post has three assignments
Simulation analysis of C1s, Cu 2p Spectra of copper paddle wheel based metal organic frameworks
Paper details: </strong></p><p style=”white-space: pre-wrap;”>An NBO simulation analysis of copper paddlewheel systems using Gaussian method DFT B3LYP and 6-311G(d,p) basis set have been studied to obtain the core orbital energy. The result compared with experiment. The copper systems contain by changing the linker groups from CH3, BENZEN, TERPTHALATE or rotate the H of terpthalate group.
2:Mass Incarceration is NOT the New Jim Crow
Order Description
Read article https://www.orchestratedpulse.com/2015/04/mass-incarceration-not-new-jim-crow/ and compare with book The New Jim Crow, Michelle Alexander. MAIN POINT IS TO FIND POINT FROM THE BOOK THAT GOES AGAINSTA A POINT FROM THE ARTICLE. WE NEED QUOTE THE BOOK AND ARTICLE!!!! DIRECT QUOTE!!!!! IT HAS TO BE WHERE ARTICLE WRITER AGREE WITH ALEXANDER BOOK AND WERE HE DISAGREE.
2. WHAT WE THINK OF HIS POINTS BASED ON READING.
so if article mentions that Author is against something we need find in book why it is importan to do that according the book.
EVERYTHING IS ABOUT ARTICLE AND BOOK!!! about article Author and Alexander and hers book. and there disagree and agree.
3:Wire shark
Complete this assignment in the Maryville Virtual Lab.
One of the most well-known packet sniffers is called Wireshark®. It is a powerful tool that can capture, filter, and analyze network traffic. It can promiscuously capture traffic on both wired and wireless networks. It is used by security and networking professionals to troubleshoot networking problems.
In this project, you will use Wireshark, capture packets, and look at the contents of a packet. When placed correctly, a network administrator can use Wireshark to see all the traffic coming into and out of a network. Network administrators can, among other things, see which hostnames are being requested and who is requesting them. Surfing the Web is not anonymous.
Before beginning your project, watch the following Wireshark 101 video from Hak5 for background information on the tool (please note the videos covers version 1 while we will be using version 2 but usage if very similar).
https://www.youtube.com/watch?v=f4zqMDzXt6k (Links to an external site.)Links to an external site.
Double-click the Wireshark icon on your desktop from the Maryville Virtual Lab that you used in Week 3 (If prompted to update the version, just select Skip this Version).
Click Local Area Connection on the home screen to begin collecting data. (This selects the network interface we’ll be using and starts data collection).
While you are waiting for data to be collected, open a web browser and go to a few websites of your choosing and then close the browser.
After a few minutes of collecting data packets that are passing over the network, hit Stop Capturing Packets (represented by a red rectangle).
Take a screenshot.
Sort your network traffic by selecting the Protocol heading which categorizes your traffic (e.g. ARP, TCP, UDP, etc).
Select 5 packets (from at least 3 different protocol types) and write a one page analysis (double spaced) for each packet discussing your opinion of what is occurring here (for a total of at least 5 pages). A good example of what is expected is in the videos provided herein. Take a screenshot of each packet you are analyzing as well (does not count toward the one page length requirement).
Close Wireshark and log off the Maryville Virtual Lab.
Also, you may find it interesting to load Wireshark on your home machine to analyze what traffic is coming from your internet service provider.
If you’d like a video that further expands on Wireshark, I recommend the one below.
https://www.youtube.com/watch?v=-aTGL4M0db4Links to an external site.</p>
Maryville Virtual Lab