its a discussion post for philosophy class
there’s a 3 screenshots explains everything about the post and also you need to respond to 2 students posts
WE WRITE ESSAYS FOR STUDENTS
Tell us about your assignment and we will find the best writer for your paper.
Write My Essay For MeRead below student posts and reply each in 130 words.
Aditya-Yes, I completely agree with the referendum mandating state-wide lockdown until the further notice. Coronavirus is the global pandemic and as of now there is no cure and vaccine for this virus. The only way is social distancing and stays away from the public areas so that it will be easy to prevent the potential impacts of virus. Still people are not taking this seriously and started travelling over the weekends and doing all fun activities which may increase the severity of the Pandemic and raise the challenges. Lockdown is necessary for the Coronavirus so that it will be easy to control the quick spread.
Some countries are enforcing the lockdown strictly and asking the people to stay at home, since more and more people are affecting with this global pandemic it is vital to take all the necessary practices. In the absence of treatment and vaccine it is necessary for the people to stay away from the public places and maintain the distance to stop the spread. Coronavirus may create the severe impact on old age people and they face the breathing problems once they tested positive. Coronavirus is spreading rapidly and people should be aware about the impacts of virus.
State-wide lockdown is mandatory for the communities so that they can stop the spread in the initial stages and safeguard them from negative impacts. When people in the communities are not happy with the lock-down move, it is the responsibility of the people to create them adequate awareness about the severity of the virus and how to protect them when lockdown implements. Since there is no treatment and vaccine for the Covid-19 global pandemic people should take all the adequate practices and protect the communities from the spread. Lockdown and Social Distancing is the only way right now for the people to face the pandemic and prevent the spread.
Avinash -COVID-19 is a pandemic of coronavirus that started in 2019. This a pandemic coronavirus that is caused due to server acute respiratory syndrome in the world. This is the mode of spreading the virus at human to human transmission and damage the respiratory system in the human body. I strongly agree with this referendum of statewide lockdown in the world is important for reducing COVID-19. The specific reason for lockdown is to reduce the COVID-19 and lockdown is important to stay the people in the home that specific required for reducing risks of spreading the virus. A worldwide-spreading virus of COVID is an issue so lockdown is needed in the world (Adela & et al., 2020).
Lockdown should be required for maintaining benefits to reduce risks of COVID-19. Shelter in place for employees to reduce workload with reducing affected areas in an organization. COVID-19 pandemic is spread virus so lockdown is important to prevent undiagnosed infected people from traveling in different places. Spreading infection is stopped with help of preventing traveling persons in the world. This process is important for reducing spreading areas and is affected in one area (Lazarus & et al., 2020). COVID-19 is reduced with a proper lockdown in the world with support massive government to support the business.
I would appeal to colleagues and other leaders in the community with help of video calls, communication skills are used for protection teamwork. COVID-19 is embraced for developing modern information to maintain an isolated area. Perhaps leaders in the democratic world should be required for developing responsibilities to reach the target with safeguard measurement. Some of the statement is important for securing the information by leadership and pathway at crisis. Leaders in the community are important for supporting a decision to protect the world against the COVID-19. Lockdown is required for increasing credits by maintaining specific information with maintaining safeguards in a world (Meena & et al., 2020). Supporting decisions is important for reducing issues with maintaining the good health of employees.
Sanjay -Review on Linux and Android Operating Systems
In 2012, Al-Rayes described operating systems as programs that manage all the application programs in a computer and are loaded into the device by a boot program. Operating systems are responsible for various activities such as file management, inputs, outputs, memory and process management, and controlling multiple devices such as disk drives. Thus, operating systems are essential software in computers, and without them, the computer is inoperable. There are various operating systems, including the Linux Operating System, Windows Operating System, VMS, OS/400, AIX, and Android, among others. The author reveals that though they are all operating systems, they differ in various ways, as in the case of Linux and Android.
According to Al-Rayes, various learners usually imply that Linux OS is meant for Desktop and Server. At the same time, Android OS is generally confined to mobile phones, which is not absolutely right and not the main difference between the two. Android is not limited to mobile phones only but also runs other devices such as cameras, watches, and cars. Linux OS is the most common OS, while the Android OS is a substructure developed from the Linux OS. Hence, every Android device runs Linux but not every Linux device contains Android. Linux was primarily initiated for individual and office system activities while Android was majorly developed for mobile and tablet types. Linux also provides multiple architecture support, while Android offers only two main architectures, i.e., ARM and x86. This aspect is considered the prime difference between the two operating systems.
Additionally, the Linux system applies magnetic, and standard Linux systems adopts the EXT journaling file classification, whereas Android uses flash memory for record keeping. Moreover, Android takes Dalvik virtual machine to carry out its applications such as JVM, while Linux does not use VM’s in its operations. Also, Android possess a larger footprint compared to Linux. Linux uses APM or ACPI for power management while Android relies on its power manager module.
Sateesh-Organizations, through the management, are striving amidst the rising security threats to ensure the operations of the organization are always available or resume within the shortest time possible after a disaster occurs. Disaster recovery is enhanced through strategies such as the use of the computer security incident response team (CSIRT). According to Jacobs, von Solms, and Grobler (2016), a computer security incident response team is becoming an essential aspect for organizations as organizations attempt to address the rising number of cyber threats as well as the manner in which the cybersecurity threats are becoming sophisticated. The computer security incident response team is a group of dedicated individuals equipped with the right tools that help such teams to effectively protect the servers, networks, in addition to other Information Technology (IT) infrastructure to ensure the confidentiality, integrity, and authenticity of the data and other confidential information is preserved. By identifying and swiftly responding to incidences. This paper addresses ways in which an organization can build a CSIRT and the components to building an effective as well as successful CSIRT teams.
Ways of Building a CSIRT
One of the ways that are effective when building a CSIRT is through proper education and training of the employees. According to Jacobs, von Solms, and Grobler (2016), education and training of the employees should focus on helping the employees pay close attention to the roles and complementary skills. This process is important because it will help the employees and the organization to be able to identify easily and effectively. Through proper training and education, the organization will be able to ensure that the employees work seamlessly with each other. For example, the non-technical CSIRT embers should be able to collaboratively work with the technical teams. This will ensure that the possibility of having friction and resistance from some of the team members towards each other. The second way in which an organization can build a CSIRT is through developing a deep bench of experts based on an effective and realistic IT budget (Drivas et al., 2020). Security incidences are bound to happen at any time, even when the organization least expects. The organization should establish a CSIRT team that will be dispersed geographically. This will ensure that an expert is always available to respond to incidences that occur. To cut on costs, the organization could have a few full-time and other experts that can be called when an incident occurs. This will help to develop an effective CSIRT team. The third way in which an organization can use to establish a CSIRT is through developing advocacy programs.
Sanjay -CSIRT
CSIRT is an abbreviation of a computer security incident response team. The core role of the CSIRT is to identify and alleviate potential cyber-attacks in an organization. With advanced technology, the number of potential cyber-crimes has grown tremendously, raising the importance of the organization’s CSIRT team. Hence, organizations have built CSIRT to alleviate cyber-attacks in the organization.
In building CSIRT, organizations establish a gaining executive buy-in (Reyes-Mena, Fuertes-Díaz, Guzmán-Jaramillo, Pérez-Estévez, BernalBarzallo, & Villacís-Silva, 2018). Building a compelling CSIRT call for management support in terms of time, finances, and other resources required by the team. After the buy-in, a strategic plan of CSIRT is established by the formulation and assignment of administrative issues and ensuring that roles and responsibilities are well assigned and that every team member is in agreement. This creates teamwork that leads to the effectiveness of the security entity. The third step is ensuring the collection of relevant information. In information collection, the potential incidents are listed and prioritized according to their impact on the organization. Besides, possible mitigation strategies are also established. Subsequently, the CSIRT’s vision is designed (Reyes-Mena, et al. 2018). The crucial entities of CSIRT are determined by presenting the collected information to incident response constituency needs. The creation of the CSIRTS’ vision calls for the definition of constituency needs, objectives, and the team’s mission. The CSIRT’S vision is then communicated to the organization. The team creates awareness of its charter and how they would be conversing in case of a security concern (Mohd, Yunos, Ariffin, Nor, & Malaysia, 2016). In this phase, organizations also collect feedbacks and refine the team to serve the organization better. After the group’s communication and refinement, the CSIRT is implemented, and the specifications of incident-tracking systems and incident reporting are established for the constituency. Besides, the constituency of the group is communicated, their operational hours, and their contact information. Lastly, the effectiveness of CSIRT is evaluated by gathering feedback on its efficiency from staff and comparing it with others, which have been useful. Organizations adhere to the above ways when building CSIRT.
A successful CSIRT team should possess various components to ensure its effectiveness in curbing security threats (Mohd et al. 2016). A successful CSIRT team should have a comprehensive plan on how to handle threats, how to segregate threat occurrences, determine their magnitude, how to terminate the invasion, and exterminate the root cause. The program also defines the team’s mission, services offered, and the policies and procedures to be followed. Also, for the CSIRT team to succeed, it should have the right constituency. The team should hire the required employees and clearly define their roles to avoid confusion. Lastly, the CSIRT team should also have the right tools which handle security incidents on a large scale. The tools analyze, alert, and also help in mitigating security adversities.
Sanjay -Review on Linux and Android Operating Systems
In 2012, Al-Rayes described operating systems as programs that manage all the application programs in a computer and are loaded into the device by a boot program. Operating systems are responsible for various activities such as file management, inputs, outputs, memory and process management, and controlling multiple devices such as disk drives. Thus, operating systems are essential software in computers, and without them, the computer is inoperable. There are various operating systems, including the Linux Operating System, Windows Operating System, VMS, OS/400, AIX, and Android, among others. The author reveals that though they are all operating systems, they differ in various ways, as in the case of Linux and Android.
According to Al-Rayes, various learners usually imply that Linux OS is meant for Desktop and Server. At the same time, Android OS is generally confined to mobile phones, which is not absolutely right and not the main difference between the two. Android is not limited to mobile phones only but also runs other devices such as cameras, watches, and cars. Linux OS is the most common OS, while the Android OS is a substructure developed from the Linux OS. Hence, every Android device runs Linux but not every Linux device contains Android. Linux was primarily initiated for individual and office system activities while Android was majorly developed for mobile and tablet types. Linux also provides multiple architecture support, while Android offers only two main architectures, i.e., ARM and x86. This aspect is considered the prime difference between the two operating systems.
Additionally, the Linux system applies magnetic, and standard Linux systems adopts the EXT journaling file classification, whereas Android uses flash memory for record keeping. Moreover, Android takes Dalvik virtual machine to carry out its applications such as JVM, while Linux does not use VM’s in its operations. Also, Android possess a larger footprint compared to Linux. Linux uses APM or ACPI for power management while Android relies on its power manager module.
Krishna -Conflicts and Innovation
Conflicts in a team can arise from many sources. In most cases, conflicts in a team arise because of individual differences, such as different personalities. Conflicts can also occur when the team members have different opinions over the team’s methods, needs, and goals. Conflicts in a team, in most cases, are seen as bad. However, if properly managed, conflicts can help team members solve many challenges facing the team (Greer & Dannals, 2017). I was once in a team that had conflicts.
The team members were planning to do fundraising. The money was expected to do something for the church. However, the team members disagreed on the project they were supposed to run after getting the money. One team suggested the team to buy public addressing system for the church while the other team was suggesting the team to start a small business where the church can get extra money to run some of its projects. The team leader did not see it as a big issue until team members started fighting. The leader decided it was time to solve the conflict by bringing the team members together and discuss the issue.
The members discussed the problem, and they all agreed to buy the public addressing system after they realized the challenges associated with running a business for the church. From how this conflict was solved, it is evident that one way of solving conflict and making the best decision is from discussing the matter openly and listening to every member’s opinion. The quality of the conflict can be improved by managing it. Conflict will have positive results only when it is appropriately managed. My creativity Using the three T (tolerance, technology, and talent) (Hansen & Niedomysl, 2008) to determine my creativity, I can say I am perfect in talent and technology.
I like finding solutions to most of the challenges I face through researching on the web. I also like coming up with new devices that can be used to solve problems. However, I am not that good at interacting with outsiders. One way to enhance my creativity is to encourage open communication in a team. It is easier to come up with new ideas when I am discussing the issues with others. Another way of enhancing my creativity is by engaging myself with challenging tasks. As I struggle to find the solution to challenging tasks, creativity improves automatically.
Manoj -Team conflict comes from the way individuals look at the movements of others and from Varying thoughts and ideologies of the team’s work and the way it must be fulfilled. General reasons of team conflict involve conflicting attentiveness, irreconcilable work styles, emulation over resources, non-fulfilment in sticking to norms, inefficient communication, and Lack of performance. Conflict among team members arises from various circumstances. Few disputes have their grounds in the way individuals behave, in spite of the fact that others arise from difference of opinion regarding the nature of the team’s work and the way in its assistance to fulfil. Few types of conflicts are listed. Firstly, competing interests, Disputes can come when individuals have mutually conflicting desires or requirements. For instance, two individuals of a team with alike skills might both require a specific assignment, backing out the one who doesn’t obtain it aggrievedly (Leadership to reconcile team diversity or conflict, 2013).
Then possessing different behavioural styles, People may fight over their particular work habits, consciousness to detail, communication exercises, or tone of expression. Although these can influence collaboration of interrelated tasks, they can specifically hinder direct cooperation. Competition over resources Members may clash over the restricted resources obtainable to fulfil the team’s works. For instance, if two individuals both depend on the deeds of a third person to reach identical time limits, difference in opinion might come over whose work must receive that person’s interests first. Failure to stick to the team norms, A member of a team produce dispute when they exhibit viewpoints or behaviours that go in opposition to the team’s concurrence about the way it will function. If a team standard calls for precisely coming at meetings and forbid the utilization of mobile devices throughout discussions, disregarding these implementations can bring about disputes. Lack of Performance, when few members of a team are no matter what are not putting their share of endeavours or not carrying out at the awaited level of quality, the inflicting that outcome can generate friction, which may be emphasized when typical or perceptible tasks are included (Shortland, Alison, & Moran, 2019).
Pavan- Conflicts are common in a team when there is exchange of thoughts happening in which they disagree the other persons opinion. As a team leader it is his duty to prevent the conflict from happening and resolve it. Team conflict is multidimensional, comprising of both relationship-and undertaking based components. Relationship conflicts are contradictions among team individuals radiating from relational contrary qualities and normally incorporates strain and ill will. Assignment conflict depicts differences among team individuals identified with the substance of their choices and contrasts in perspectives, thoughts, furthermore, sentiments about the assignment. Teams are characterized as gatherings that have at least three individuals in which individuals perceive themselves as including a team and where individuals have one or more normal, quantifiable, objective situated errands. In teams, conflicts may happen at various levels, including the dyadic level or the intrateam level. Past examination on conflict has principally researched conflict as happening at just each degree of investigation in turn, for example, the impacts of intrateam conflict on team execution or the impacts of relational, or dyadic conflicts, on dyadic results.
Part 2.
The initial step to settling Conflicts on a team is to expect and see just which types may happen. Most specialists concur there are seven general groupings of Conflict. The initial four are the ones ordinarily experienced on a strategic team. The four characterizations generally experienced are Content, Decisional, Material and Role. The issue of there being nobody right answer is the very base of the most ordinarily experienced Conflict on a strategic team, task-centered Conflict. task-centered Conflict as Conflict that happens when team individuals can’t concur on thoughts, conclusions and choices about gathering objective accomplishment. This is the place the administration must cooperate to shield this kind of Conflict from getting ruinous.
Sooraj-User Account Control (UAC) is a feature delivered in Windows Vista and later Windows systems to provide additional security to control unauthorized changes made to the system. With the use of UAC, the system can restrict the administrator logins on the system to avoid threats to the system. UAC allows user to login with administrator credentials but creates to sessions: one with administrator privileges and one without it.
The user’s current session does not have administrator privileges, but can be given these privileges by the user to enable the administrator session. This will significantly reduce the risk of attacks on the system from the client’s end.
Earlier Windows operating systems did not have this security measure, resulting in every user logged on having administrator privileges. This allowed for threats to attack the system on the user end.
The vendor’s lack of adequate security in software allows the user to be open to all kinds of risks. This could result in a compromise of user information which leaves the user open to all kinds of threats. This, in my opinion, is a major violation of the software vendor’s part as it affects the clients, that is the user. Providing security may have some added financial operating costs. Cutting costs may provide some financial advantage to the vendor, but the user pays the price for this by keeping the user open to attacks.
Vendors have a responsibility to their shareholders. As shareholders have invested in the company of the said vendor, the user (shareholders) needs complete information. As this is a business relationship between the vendor and the user, complete transparency allows for the growth of both the user and the vendor and benefits both in the process.
Dheeraj-The User Account is actually a security barrier for the use of any information collected with the User Access . A breach in this section could, in part, result in a loss or the loss of information necessary for the use of such information or may result in an account suspension or withdrawal. If you create an account with us, you are responsible for complying with any applicable legal requirements. You should not create an account without our written consent. If you create an account with us, we may also disclose data to us in accordance with the terms and conditions on www.thehackerwallet.com/privacy. As part of this agreement, we and you agree that any User Account data we use for the purpose of this section may be retained for as long as required for our business purposes (Vlaeyen, J. W., Crombez, G., & Linton, S. J. (2016)) .
If you use a web browser on our site for any other purposes, such as advertising and promotion, you must provide us with reasonable notice of the purpose and any requirements, restrictions or limitations regarding that purpose. You may be able to opt-out of this provision as we see fit. If you allow another party to contact you, you may be required to notify us of any contact. We may require additional information from you regarding your conduct to resolve or prevent, and/or mitigate, any incident. We may also disclose your personal information to the relevant law enforcement authorities. In such cases, you may be entitled to compensation, including injunctive relief, for the harm caused to our reputation or the property of us, to others or for damages and costs incurred as a result of such abuse, abuse of power or negligence (Rezvani, B., Kalin, E. B., Chen, J. L., & Jalili, R. (2015)).
Get professional assignment help cheaply
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason may is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Our essay writers are graduates with diplomas, bachelor, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college diploma. When assigning your order, we match the paper subject with the area of specialization of the writer.
Why choose our academic writing service?
- Plagiarism free papers
- Timely delivery
- Any deadline
- Skilled, Experienced Native English Writers
- Subject-relevant academic writer
- Adherence to paper instructions
- Ability to tackle bulk assignments
- Reasonable prices
- 24/7 Customer Support
- Get superb grades consistently