how facebook threat and breakthrough our privacy ?

Writing

I want essay about ( the privacy paradox in Facebook ) includes :

1-A-introduction

B- four paragraph

C- conclusion

2-topic sentence

3-thesis statement

4- two direct quote and undirect quote

5-APA style

6- 800 to 1000 words

7-essay plan and project notes (attached)

Operation Elevate Drive for Homeless Veterans Plan Paper

Humanities

Instructions: ***Take note: A detailed budget, media plans such as press releases or flyers as well as plans for social media usage, and evaluation plan.

A detailed budget for any proposal you make should be clear, well organized and easy to understand. Consider using spreadsheets to show the budget clearly so others can easily see what cost is involved for your program.

Consider the following for your budgets:

Expenses – What are the expenses that your program will create? Consider everything. Even the smallest details are important to capture. You wouldn’t want to forget something and then have to come back and ask for more money later. Below are some items you might find on your budget for your expenses:

– Staff/Employee Cost – What and how many staff will you need? What will the salaries/wages look like for each person involved? Indicate the cost of staff by hours and weeks. For example, for staff earning hourly wages, you may have 1 staff who will make $17 per hour and will work 20 hours per week and then another staff who will be making $12 per hour who works 40 hours per week. You may also have a staff who is paid a salary and you can just include what that would be.

– Technology/Equipment – copiers, printers, computers, etc

– Advertising/Communications – flyers, ads in local papers or tv/radio stations, etc

– Space – Office/Venue Cost

– Supplies – general office supplies, training supplies, etc.

– Travel expenses – mileage reimbursement, overnight stays, etc

Income – You may or may not have income involved in your program. Consider if you will have money coming to help off-set the expenses you are proposing. Are other organizations going to contribute toward the cost? Is your program a fundraiser? Will you use some of the proceeds from your fundraiser to off-set the costs? If you have income related to your program, make sure to include that in the budget also.

***Take note: A detailed budget, media plans such as press releases or flyers as well as plans for social media usage, and evaluation plan.

I have uploaded an example of what a budgeting sheet is suppose to look like but please make sure that everything else up top is covered. This is Part 3 of a 4 part assignment so I have uploaded my Part 1 and Part 2 with my budgeting information for my program proposal.

Essay-Revision

Essay-Revision

Revise the essay

Read all the revision guide

Story link and quotes https://www.studypool.com/discuss/3465965/rhetoric…

steps-necessary-to-secure-the-back-end-DB2-database-within-your-organization-homework-help

steps-necessary-to-secure-the-back-end-DB2-database-within-your-organization-homework-help

Unit 1

Don’t forget originality

You have been asked to make a presentation about the steps necessary to secure the back-end DB2 database within your organization. Address the following in the

presentation:

Introduction regarding description and importance of security in depth

UNIX server vulnerabilities

Hardening the UNIX system

Deployment of a Web server to be used by Navy intelligence for checking on project progress

Apache and Internet information server (IIS)—research and explain how these options might be used for the secure Web server scenario

At least 9 slides

presentation to address these points. The presentation planned should last about half an hour. Include speaker notes in the presentation. Plan

the presentation and speaker notes so that someone else could actually give the presentation.

Be sure to document your references using APA format.

Unit 3

Don’t forget originality

Choose five of the following topics related to perimeter security and prepare a 8 slides presentation on that topic. The slide presentation should contain speaker notes

to explain the subject further. Also, include a cover slide and a reference slide.

Use these five topics for the individual portion of the project:

Border routers

Screened subnets

Intrusion prevention system (IPS)

Proxy firewalls

Equipment redundancy

The individual presentation should include the following:

An explanation of how the security method works

Advantages and disadvantages of the chosen security

Trade-offs for using the specific security

Issues that are addressed by the security method chosen

Be sure to document your references using APA format.