Wednesday, December 25, 2019
The five-paragraph formula is a destructive formula that cuts the blood flow of creativity from students. As Campbell essentially argues in his paper, Ã¢â¬Å"Beyond the Five-Paragraph Essay.Ã¢â¬ CampbellÃ¢â¬â¢s main idea that he reiterates and stresses over and over again; is that the five-paragraph formula doesnÃ¢â¬â¢t properly allow students to express themselves with their own unique voice through writing. The alternatives to the five-paragraph formula are better suited for students as they allow students to use as he stated, Ã¢â¬Å"their authentic, authoritative voices. Campbell sets the scene by showing how some teachers defended the five-paragraph formula when he was doing a presentation on common core standards. CampbellÃ¢â¬â¢s main reason for writing theÃ¢â¬ ¦show more contentÃ¢â¬ ¦Campbell did a great job in laying out and showing the main reasons and arguments against the five-paragraph formula. However, in terms of his essay, he neglected to mention a few things that wouldÃ¢â¬â¢ve further enriched his essay. One of the critical aspects he neglected to mention that I would add would be mainly statistics instead of heavily relying on anecdotal evidence. For example, on page 62 as he is discussing the key issues with the formula he stated, Ã¢â¬Å"it doesnÃ¢â¬â¢t ensure success on standardized testsÃ¢â¬âor in college.Ã¢â¬ I wouldÃ¢â¬â¢ve added a statistics further enriching the say by getting his point across and having a somewhat of a shock factor. A shock factor wouldÃ¢â¬â¢ve really made his point stand out and would not just have the essay rely on anecdotal evidence but a mixture of scientific and anecdotal evidence. Moreover, I wouldÃ¢â¬â¢ve also included a more sound concluding paragraph. I felt like the last paragraph left a somewhat sour taste in my mouth; I wouldÃ¢â¬â¢ve added now that they are able to write better essays their writing has drastically improved and really highlighted the overall difference in quality between using different formulas. I believe that wouldÃ¢â¬â¢ve enriched the essay and left a more sound concluding paragraph with a much sweeter taste. From the get-go CampbellÃ¢â¬â¢s voice was established and had a booming presence throughout. He also had his ideas shine through and not get muffled when referencing other peopleÃ¢â¬â¢s works; truly elevating andShow MoreRelatedAn Empire for Slavery Book Essay1538 Words Ã |Ã 7 PagesRandolph B. Campbells An Empire for Slavery: The Peculiar Institution in Texas provides in an in depth look at the slavery existence in the state of Texas. He provides the factors that explain the establishment and growth of slavery. Campbell also explains the economic and legal institution of Texas, and explores the physical and psychological effects of both slaves and their masters prior to the Civil War, during, and after emancipation. Campbell provides clear detail of slaverys impact on TexasRead MoreStrengths And Limitations Of Qualitative Research1394 Words Ã |Ã 6 Pagesparadigm and the requirements of the researcher. Qualitative research particularly doesnÃ¢â¬â¢t involve numerical data but studies and collects data in an empirical form. KerlingerÃ¢â¬â¢s view (1966) completely rejected the idea of qualitative research whereas CampbellÃ¢â¬â¢s idea (Mile Huberman, 1994) stated all research has a qualitative basis. However, it becomes important to be aware of the major advantages and disadvantages of qualitative research in order to answer the research question thoroughly. My concernRead MoreCommunication Between Physicians And Patients2285 Words Ã |Ã 10 Pagesthat fifty percent of psychosocial and psychiatric problems are missed, that physicians interrupt patients an average of eighteen seconds into the patientÃ¢â¬â¢s description of the presenting problem, that fifty-four percent of patient problems and forty-five percent of patient concerns are neither elicited by the physician nor disclosed by the patient,Ã¢â¬ that patients and physicians do not agree on the main presenting problem in fifty percent of visits and that patients are dissatisfied with the informationRead MoreLady Macbeth By William Shakespeare2143 Words Ã |Ã 9 Pagesmental state. As Macbeth continues to murder in order to solidify his position as King of Scotland, Lady Macbeth becomes mentally unstable because she cannot handle the guilt or the effect that the murder has had on her husband. For instance, in Act Five Lady Macbeth is shown sleepwalking and speaking to herself. The doctor cannot figure out what is wrong with her, and the audience can tell that she has gone hysterical (V.i.34-72). This is because she represses her feelings instead of expressing them;Read MoreEssay on The Fast Food Culture is Detroying America4188 Words Ã |Ã 17 Pagescountries where dairy products are consumed in the largest quantities -- the United States, Finland, Sweden, and the United Kingdom. Nathan Pritikin studied the medical research on osteoporosis, and found no basis at all for the Dairy Council viewpoint: African Bantu women take in only 350 mg. of calcium per day. They bear nine children during their lifetime and breast feed them for two years. They never have calcium deficiency, seldom break a bone, rarely lose a tooth. Their children growRead MoreReaction to My Sisters Keeper Movie5317 Words Ã |Ã 22 Pagesfirst child is born, Paige becomes frustrated with the pressures of motherhood and increasingly estranged from the busy Nicholas. At the end of her patience, she decides to leave her family and seek her own mother, who left her when Paige was only five. Paiges heartwrenching decision leads her to deal with her own identity as she discovers she is not like her irresponsible mother. A happy ending ensues, with Paige returning to her family and Nicholas learning to take on more family responsibilitiesRead More Subverting the Conventional: Combining Genre in Kellys Donnie Darko6339 Words Ã |Ã 26 Pages $403,706,375 6. Jurassic Park $356,763,175 7. The Lord of the Rings: The Two Towers $337,526,600 8. Forrest Gump $329,452,287 9. The Lion King $328,178,880 10. Harry Potter and the SorcererÃ¢â¬â¢s Stone $317,557,891 Five of the films listed above are Epics with an additional two being purely Action films (most of the Epic films, except Forrest Gump, could be considered members of the Action genre as well). The remaining three are family films with some componentsRead MoreResources Capabilities20336 Words Ã |Ã 82 Pagesresource over and above the cost of bringing it into production.9 In practice, distinguishing between proÃ¯ ¬ t arising from market power and proÃ¯ ¬ t arising from resource superiority is less clear in practice than in principle. A closer look at PorterÃ¢â¬â¢s Ã¯ ¬ ve forces framework suggests that industry attractiveness derives ultimately from the ownership of resources. Barriers to entry, for example, are the result of patents, brands, distribution channels, learning, or some other resource possessed by incumbentRead MoreLogical Reasoning189930 Words Ã |Ã 760 Pagesabout your own lifeÃ¢â¬âdecisions about what to believe and decisions about what to do. The chapter begins a systematic program of study of all the major topics regarding logical reasoning. Along the way, the book focuses on developing the following five skills: (1) writing logically, (2) detecting inconsistency and lack of clarity in a group of sentences, (3) spotting issues and arguments, (4) detecting and avoiding fallacies (reasoning errors), and (5) generating and improving arguments and explanationsRead MoreBrand Building Blocks96400 Words Ã |Ã 386 Pageswhich brand equity is based will differ from context to context. However, they can be usefully grouped into five categories: 1. Brand loyalty 2. Name awareness 3. Perceived quality 4. Brand associations in addition to perceived quality 5. Other proprietary brand assetsÃ¢â¬âpatents, trademarks, channel relationships, etc. The concept of brand equity is summarized in Figure below. The five categories of assets that underlie brand equity are shown as being the basis of brand equity. The figure also
Tuesday, December 17, 2019
WIRELESS FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM A thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Technology in Electrical Engineering by Debidutt Acharya(10602015) and Arun Kumar Mishra(10602061) Under the guidance of Prof. Susmita Das Department of Electrical Engineering National Institute of Technology Rourkela-769008 2010 WIRELESS FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM A thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Technology in Electrical Engineering by Debidutt Acharya(10602015) and Arun Kumar Mishra(10602061) Department of Electrical Engineering National Institute of TechnologyÃ¢â¬ ¦show more contentÃ¢â¬ ¦Tech. Project aims at introducing biometric capable technology for use in automating the entire attendance system for the students pursuing courses at an educational institute. The goal can be disintegrated into finer sub-targets; fingerprint capture transfer, fingerprint image processing and wireless transfer of data in a server-client system. For each sub-task, various methods from literature are analyzed. From the study of the entire process, an integrated approach is proposed. Biometrics based technologies are supposed to be very efficient personal identifiers as they can keep track of characteristics believed to be unique to each person. Among these technologies, Fingerprint recognition is universally applied. It extracts minutia- based features from scanned images of fingerprints made by the different ridges on the fingertips. The student attendance system is very relevant in an institute like ours since it aims at eliminating all the hassles of roll calling and malpractice and promises a full-proof as well as reliable technique of keeping records of studentÃ¢â¬â¢s attendance. iii CONTENTS CERTIFICATE i ACKNOWLEDGEMENT ii ABSTRACT iii CONTENTS iv LIST OF FIGURES vi 1 INTRODUCTION 1.1 2 Introduction 2 FINGERPRINT 2.1 5Show MoreRelatedAuthor Bart D. Ehrman on Scriptures1196 Words Ã |Ã 5 Pagesdeveloped a particular interest about infallibility and inerrancy of the Christian scripture. In a quest of finding answers for his questions about Scripture he wrote a book Misquoting Jesus: The Story Behind Who Changed the Bible and Why. The main thesis of the book reads Ã¢â¬Å"The book is about ancient manuscripts of the New Testament and the differences found in them, about scribes who copied scripture and sometimes changed it. This may not seem to be very promising as a key to ones own autobiographyRead MoreAnthropology1092 Words Ã |Ã 5 Pages 1. Overall Thesis/Main Point of the article (40-50% of total content) In this section you have to summarize what you think are the key points that the article/chapter is making. The most successful answer should include a clear understanding of the authorÃ¢â¬â¢s argument. To do this, look for the authorÃ¢â¬â¢s thesis statement (usually in the introduction) and then pay attention to how s/he demonstrates or proves this thesis (main point) Ã¢â¬â look for the key points that elaborate on the thesis. We will beRead MoreWith Honors Movie Review1061 Words Ã |Ã 5 Pagescenters on Montgomery Monty Kessler (Brendan Fraser) a government senior student at Harvard University, who thinks his life depends on his thesis. When his computer crashes, Monty decides that the reasonable thing to do is to rush to make copies of the only hard copy of the thesis he has. But on the way to the copy shop, he has an accident and the thesis falls into the boiler room of the library and into the hands of Simon Wilder (Joe Pesci), a homeless man who has made a makeshift h ome in thereRead MoreFree Papers1007 Words Ã |Ã 5 Pagesthe convenience of those students who want to gain access to the free stuff. We also provide writing facilities for money but we keep 100% plagiarism free papers such as plagiarism free term papers, plagiarism free research papers, plagiarism free thesis, essay papers and other plagiarism free written assignments for our customers who are in need of academic papers. We have acquired the expertise and skill of writers from all over the world who write exceptionally well for all topics that are assignedRead MoreFree Papers992 Words Ã |Ã 4 Pagesthe convenience of those students who want to gain access to the free stuff. We also provide writing facilities for money but we keep 100% plagiarism free papers such as plagiarism free term papers, plagiarism free research papers, plagiarism free thesis, essay papers and other plagiarism free written assignments for our customers who are in need of academic papers. We have acquired the expertise and skill of writers from all over the world who write exceptionally well for all topics that are assignedRead MoreModel978 Words Ã |Ã 4 PagesUsing Adobe Acrobat Lesson 2: Create a PDF File Create a PDF File Now that youÃ¢â¬â¢ve seen what an ETD looks like and how to browse the contents, itÃ¢â¬â¢s time to learn how to convert your own thesis or dissertation into a PDF Ã¯ ¬ le. There are several different options for doing this, and all require that you have a copy of AdobeÃ ® AcrobatÃ ® Standard or Professional installed on your computer. Adobe Reader, which is freely available for downloading from many Internet sites, can only be used to read a PDF Ã¯ ¬ leRead MoreThe Human Body Has Trillions Of Cells1520 Words Ã |Ã 7 Pagesof our bodies has a lot of cells. Cells give our body energy and the cells divide to form new cells. When a cell forms the two new cells they are called daughter cells, and the original cell is called the parent cell. When a cell divides it makes a copy of its chromosomes. Chromosomes are strands of DNA. Every human body has 46 Chromosomes in one of each body cell and they are not visible, not even under a microscope. Animals and plants have different number of chromosomes. Humans have 44 chromosomesRead More200336 Business Academic Skills 2011.1 Essay Instructions (50%)900 Words Ã |Ã 4 Pagesinterpretation of the question; b. Includes a thesis statement that presents your position on the topic; and c. Outlines the main points that support your position. 2. A body that: a. Includes a series of logically developed arguments that support your position and b. Ensures that each argument and/or sub-argument is supported by evidence and is elaborated upon. 3. A conclusion that: a. Summarises the main points discussed in the body of the essay; b. Restates the thesis statement; and c. Includes a final commentRead MoreThe Effects of Cellular Phones on the Study Habits of Students838 Words Ã |Ã 4 Pag esTHE EFFECTS OF CELLULAR PHONES ON THE STUDY HABITS OF STUDENTS OF DIVINE LIGHT ACADEMY-LAS PINAS AS PERCEIVED BY THE 4th YEAR STUDENTS BATCH 2010-2011 A Thesis Presented to the High School Faculty of the Divine Light Academy In Partial Fulfilment Of the Requirements for the Subject Research IV by: Fourth Year Prosperity Group 2 Leader: Jolo Sore Members: Kirsty Ducay Trish Quintana Jamille Tavares Priscilla Chacon Mark Leus CS delRead MoreLearning And Using Knowledge Of The Writing Essay826 Words Ã |Ã 4 Pagesof our essay. While writing the drafts and the final copy of the essay we focused on the audience of the paper. The paper was intended to tell a story, but it was also meant to entertain the reader. With this in mind, I focused on adding details to my essay that would draw in the reader and create an emotional response. The second essay written was an argumentative essay. Its purpose was to present an argument and persuade the reader the thesis the writer created was correct. Rhetorical knowledge
Sunday, December 8, 2019
Questions: 1. Analyze of at least five identification, authentication, and access control methods organizations use to resist possible attacks? 2. Evaluate these methods and discuss how they can make an organization vulnerable to possible attacks? 3. Discuss ways to improve each of these methods to help ensure the organization is safe against possible attacks? Answers: Introduction Cyber terrorism is an act of terrorism through internet and it is also an activity done by the terrorists. The term Cyber terrorism is a contentious term and according to some authors known terrorists organizations attacks and create panic among the common public as it is their main aim to create error among the public. The terrorism created through the internet is not easily tracked so it becomes more difficult to keep people tension free as there is no accurate news that who released the news of the attacks. According to (Girard, 2013), Cyber terrorism was well known as cyber crime but Cyber terrorism should be the exact term as with the help of internet the terrorist spreads the news of attacks it becomes very difficult for the organizations to trace that from where and who spread the news and as the person is not traced then people panics that there will be attack and becomes difficult for the police to keep control among the crowd which goes out of control after getting the news (Kumar, Mittal, 2012). Identifying the methods that the organization uses to resist for possible cyber attacks- Asset Identification Before securing the networks it is mandatory to identify each and every component that is used for making the components. An asset inventory needs to be created which will be including all the devices and end-points of networks and also the servers and the hosts of networks. Vulnerability Assessment After identifying the networks the vulnerability can be accessed. The vulnerability also has the weakness in configuration, security policy or technology. The vulnerability that is discovered can be threats and it can take the advantages of these vulnerabilities. Threat identification-The threats takes the advantages of the vulnerability and creates a disadvantage for the networks. The potential threats of the network need to identify fast so the risk can be minimized (Czosseck, Ottis, Talihrm, 2013). Firewalls- Before receiving or sending any data or mails the data will be filtered so that no virus does with the data to anyone. Firewalls help in filtering so that while receiving or sending any data no virus or malware will go or we will receive with those data. Usage of antivirus- With the usage of antivirus helps in tracking the antivirus and removes them from the systems so that the system does not gets affected and also secure the system from unnecessary threats. These methods helps the organization in identifying the possible attacks and then authenticate and access the controls so that the possible attacks can be stopped from destroying the system and also resists from spreading the virus or the terrorism all over. After identifying the attacks the organization takes necessary steps so that they can save the organizations and also the systems from the possible attacks which has been coming towards them (Collins, McCombie, 2012). Evaluating this methods that ensures in making the organizations vulnerable to possible attacks With the security designs some types of trade offs are occurring among the security measures and user productivity. The main goals of the security designs are that they provide security to maximum level and the security which they are providing useful impact on the productivity and also on the user access. Along with all this the unnecessary data or after the verification and authorization the organizations can prevent all the unwanted things which can damage the systems so that they can keep the system from unnecessary threats so that the organizations can enhance good productivity of all ethical data without any disturbance of threats (Jewkes, Yar, Eds 2013). Productivity tools are used in the networks so that they can design it according to the need to particular business (Jarvis, Nouri, Whiting, 2015). The security policy they can implement in those networks in such a way so that those security walls safeguards the security of the systems of the organizations. When the security walls will be made some points need to be ensured that the security policy should not know about the operating policy of the organization as if by any means the security policy gets cracked or traced by the hackers or the terrorists groups then all the details of the organizations will go in their hand and then they can use those details against the organizations and also against the government of the country which is not at all acceptable by anyone (Altheide, 2014). So, when the security policies will be made then some things need to be kept in mind and the security models need to be made accordingly. So, the organizations need to update their policies systemat ically so that no one gets to knows about the operation system of the organization otherwise it will be very risky for the organization and then again they will be under the scrutiny of threats (Holt, 2012). The design of the security models varies from each other. While making security model three general steps are restrictive, open and closed. So, the important points are while making the security models are- In the starting point the security models can be closed or open While making the security models the best ends need to be mix with the technology and productivity of the security then they can implement those technologies in the models. The locker of the security model should also include the Secure Sockets Layer (SSL) technology. In the open access the security model can be easily implemented and then security measures are implemented in the designs. But the firewalls, intrusion detection system cannot be easily implemented in the open end security system (Day, 2014). But in the close security system the security models takes a little time while they are implemented in the systems of the organizations but the firewalls, antivirus are easily implemented in the close system (Mugabi, Bishop, 2014). As in the close system no one can easily access so there is less chance of attacking the systems with the threats. Along with that if there is any threat enters into the system then with the help of antivirus those threats can be blocked which will be a great help for the organization as they will be able to protect from threats (Halder, Jaishankar, Jaishankar, 2012). Along with all this there is a type of system called Resistance Assess which helps the organization and also the system models in resisting the access of the system when there is threat in the system. These systems make the people aware by giving certain types of messages that there are threats in the system and while using the system they should run the firewall and the antivirus which will kill the virus so that the system does not gets affected further. Along with that if the firewalls or the antivirus are not updated then they gives the message to update those software so that they are able to resist the threats (Dawson, Omar, 2015). Improving the methods to ensure the safety of the organization against attacks When the organizations are implementing security models in their organization they have to ensure the safety so that the threat does not damage the systems and along with that does not hack the operating the systems of the organization or else it will be a problem for the organization as all the details will be out to the hackers and they can use those details against them (Dawson, 2015). So, after making the security models they need to be updated after every certain time of interval so that the systems can be able to resist the virus and the malwares which have the capabilities of resisting the threats which are coming in their way to damage the systems (Gilmour, 2014). So, the organizations have to keep all the system updated so that they have the capability of resisting all the threats and this will help them in protecting them from all the attacks which will be coming in their way. Along with all this the organizations also need to use those firewalls which will be able to prote ct the systems from attacks and the employees of the organizations also have to be aware before clicking any links that whether there is any kind of threats or attacks in those links (Taylor, Fritsch, Liederbach, 2014). Conclusion In a nutshell it can be said that now days cyber terrorism is one of the most dangerous threats which has the capability of destroying a lot of things in a system and along with that it creates panic among public then it becomes difficult for the cyber crime police all this. So, it is necessary for all the organizations to take certain measures which will save them and their systems from the different types of threats and attacks which are coming in their way and along with that security models that are using in the in the systems for protecting them need to be updated from time to time so that they are capable to resisting the attacks. References Taylor, R. W., Fritsch, E. J., Liederbach, J. (2014).Digital crime and digital terrorism. Prentice Hall Press Dawson, M. (2015). A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism. Dawson, M., Omar, M. (2015). New Threats and Countermeasures in Digital Crime and Cyber Terrorism Day, P. (2014).Cyber Attack: The Truth about Digital Crime, Cyber Warfare and Government Snooping. Carlton Books, Ltd Halder, D., Jaishankar, K., Jaishankar, K. (2012).Cyber crime and the victimization of women: laws, rights and regulations. Information Science Reference. Jewkes, Y., Yar, M. (Eds.). (2013).Handbook of Internet crime. Routledge. Girard, J. E. (2013).Criminalistics: Forensic science, crime, and terrorism. Jones Bartlett Publishers Mugabi, I., Bishop, J. (2014). The Need for a Dualist Application of Public and Private Law in Great Britain Following the Use of Flame TrollingDuring the 2011 UK Riots: A Review and Model.Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism. Hershey, PA: IGI Global. Holt, T. J. (2012). Exploring the intersections of technology, crime, and terror.Terrorism and Political Violence,24(2), 337-354. Collins, S., McCombie, S. (2012). Stuxnet: the emergence of a new cyber weapon and its implications.Journal of Policing, Intelligence and Counter Terrorism,7(1), 80-91. Kumar, P., Mittal, S. (2012). The perpetration and prevention of cyber crime: an analysis of cyber terrorism in India.International Journal of Technoethics (IJT),3(1), 43-52. Jarvis, L., Nouri, L., Whiting, A. (2015). 11 Terrorism, violence and conflict in the digital age.Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis and Opposition, 203. Czosseck, C., Ottis, R., Talihrm, A. M. (2013). Estonia after the 2007 cyber attacks: Legal, strategic and organisational changes in cyber security.Case Studies in Information Warfare and Security: For Researchers, Teachers and Students, 72. Gilmour, S. (2014). Policing crime and terrorism in cyberspace: An overview.European Review of Organised Crime,1(1), 143-159. Altheide, D. L. (2014). The Triumph of Fear: Connecting the Dots about Whistleblowers and Surveillance.International Journal of Cyber Warfare and Terrorism (IJCWT),4(1), 1-7.
Sunday, December 1, 2019
Unit Activity Unit: Systems of Equations This activity will help you meet these educational goals: Mathematical Practices-You will make sense of problems and solve them, reason abstractly and quantitatively, use mathematics to model real-world situations, and look for and express regularity in repeated reasoning. Introduction In this unit, you used different methods to create and solve linear equations. You modeled scenarios using linear inequalities and solved them with the help of graphs. You studied patterns and sequences and were introduced to function notation, range and domain of functions, and different ways of representing a function. In this activity, you will analyze real-world situations by modeling them as linear equations or inequalities. __________________________________________________________________________ Directions and Analysis Task 1: Self-Publishing You've written your first novel and, like many first-time authors, can't find a publisher. So you've decided to self-publish your book. You need to work out the cost of printing the book. a. If the cost of printing the novel includes a base cost of $1,550 plus $4 per book, write a function that represents the cost of printing x copies of the book. Type your response here: b. If you want to cover the printing costs by printing and selling only 50 copies of the book, at what price must you sell the book? Type your response here: c. Based on the book price per copy you calculated in the previous task, write a function to represent your income if you sell x copies. Type your response here: d. After spending $200 on market research, you discover that you can sell many more copies of your book if you price it at $20. Write new functions for both your expenses and your income from selling x copies. Type your response here: e. Use the Edmentum Graphing Tool to graph the two functions you wrote in part d. Examine the graph, and estimate the minimum number of copies of your book you must print and sell to avoid losing money. Capture a screenshot of your graph, and include it with your answer. Type your response here: f. Solve the system of equations you derived in part d to find the exact number of copies (rounded up to the nearest whole number) you need to sell to avoid losing money. Type your response here: Task 2: School Fundraising Your school is planning a fundraising dinner. The expense for this event must not exceed $2,475.00. The team organizing the event has calculated that the cost per adult guest will be $18.00 and the cost per child guest will be $9.00. The venue can hold no more than 150 guests. a. Write a system of inequalities that represents this situation. Type your response here: b. Use the Edmentum Graphing Tool to graph the system of inequalities you created in part a. Highlight the region under each inequality using a different color. Then highlight the region common to both inequalities using a pattern such as horizontal, vertical, or diagonal lines. Capture a screenshot of your graph, and paste it in the space provided. Paste your graph here: c. Using the graph, determine the maximum number of adults (rounded up to the nearest whole) who could can attend the dinner and fill the venue to capacity. Type your response here: d. If the event were held in a venue that can accommodate 200 guests, what is the maximum number of adults who could attend if the event fills the venue to capacity? Include a screenshot of your revised graph with your answer. Type your response here: e. If you want to find a venue with a capacity that guarantees you cannot go over budget, what is the maximum number of people the venue will hold? Type your response here: f. The school aims to raise a minimum of $5,250 after paying for all the expenses. If the school collects $50 per guest and chooses a venue that can seat not more than 150 guests, what is the minimum number of children that must attend the event? Include a screenshot of your graph with your response. Type your response here: Task 3: Ancestry of a Male Honeybee Honeybee reproduction is an interesting phenomenon. When a queen bee lays an egg, the egg does not need to be fertilized by a male honeybee to hatch. The egg will develop into a male or a female honeybee depending on whether the egg is fertilized by a male honeybee. The outcome is determined