values. Cohesion. Deploy words, phrases, and clauses as well as varied syntax (word order) to link the major sections of the text. The sense of cohesion generated should also clarify the relationship between the claim and evidence. Conventions.  Such norms include the use of one-inch margins, headers, double-spacing, and Times New Roman or Calibri font size twelve.  Review the “Sample Student Argument Paper” (Literature 1786-1788) for a model of how to write/format effectively in this genre and especially for how to cite quotations and create a Works Cited page.

In your opinion which of the following topics is best suited to a phenomenological inquiry?

In your opinion which of the following topics is best suited to a phenomenological inquiry? To a ethnography? To a grounded theory study? Provide a rational for each response.

a-The passage through menarche among Hatian refugee

b-The process of coping among AIDS patients

c-The experience of having a child with leukemia

d-Rituals relating to dying among nursing home residents

e-Decision making processes among nurses regarding do-not-resucitate orders

Explain what the enterprise architecture entails, and what is an attack surface?

Explain what the enterprise architecture entails, and what is an attack surface? Each week, research a unique news story or article related to Information Security/Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article.

Describe how locks could be used in order to qualify data transactions and enhance concurrency control.

• There are times when a database is accessed by many users across the enterprise. Transaction logs can help maintain concurrency in a multiuser platform. Describe at least two business scenarios where COMMIT and ROLLBACK would be required. Describe how these functions would be essential for business continuity and concurrency control. Identify how these functions would enable an organization to recover from a database corruption event.

• Describe how locks could be used in order to qualify data transactions and enhance concurrency control. Suggest at least two business scenarios that would benefit from implementing locking methods.

VH’s post states the following:

In a database, a transaction consists of a series of operations. Examples of operations include modifying, changing, deleting, or inserting data in a database. After starting the execution of a transaction, it may terminate with two possibilities: in case of failure, the transaction may abort or otherwise commit if it was completed successfully (Alkhatib & Labban, 2020). A COMMIT and ROLLBACK are among the set of instructions that are used to perform the operations. A COMMIT statement is used to ensure the modification made by the current set of operations is permanent. It makes the changes made by the transaction to be permanent. ROLLBACK process, on the other hand, involves canceling or undoing a set of transactions to restore the database to its previous state before the transactions were performed (Satyal, Weber, Bass & Fu, 2015).

An example of a business scenario in which, COMMIT and ROLLBACK are applicable is the maintenance of the database of a company engaged in the production and selling of different products. The company may want to maintain a database for storing customer ID, customer name, state, and country. If there is a modification on the tables such as deletion or insertion of customer information, the database administrator may consider publishing COMMIT to ensure the changes are not lost in case the session is closed (Satyal, Weber, Bass & Fu, 2015). Therefore, if the database administrator realizes that there is a need to revert the changes, then the correct command is ROLLBACK. COMMIT and ROLLBACK can also be used by big data analytics companies to automatically make changes on the database permanently or automatically remove the half-made entries in case of sudden power loss, database crash, or server crash. The database system analyzes all the logged transactions after restarting the system to commit the full-made entries and roll back the half-made entries.

Concurrency is the ability of a database system to process more than the transaction at a particular time. There are different features of a well-formed transaction such as atomicity, isolation, consistency, and durability. Also known as ACID properties, they are used to qualify a transaction in a database environment. The ACID properties enhance the reliability of transactions. Among the techniques used to control concurrency is locking. Locking ensures that shared resources or objects are protected and that two more database users are prevented from updating the same piece of data at the same time (Franaszek, Haritsa, Robinson & Thomasian, 1993). An example is the prevention of airline reservation clerks from booking the same seat for different passengers. Another example would be how the banking systems use locking techniques to control concurrency.

References

Alkhatib, G., & Labban, R. S. (2020). Transaction management in distributed database systems: the case of Oracle’s two-phase commit. Journal of information systems education, 13(2), 4.

Franaszek, P. A., Haritsa, J. R., Robinson, J. T., & Thomasian, A. (1993). Distributed concurrency control based on limited wait-depth. IEEE transactions on parallel and distributed systems, 4(11), 1246-1264.

Satyal, S., Weber, I., Bass, L., & Fu, M. (2015). Scalable rollback for cloud operations using AI planning. In the 2015 24th Australasian software engineering conference (pp. 195-202). IEEE.

Determine the factors you would consider when deciding whether to report your concerns to the proper authorities, the Better Business Bureau, or potential victims, or even resign from your position.

Respond to the colleagues posts regarding the following

“Ethics in Software Engineering” Please respond to the following:

• As a software engineer at a large security firm, you have been asked to develop a software program that will allow senior staff the ability to access personal details of individuals who are considered high security risks. While the information that is being accessed is a clear violation of personal privacy, it is also very likely that knowing this information will prevent a crime from occurring in the near future. Determine the factors that you would have to consider before deciding to accept or decline the project, and provide a justification to as to why you would or would not accept the project.

• Suppose you deemed a project you are working on to be outside of your ethical boundaries. Determine the factors you would consider when deciding whether to report your concerns to the proper authorities, the Better Business Bureau, or potential victims, or even resign from your position.

Explain whether you believe it is appropriate to apply psychoanalytic theory to women and individuals from racial and ethnic minority groups.

Review the attachment for all of the requirements.  One page with three citations and references.

Post:

· Summarize the assumptions of Freud’s psychoanalytical theory in 2 to 3 sentences.

· Explain whether you believe it is appropriate to apply psychoanalytic theory to women and individuals from racial and ethnic minority groups.

· Explain whether you believe psychoanalytic theory is consistent with social work values and social work ethics.

· Include at least 2 references and citations.

  • Auld, F., Hyman, M., & Rudzinski, D.      (2005). How is therapy with women different? In Resolution and inner      conflict: An introduction to psychoanalytic therapy (pp. 217–236).      Washington DC: American Psychological Association.
  • National Association of Social Workers.      (2008). Code of ethics of the National Association of Social      Workers. Retrieved from https://www.socialworkers.org/About/Ethics/Code-of-Ethics/Code-of-Ethics-English
  • Turner, F. J. (Ed.). (2017). Social work      treatment: Interlocking theoretical approaches (6th ed.). New York, NY:      Oxford University Press.

Chapter 1: Attachment Theory and Social Work Treatment (pp. 1–22)

Chapter 25: The Psychoanalytic System of Ideas (pp. 398–410)