Home » 1. Write down ideas that spring to mind when you think of a “traditional family.”2. Respond to the following questions

1. Write down ideas that spring to mind when you think of a “traditional family.”2. Respond to the following questions

1. Write down ideas that spring to mind when you think of a “traditional family.”2. Respond to the following questions based on the textbook chapter on the Family:a. Are the rules of descent in the US patrilineal, matrilineal, or bilateralb. In your family (either your parents or your own marriage), are the rules of marriage exogamous or endogamous?c. If you are married, who holds authority in your family the husband, the wife or is it egalitarian?If you are not married, who holds authority in your family, the father, mother or is it egalitarian?d. If you are married, does your family live near the husband’s family, the wife’s family, or neither?If you are not married, did your family live near your father’s family, the mother’s family or neither?

import java.util.*; import java.util.Map.Entry; public class setAndMaps { public static String intersection(List list1, List list2) { String output =
Question import java.util.*; import java.util.Map.Entry; public class setAndMaps { public static String intersection(List list1, List list2) { String output = “”; Set set = new HashSet(); for (String s1 : list1) { set.add(s1); } for (String s2 : list2) { if (set.contains(s2)) { output = s2 “n”; System.out.println(s2); } } return output; } public static String frequent(List list, int k) { Map map = new TreeMap(); for (String s : list) { if (map.containsKey(s)) { map.put(s, map.get(s) 1); } else map.put(s, 1); } String output = “”; for (Map.Entry entry : map.entrySet()) { String key = entry.getKey(); Integer value = entry.getValue(); if (value >= k) { System.out.println(key “(” value “)”); output = key “(” value “)n”; } } return output; } }import java.io.FileNotFoundException;import java.io.FileReader;import java.util.ArrayList;import java.util.Collections;import java.util.Scanner;class Main { // Returns a List of all movies in the specified file (assume there is one movie per line). public static ArrayList getList(String filename) { ArrayList list = new ArrayList(); try (Scanner in = new Scanner(new FileReader(filename))) { while (in.hasNextLine()) { String line = in.nextLine(); list.add(line); } } catch (FileNotFoundException e) { e.printStackTrace(); } return list; } public static void main(String[] args) { ArrayList list1 = getList(“imdb.txt”); ArrayList list2 = getList(“sight_and_sound.txt”); ArrayList list3 = getList(“3_lists.txt”); //Sort lists Collections.sort(list1); Collections.sort(list2); Collections.sort(list3); System.out.println(“***nintersectionn***”); System.out.println(setAndMaps.intersection(list1, list2)); System.out.println(“***nfrequentn***”); System.out.println(setAndMaps.frequent(list3, 3)); System.out.println(“***ngroupByNumCharsn***”); System.out.println(setAndMaps.groupByNumChars(list2)); }}// doesnt pass main output test passes all the functions testsimport java.util.*;import java.util.Map.Entry;public class setAndMaps { // Prints all movies that occur in both lists. public static String intersection(List list1, List list2) { Set set = new HashSet(); for(String s1 : list1){ set.add(s1); } for(String s2 : list2){ if(set.contains(s2)){ System.out.println(s2); } } return “”; } // Prints all movies in the list that occur at least k times // (print the movie followed by the number of occurrences in parentheses). public static String frequent(List list, int k) { Map map = new TreeMap(); for(String s : list){ if(map.containsKey(s)){ map.put(s, map.get(s) 1); } else map.put(s,1); } for(Map.Entry entry : map.entrySet()) { String key = entry.getKey(); Integer value = entry.getValue(); if(value >=k) { System.out.println(key “(” value “)”); } } return “”; } // return “”; // } public static String groupByNumChars(List list) { Map map = new TreeMap(); for(String s : list){ int n =s.length(); if(map.get(n) !=null){ map.get(n).add(s); } else{ map.put(n, new ArrayList()); ArrayList temp = map.get(n); temp.add(s); map.put(n,temp); } } for(Entry entry : map.entrySet()){ Integer key = entry.getKey(); List value =entry.getValue(); System.out.println(value); } System.out.println(“n”); return “”; } }// this version doesnt pass all the function tests but passes the main output test

The following grammar is not LL(1), not LR(0) and not SLR(1). Check
Question The following grammar is not LL(1), not LR(0) and not SLR(1). Check if it is CLR(1) and LALR(1). Also generate the LR(1) parsing table for the following grammar. S → A a | b A c | B c | b B a A → d B → d

1. How would you personally define ethics?2. How does business ethics differ from your personal ethics?3. What is the biggest
1. How would you personally define ethics?2. How does business ethics differ from your personal ethics?3. What is the biggest influence on your personal ethics? Why?4. Do you try to always be ethical? Why or why not?5. Do you think you have a high personal standard?6. Do you know an adult that has lied, cheated, or stolen anything? How might an adult justify this type of behavior?

Under the Course Content for this Session, Click on the Role of the
Political Science Assignment Writing ServiceQuestion Get Answer Under the Course Content for this Session, Click on the Role of the Social Media. Read the Article about Democracy and Social media. Then, write short essay telling me whether or not you agree with the author. Make sure you state your reasons clearly. A few months after the “Euromaidan” protests brought down Mr Yanukovych, a less widely noticed story provided a more disturbing insight into the potential political uses of social media. In August 2014 Eron Gjoni, a computer scientist in America, published a long, rambling blog post about his relationship with Zoe Quinn, a computer-game developer, appearing to imply she had slept with a journalist to get favourable coverage of her new game, “Depression Quest”. The post was the epicentre of “Gamergate”, a misogynistic campaign in which mostly white men keen to bolster each other’s egos let rip against feminists and all the other “social justice warriors” they despised in the world of gaming and beyond. According to some estimates, more than 2m messages with the hashtag #gamergate were sent in September and October 2014.The campaign used the entire spectrum of social-media tools. Videos, articles and documents leaked to embarrass enemies—a practice known as doxing—were posted to YouTube and blogs. Twitter and Facebook circulated memes. Most people not directly involved were able to ignore it; crucially, the mainstream media, when they noticed it, misinterpreted it. They took Gamergate to be a serious debate, in which both sides deserved to be heard, rather than a right-wing bullying campaign.Looking at the role that social media have played in politics in the past couple of years, it is the fake-news squalor of Gamergate, not the activist idealism of the Euromaidan, which seems to have set the tone. In Germany the far-right Alternative for Germany party won 12.6% of parliamentary seats in part because of fears and falsehoods spread on social media, such as the idea that Syrian refugees get better benefits than native Germans. In Kenya weaponised online rumours and fake news have further eroded trust in the country’s political system.This is freaking some people out. In 2010 Wael Ghonim, an entrepreneur and fellow at Harvard University, was one of the administrators of a Facebook page called “We are all Khaled Saeed”, which helped spark the Egyptian uprising centred on Tahrir Square. “We wanted democracy,” he says today, “but got mobocracy.” Fake news spread on social media is one of the “biggest political problems facing leaders around the world”, says Jim Messina, a political strategist who has advised several presidents and prime ministers.Governments simply do not know how to deal with this—except, that is, for those that embrace it. In the Philippines President Rodrigo Duterte relies on a “keyboard army” to disseminate false narratives. His counterpart in South Africa, Jacob Zuma, also benefits from the protection of trolls. And then there is Russia, which has both a long history of disinformation campaigns and a domestic political culture largely untroubled by concerns of truth. It has taken to the dark side of social media like a rat to a drainpipe, not just for internal use, but for export, too.Vladimir Putin’s regime has used social media as part of surreptitious campaigns in its neighbours, including Ukraine, in France and Germany, in America and elsewhere. At outfits like the Internet Research Agency professional trolls work 12-hour shifts. Russian hackers set up bots by the thousand to keep Twitter well fed with on-message tweets (they have recently started to tweet assiduously in support of Catalan independence). Sputnik and RT, the government-controlled news agency and broadcaster, respectively, provide stories for the apparatus to spread. During the French election this year an article by Sputnik prominently featured the results of an unrepresentative social-media study by Brand Analytics, a research firm based in Moscow, putting conservative candidate François Fillon at the head of the field.These stories and incendiary posts bounce between social networks, including Facebook, its subsidiary Instagram, and Twitter. They often perform better than content from real people and media companies. Bots generated one out of every five political messages posted on Twitter in America’s presidential campaign last year. The RAND Corporation, a think-tank, calls this integrated, purposeful system a “firehose of falsehood”.On November 1st representatives of Facebook, Google and Twitter fielded hostile questions on Capitol Hill about the role they played in helping that firehose drench American voters. The hearings were triggered by reports that during the 2016 campaign Russian-controlled entities bought ads and posted content about divisive political issues that spread virally, in an attempt to sow discord. Facebook has estimated that Russian content on its network, including posts and paid ads, reached 126m Americans, around 40% of the nation’s population.Given the concentration of power in the market—Facebook and Google account for about 40% of America’s digital content consumption, according to Brian Wieser of Pivotal Research, a data provider—such questions are well worth worrying about. But the concerns about social media run deeper than the actions of specific firms or particular governments.Social media are a mechanism for capturing, manipulating and consuming attention unlike any other. That in itself means that power over those media—be it the power of ownership, of regulation or of clever hacking—is of immense political importance. Regardless of specific agendas, though, it seems to many that the more information people consume through these media, the harder it will become to create a shared, open space for political discussion—or even to imagine that such a place might exist.Years ago Jürgen Habermas, a noted German philosopher, suggested that while the connectivity of social media might destabilise authoritarian countries, it would also erode the public sphere in democracies. James Williams, a doctoral student at Oxford University and a former Google employee, now claims that “digital technologies increasingly inhibit our ability to pursue any politics worth having.” To save democracy, he argues, “we need to reform our attention economy.”The idea of the attention economy is not new. “What information consumes is rather obvious: it consumes the attention of its recipients,” Herbert Simon, a noted economist, wrote in 1971. A “wealth of information,” he added, “creates a poverty of attention.” In “The Attention Merchants”, published in 2016, Tim Wu of Columbia University explains how 20th-century media companies hoovered up ever more of this scarce resource for sale to advertisers, and how Google and its ilk have continued the process.What are you paying with?Social media have revolutionised this attention economy in two ways. The first is quantitative. New services and devices have penetrated every nook and cranny of life, sucking up more and more time (see chart 1). The second is qualitative. The new opportunity to share things with the world has made people much more active solicitors of attention, and this has fundamentally shifted the economy’s dynamics.Interface designers, app-makers and social-media firms employ armies of designers to keep people coming back, according to Tristan Harris, another ex-Googler and co-founder of an advocacy group called “Time Well Spent”. Notifications signalling new followers or new e-mails beg to be tapped on. The now ubiquitous “pull-to-refresh” feature, which lets users check for new content, has turned smartphones into slot machines.Adult Americans who use Facebook, Instagram and WhatsApp spend around 20 hours a month on the three services. Overall, Americans touch their smartphones on average more than 2,600 times a day (the heaviest users easily double that). The population of America farts about 3m times a minute. It likes things on Facebook about 4m times a minute.The average piece of content is looked at for only a few seconds. But it is the overall paying of attention, not the specific information, that matters. The more people use their addictive-by-design social media, the more attention social-media companies can sell to advertisers—and the more data about the users’ behaviour they can collect for themselves. It is an increasingly lucrative business to be in. On November 1st Facebook posted record quarterly profits, up nearly 80% on the same quarter last year. Combined, Facebook and Alphabet, Google’s parent company, control half the world’s digital advertising.In general, the nature or meaning of the information being delivered does not matter all that much, as long as some attention is being paid. But there is one quality on which the system depends: that information gets shared.People do not share content solely because it is informative. They share information because they want attention for themselves, and for what the things they share say about them. They want to be heard and seen, and respected. They want posts to be liked, tweets to be retweeted. Some types of information spread more easily this way than others; they pass through social-media networks like viruses—a normally pathological trait which the social-media business is set up to reward.Because of the data they collect, social-media companies have a good idea of what sort of things go viral, and how to tweak a message until it does. They are willing to share such insights with clients—including with political campaigns versed in the necessary skills, or willing to buy them. The Leave campaign in Britain’s 2016 Brexit referendum was among the pioneers. It served about 1bn targeted digital advertisements, mostly on Facebook, experimenting with different versions and dropping ineffective ones. The Trump campaign in 2016 did much the same, but on a much larger scale: on an average day it fed Facebook between 50,000 and 60,000 different versions of its advertisements, according to Brad Parscale, its digital director. Some were aimed at just a few dozen voters in a particular district.Perhaps the most subversive techniques, though, are those developed in somewhat obsessive and technically astute coteries of amateurs whose main motivation is fun and recognition, sometimes—but not necessarily—spiked with malice. The internet has always benefited from the attention of such people. In an article entitled “Hacking the Attention Economy” danah boyd (she spells her name in lower case letters), the president of Data

Read the Central Case Study – Mining for …Cell Phone? in Chapter 11 of your course textbook. Explore the implications
Read the Central Case Study – Mining for …Cell Phone? in Chapter 11 of your course textbook. Explore the implications of the excessive demands for resources from Western nations. Share other newsworthy cases of conflict minerals and how these are extracted from the earth in order to create the products that are purchased by citizens from affluent nations. In your research, explain why the mineral in question is deemed a “conflict mineral” and address the issues that are created socially, economically and environmentally when these raw minerals are extracted. Share some possible solutions to alleviate the damage done to the environment and the people who are directly impacted by the extraction of conflict minerals.

Create a HTML file named mathHelp.html. The page is used by a math
Question Create a HTML file named mathHelp.html. The page is used by a math teachers who are teaching students who are learning about squaring and cubing numbers. The file should meet these requirements: • Use the site.css file to hold the CSS for the page. • The page should have a paragraph of instructions. • Below the instructions should be a form. The form should have two INPUT fields that allow the user to enter a start integer and an end integer. • Below the form should be an output area for messages. • When the user presses the build button. If the start number is missing or not a valid integer, output an error message. If the end number is missing or not a valid integer, output an error message o If the end number is less than or equal to the start number, output an error message o When the end number is greater than the start number use JavaScript to build a TABLE element The table should have borders like the example, and the header row should have different colors than the data rows. § The table should have 3 columns § The headers are • X • X squared • X cubed Output rows for every integer from start up to an ending end. In each row, there will be three cells • In the first color put, x • In the second column, put x*x • In the third column, put x*x*x

What is a reaction paper? In a nutshell, it is both a summary discussion of the big picture and main
What is a reaction paper? In a nutshell, it is both a summary discussion of the big picture and main ideas of the reading as well as your thoughts and reactions to these ideas.This assignment involves the following:Select one reading out of the five readings in Week 1 (Ritzer Ch1; Ritzer Ch2; Chua Ch1; Watson Ch2; or Ram)Identify and summarize the big picture and key ideas of the reading, along with the supporting details and examplesProvide your thoughts and reactions to the big picture and key ideas presented by the authorThe reaction paper should be:Two and one half to three pages long, double-spaced, have 1″ margins, and use Times New Roman or comparable fontThe summary part should be about one and half to two pages long, while the reaction part should be about a pageMake sure to cover both the first as well as the second half of the readingParaphrase or write in your own words rather than using direct quotes (only one direct quote if needed)Strategies for identifying and summarizing the main ideas and supporting details and reacting to these ideas:Usually any reading will be divided into several sections with the headings demarcating key themes. These headings will help you to identify the main ideas. Supporting details discussing and illustrating these ideas will be presented in these sections. The goal is to discuss the most important ideas and supporting details within the 1.5-2 page limit. Then spend about a page providing your thoughts and reactions to these ideas. A good strategy is to write more than the set page limit and then eliminate the points and supporting details that are not needed.Once you have summarized the main ideas and provided the supporting details and examples, you are ready to provide your thoughts and reactions to these ideas. Here are some questions to think about as you reflect on what you have read: What are your thoughts about the arguments the author is making? Do you agree or disagree? Why?Are there any weaknesses in the author’s argumentation?What about the evidence the author presents to make his/her case? Any issues with the evidence?Can you relate at all to some of the main ideas presented by the author?Have you learned anything new by reading this chapter/article? How helpful or informative was it?Any other positive remarks or criticisms you can think of about the reading?This is an 8-point rubric:CriteriaNovice Competent Proficient Provides a good summary of the reading, covering both the first and second half with examples 0 to 1 pointsLittle to no summary of the reading and no examples provided1.1 to 2 pointsFairly good summary of the reading, covering both the first and second half with examples2.1 to 3 pointsStrong and elaborate summary of the reading, covering both the first and second half with examplesProvides thoughtful reactions to the main ideas or points of the reading 0 to 1 pointsLittle to no reactions to the main ideas or points of the reading1.1 to 2 pointsFairly good reactions to the main ideas or points of the reading2.1 to 3 pointsStrong and thoughtful reactions to the main ideas and points of the readingGood use of grammar, spelling, and punctuation 0 to 0.6 pointsMany grammatical, spelling, or punctuation errors0.7 to 1.3 pointsA few to several grammatical, spelling, or punctuation errors1.4 to 2 pointsLittle to no grammatical, spelling or punctuation errors

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more