Use Time New Roman font 12 for all answers .
No matching ratio .
Word
The question is
Choose one of the following cases, then analyze the cases in the Questions and Problems.
Case A: Chapter 15 (8 and 9) and Chapter 16 (7) in Dynamic Business Law
Case B: Chapter 15 (6 and 7) and Chapter 16 (9) in Dynamic Business Law
For each assigned case, write an analysis of the issue based on the following criteria:
Identify the parties involved in the case dispute (who is the plaintiff and who is the defendant).
Identify the facts associated with the case and fact patterns.
Develop the appropriate legal issue(s) in question (i.e., the specific legal issue between the two parties). Provide a judgment on who should win the case – be clear.
Support your decision with an appropriate rule of law.
Be prepared to defend your decision and to objectively evaluate the other points of view.
Tag: Law
Abhinav Abstract
Submit your Abstract for the topic selected for final project, the topic is controlling the crime scene Include a short paragraph describing your project and how you intend to write the abstract for the same.
NOTE: i need you write a paragraph for around 200 words excluding references, in text citations, in APA format
Abhinav week 12
Explain how cookies can show that a user has visited a site if that user’s history has been deleted.
Optional: install Windows Historian and see the sites visited by a particular user.
Use your own words.
NOTE: i need 400 words for the above discussion, in text citations, in APA format
3 Discussion Posts and 2 replies to another student
Note: Please bid only if you are an expert in Criminal Law and can complete all 3 Discussion Posts below with Full Credit
Discussion Post 1
Police armed with a search warrant entered Selma Tikes’ boyfriend’s apartment and found her sleeping in a bedroom with her two children.Tikes’ boyfriend was not present.In a second bedroom, police found marijuana in matchboxes stacked on a nightstand. In the closet were both men’s and women’s clothes and more matchboxes with marijuana.Is Tikes criminally liable for the presence of the marijuana in the apartment?Discuss the relevant legal theories.
To get the full points you will need to:
Submit one clear, extensive and well-referenced independent post
Submit at least one informative post in reply to another student’s post. (which I will give shortly)
Discussion Post 2
Parks was convicted of the felony of escape from custody.After finishing work outside the prison picking potatoes, a group of prisoners were loaded into a truck to return to prison.One of the prisoners fell out.Parks jumped out to see if the other prisoner was injured.The officer in charge did not realize Parks was gone.Parks and the other prisoner waited alongside the road for the authorities to pick them up.Parks stated that he never had any intent to escape or to avoid recapture.Should Parks’ conviction be upheld?
To get the full points you will need to:
Submit one clear, extensive and well-referenced independent post
Submit at least one informative post in reply to another student’s post. (which I will give shortly)
Discussion Post 3
Cordell asked his friend Rengle if he could still do his “fast draw” trick.The trick was that a person, while sitting or standing, would hold his hands extended forward several inches apart; Rengle, with a pistol in a holster strapped to his body, would attempt to draw his pistol and place it between the hands of the other person before that person could clap his hands together.Rengle said yes, and tried it with a .22 caliber pistol.The pistol discharged, a bullet struck Cordell in the front of his head and killed him almost instantly.Rengle forgot he had loaded the pistol.Is Rengle criminally liable for Cordell’s death?Decide.
To get the full points you will need to:
Submit one clear, extensive and well-referenced independent post
LAW402 Week 6 Discussion
Read “Six Ways to Recover a Domain Name from an Infringing Cybersquatter.”
https://www.domainsherpa.com/6-ways-to-recover-a-domain-name-from-an-infringing-cybersquatter/
In a Word document, respond to the following items:
Explain some of the ways to avoid a domain name conflict that are discussed in the article. (5-7 sentences)
Summarize some of the options the available to a mark owner for combating infringing domain names. (5-7 sentences)
Determine which course of action you would take if someone infringed upon your domain name.
Justify your choice with a brief (5-7 sentence) rationale.
Question about LEGAL ENVIRONMENT AND BUSINESS LAW
(1) Read the two linked articles found in Learning Materials regarding the Canadian “Freedom Convoy” and Canada’s response to it. One deals with the decision to deny bail to one of the protest organizers. The second deals with the Canadian government’s decision to freeze the personal assets of those suspected to have participated in the protest. Be sure to fully understand the reasons given by the Canadian authorities to do what they did.
(2) Based upon what you now understand to be our constitutional rights under the 1st, 4th and/or 5th Amendments to our Constitution, in your now informed opinion:
(a) Would the U.S. Constitution allow for the denial of bail for the protest organizer? Yes? No? Why?
(b) Would the U.S. Constitution allow for the freezing of personal assets for protestors in this country? Yes? No? Why?
Your goal is to think seriously about the rights recognized by the Bill of Rights of the U.S. Constitution and from where these rights were deemed to emanate by the drafters of our Constitution. Then, decide whether the actions taken by the Canadian government would be permitted to the government under the U.S. Constitution. Namely, would these decisions (taken separately) be ruled constitutional or unconstitutional?
Think about these serious questions. Then post your thoughtful opinion. Be sure to take the time to explain your position. Be specific. Everyone has an opinion, but not everyone can explain why they believe what they believe. Make it your goal to organize your thoughts, and be sure to consider the alternative arguments to your position when expressing it. In other words, I am most interested in the why part of your answer.
If you do not have the Hardware or Software, then research the commands using the web. Hardware/Software Setup Required Router
If you do not have the Hardware or Software, then research the commands using the web.
Hardware/Software Setup Required
Router or CISCO Packet Tracer 7.1.0 (available at this website)
Note: The lab requires a CISCO router or access to the Internet.
Problem Description
When investigating an attack to a router, you need to gather volatile evidence using either direct or indirect access. Direct access is carried out using show commands. Indirect access can be carried out only if the attacker has changed the passwords. This is done by port-scanning every router’s IP information.
In this lab, you will practice acquiring volatile information from a router using various show commands.
Problem Description
When investigating an attack to a router, you need to gather volatile evidence using either direct or indirect access. Direct access is carried out using show commands. Indirect access can be carried out only if the attacker has changed the passwords. It can be carried out by port-scanning every router IP.
In this lab, you will practice acquiring volatile information from a router using various show commands.
Estimated completion time: 60 minutes.
Outcome
Report the steps for performing the task above.
Validation/Evaluation
How to use various show commands to display the following information:
o Clock details
o Router’s version
o Running configuration
o Startup configuration
o Routing table
o ARP table
o List of users
o List of interfaces
o Routing protocols
preparing a will
Prepare a “draft” Will, Trust or Power of Attorney for yourself or a fictitious person. This is called a Draft because it will not be executed and is intended for you to put into practice what you have learned.
Follow the legal requirements in your state (Virginia) for the making of a Will, Trust or Power of Attorney and that you are fairly detailed.
Action Items Include your discussion question in the form below, as well as the answer to the question and
Action Items
Include your discussion question in the form below, as well as the answer to the question and the answer source.
What advice would you provide to the promoter of a corporation when s/he is actively doing his/her job as promoter to prevent any personal liability?
Discussion 8/ COR205
There are many theories presented in your final chapter of reading that attempt to explain crime and delinquency. Most theories focus efforts on explaining adult criminality. Many of those theoretical explanations can extend to adolescent delinquency as well. However, Miller (1958) created his Neutralization Theory to focus specifically on explaining juvenile delinquency. Explain Miller’s explanation of how and why juvenile delinquency occurs. Detail all possible neutralizations that can be utilized by a juvenile who engaged in crime. Finally, conduct research on your own in the media and find an example of juvenile delinquency where the juvenile’s defense was a neutralization. Provide details of the crime and how the neutralization was utilized to explain the crime away.
Be sure to address all questions presented in the main prompt. Your response to the main question should be no less than 200-250 words double spaced, written using an introduction, body, conclusion, proper spelling, English, grammar, and you should reference and cite the text where you present factual information.