chơi xổ số keno trực tuyến

{"appState":{"pageLoadApiCallsStatus":true},"categoryState":{"relatedCategories":{"headers":{"timestamp":"2025-03-18T08:01:07+00:00"},"categoryId":33662,"data":{"title":"Academics & The Arts","slug":"academics-the-arts","image":{"src":"//coursofppt.com/wp-content/uploads/academics-and-arts-category.jpg","width":643,"height":1286},"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662}],"parentCategory":{"categoryId":0,"title":null,"slug":null,"_links":null},"childCategories":[{"categoryId":33663,"title":"Art & Architecture","slug":"art-architecture","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33663"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":162,"bookCount":9},{"categoryId":33670,"title":"History","slug":"history","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33670"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":375,"bookCount":32},{"categoryId":33686,"title":"Humanities","slug":"humanities","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33686"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":20,"bookCount":2},{"categoryId":33687,"title":"Language & Language Arts","slug":"language-language-arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33687"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":1157,"bookCount":90},{"categoryId":33712,"title":"Law","slug":"law","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33712"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":50,"bookCount":8},{"categoryId":33720,"title":"Math","slug":"math","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33720"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":1583,"bookCount":49},{"categoryId":33730,"title":"Music","slug":"music","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33730"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":1654,"bookCount":37},{"categoryId":33747,"title":"Performing Arts","slug":"performing-arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33747"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":102,"bookCount":9},{"categoryId":33751,"title":"Political Science","slug":"political-science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33751"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":97,"bookCount":9},{"categoryId":33756,"title":"Science","slug":"science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33756"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":1485,"bookCount":58},{"categoryId":33772,"title":"Study Skills & Test Prep","slug":"study-skills-test-prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":1727,"bookCount":63},{"categoryId":33800,"title":"Teaching","slug":"teaching","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33800"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":167,"bookCount":9}],"description":"Maybe you need help passing calculus ― or the real estate exam. You're looking to move up at work or school. Or maybe you're done with school, but you want to learn Spanish or acting or songwriting. It's all here. Dive in!","relatedArticles":{"self":"//dummies-api.coursofppt.com/v2/articles?category=33662&offset=0&size=5"},"hasArticle":true,"hasBook":true,"articleCount":8582,"bookCount":375},"_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"}},"relatedCategoriesLoadedStatus":"success"},"listState":{"list":{"count":10,"total":8611,"items":[{"headers":{"creationTime":"2025-03-14T15:22:26+00:00","modifiedTime":"2025-03-14T15:22:26+00:00","timestamp":"2025-03-14T18:01:33+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33756"},"slug":"science","categoryId":33756},{"name":"Physics","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33769"},"slug":"physics","categoryId":33769}],"title":"Astrophysics for Dummies Cheat Sheet","strippedTitle":"astrophysics for dummies cheat sheet","slug":"astrophysics-for-dummies-cheat-sheet","canonicalUrl":"","搜所双发动机SEO":{"metaDescription":"Discover the wonders of astrophysics with our cheat sheet. Uncover the secrets of the cosmos, expand your knowledge and explore the unknown.","noIndex":0,"noFollow":0},"content":"The path to understanding astrophysics is both thought-provoking and brain-stretching. How did the universe come into existence, when will it end, and what role do our familiar planets and stars play in the grand scheme of the cosmos? There are many more questions in astrophysics than there are answers. The goal of this book is to put you in a position where you’re able to better formulate those questions, and know where to go for answers.\r\n\r\nAs you’re getting started on your journey, use this Cheat Sheet to answer some of the first questions that come to mind.","description":"The path to understanding astrophysics is both thought-provoking and brain-stretching. How did the universe come into existence, when will it end, and what role do our familiar planets and stars play in the grand scheme of the cosmos? There are many more questions in astrophysics than there are answers. The goal of this book is to put you in a position where you’re able to better formulate those questions, and know where to go for answers.\r\n\r\nAs you’re getting started on your journey, use this Cheat Sheet to answer some of the first questions that come to mind.","blurb":"","authors":[{"authorId":35383,"name":"Cynthia Phillips","slug":"cynthia-phillips","description":" <p> <b>Cynthia Phillips, PhD,</b> is a scientist at the NASA Jet Propulsion Laboratory. Previously, she worked at the SETI Institute for 15 years. <b>Shana Priwer</b> is a technical writer who has co-authored many projects with Cynthia Phillips, including the Frameworks series on architecture. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/35383"}},{"authorId":35384,"name":"Shana Priwer","slug":"shana-priwer","description":" <p> <b>Cynthia Phillips, PhD,</b> is a scientist at the NASA Jet Propulsion Laboratory. Previously, she worked at the SETI Institute for 15 years. <b>Shana Priwer</b> is a technical writer who has co-authored many projects with Cynthia Phillips, including the Frameworks series on architecture. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/35384"}}],"primaryCategoryTaxonomy":{"categoryId":33769,"title":"Physics","slug":"physics","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33769"}},"secondaryCategoryTaxonomy":{"categoryId":33758,"title":"Astronomy","slug":"astronomy","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33758"}},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":209405,"title":"String Theory For Dummies Cheat Sheet","slug":"string-theory-for-dummies-cheat-sheet","categoryList":["academics-the-arts","science","physics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/209405"}},{"articleId":209012,"title":"Physics II For Dummies Cheat Sheet","slug":"physics-ii-for-dummies-cheat-sheet","categoryList":["academics-the-arts","science","physics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/209012"}},{"articleId":208592,"title":"Thermodynamics For Dummies Cheat Sheet","slug":"thermodynamics-for-dummies-cheat-sheet","categoryList":["academics-the-arts","science","physics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/208592"}},{"articleId":208578,"title":"Optics For Dummies Cheat Sheet","slug":"optics-for-dummies-cheat-sheet","categoryList":["academics-the-arts","science","physics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/208578"}},{"articleId":208460,"title":"Physics I For Dummies Cheat Sheet","slug":"physics-i-for-dummies-cheat-sheet","categoryList":["academics-the-arts","science","physics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/208460"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":301662,"slug":"astrophysics-for-dummies","isbn":"9781394235049","categoryList":["academics-the-arts","science","physics"],"amazon":{"default":"//www.amazon.com/gp/product/1394235046/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1394235046/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1394235046-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1394235046/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1394235046/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/astrophysics-for-dummies-cover-9781394235049-203x255.jpg","width":203,"height":255},"title":"Astrophysics For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p> <b><b data-author-id=\"35383\">Cynthia Phillips</b>, PhD,</b> is a scientist at the NASA Jet Propulsion Laboratory. Previously, she worked at the SETI Institute for 15 years. <b>Shana Priwer</b> is a technical writer who has co-authored many projects with <b data-author-id=\"35383\">Cynthia Phillips</b>, including the Frameworks series on architecture. <p> <b>Cynthia Phillips, PhD,</b> is a scientist at the NASA Jet Propulsion Laboratory. Previously, she worked at the SETI Institute for 15 years. <b><b data-author-id=\"35384\">Shana Priwer</b></b> is a technical writer who has co-authored many projects with Cynthia Phillips, including the Frameworks series on architecture.</p>","authors":[{"authorId":35383,"name":"Cynthia Phillips","slug":"cynthia-phillips","description":" <p> <b>Cynthia Phillips, PhD,</b> is a scientist at the NASA Jet Propulsion Laboratory. Previously, she worked at the SETI Institute for 15 years. <b>Shana Priwer</b> is a technical writer who has co-authored many projects with Cynthia Phillips, including the Frameworks series on architecture. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/35383"}},{"authorId":35384,"name":"Shana Priwer","slug":"shana-priwer","description":" <p> <b>Cynthia Phillips, PhD,</b> is a scientist at the NASA Jet Propulsion Laboratory. Previously, she worked at the SETI Institute for 15 years. <b>Shana Priwer</b> is a technical writer who has co-authored many projects with Cynthia Phillips, including the Frameworks series on architecture. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/35384"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;science&quot;,&quot;physics&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394235049&quot;]}]\" id=\"du-slot-65f33b7da25ea\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;science&quot;,&quot;physics&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394235049&quot;]}]\" id=\"du-slot-65f33b7da4db0\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/"}}],"content":[{"title":"Top three websites for the latest astrophysics discoveries","thumb":null,"image":null,"content":"<p>Ready to take your interest in astrophysics a step further? Just about everything and everyone has a website, but that doesn’t mean they’re all equally useful (or even accurate). Here are some of the best places to start expanding your budding knowledge, and keep up on the latest discoveries.</p>\n<ul>\n<li><strong>NASA:</strong> <em><a href=\"//www.nasa.gov/\" target=\"_blank\" rel=\"noopener\">//www.nasa.gov</a></em> Start here not only for information about current NASA programs and missions but also to uncover a treasure trove of information on all things space, including the latest astrophysics discoveries.</li>\n<li><strong>Hubble Space Telescope:</strong>  <em><a href=\"//hubblesite.org/home\" target=\"_blank\" rel=\"noopener\">//hubblesite.org/home</a></em> If you’re looking for images taken by the venerable Hubble Space Telescope, look no further. The official site is home to official images and videos, as well as technical information about the telescope and its data. Most of the image releases also have an accompanying short article that describes the science behind the image, which is a great way to keep up on both theory and observation.</li>\n<li><strong>James Webb Space Telescope:</strong> <em><a href=\"//webbtelescope.org/home\" target=\"_blank\" rel=\"noopener\">//webbtelescope.org/home</a></em> This is the definitive site for current images from the new JWST, an extremely powerful space-based telescope capable of detecting infrared wavelengths. JWST observations will capture data from exoplanets and far-distant galaxies that were impossible to detect with previous generations of telescopes.</li>\n</ul>\n"},{"title":"A timeline of key discoveries in astrophysics","thumb":null,"image":null,"content":"<p>Don’t let the trees cloud your view of the forest. While the fields of astronomy, physics and astrophysics have had numerous points of innovation throughout humanity&#8217;s relatively short period of existence, a few rise to the top. They are:</p>\n<ul>\n<li><strong>13.8 billion years ago:</strong> The Big Bang</li>\n<li><strong>4.6 billion years ago:</strong> Formation of the solar system</li>\n<li><strong>30,000 BCE:</strong> Humans first moved from Asia to North America</li>\n<li><strong>3000–1520 BCE:</strong> Stonehenge is built, one of the first constructions with astronomical significance</li>\n<li><strong>2000 BCE:</strong> Solar and lunar calendars developed in ancient Mesopotamia and Egypt</li>\n<li><strong>270 BCE:</strong> Ancient Greek Aristarchus first proposed the heliocentric theory of the universe</li>\n<li><strong>1200-1300 CE:</strong> Early Chinese development of solid rocket propellant</li>\n<li><strong>1543:</strong> Nicolaus Copernicus’s theory of a heliocentric universe published</li>\n<li><strong>1608:</strong> Invention of the telescope</li>\n<li><strong>1609–1618:</strong> Johannes Kepler formulated laws of planetary motion</li>\n<li><strong>1610:</strong> Galileo discovered the moons of Jupiter, definitively proving wrong the geocentric theory.</li>\n<li><strong>1687:</strong> Isaac Newton’s description of gravity published</li>\n<li><strong>1781:</strong> William Herschel’s first discovery of a planet via telescope, Uranus</li>\n<li><strong>1867:</strong> James Maxwell’s proposition that light waves longer than infrared existed</li>\n<li><strong>1915:</strong> Einstein’s theory of general relativity published</li>\n<li><strong>1926:</strong> Robert Goddard launched first rocket with gasoline and liquid oxygen fuel</li>\n<li><strong>1927:</strong> Georges Lemaître proposed that the universe exploded into creation from a single point</li>\n<li><strong>1958:</strong> NASA established by President Eisenhower’s National Aeronautics and Space Act</li>\n<li><strong>1961:</strong> Yuri Gagarin’s first human spaceflight</li>\n<li><strong>1969:</strong> Neil Armstrong’s first steps on the Moon</li>\n<li><strong>1970:</strong> Stephen Hawking’s work connecting black hole singularities and gravity</li>\n<li><strong>1975:</strong> Founding of the ESA, European Space Agency</li>\n<li><strong>1990:</strong> Launch of the Hubble Space Telescope</li>\n<li><strong>2006:</strong> SpaceX first Falcon 1 rocket launch</li>\n<li><strong>2021:</strong> Launch of the James Webb Space Telescope</li>\n</ul>\n"},{"title":"Top six misconceptions about astrophysics","thumb":null,"image":null,"content":"<p>You’ve probably got one of those friends who thinks they know everything. Be the first to prove them wrong if they try to convince you of any of these common misconceptions about how the world works.</p>\n<ul>\n<li><strong>Black holes aren’t really black.</strong> Einstein’s theory of general relativity paved the way for understanding the effects of gravity in an ever-expanding universe. As light and matter move toward a black hole’s singularity, light emissions shift from visible to non-visible (microwave and infrared, for example) wavelengths but don’t disappear completely. Though never visually observable, traces of that light still exist — and, as Stephen Hawking discovered, even black holes emit very small amounts of radiation. As long as there’s even the tiniest amount of light, a black hole can never be black.</li>\n<li><strong>A parsec is a unit of distance, not time.</strong> Despite what the world of science fiction would have you believe, one parsec is a measurement of length equal to 3.26 light-years. And since we’re on the subject, a light-year is also not a unit of time; one light-year is how far light travels in a year, or 5.88 × 10<sup>12</sup> miles (9.46 × 10<sup>12</sup> km).</li>\n<li><strong>The Big Bang didn’t sound like a cannon firing.</strong> Although the name might make you think that the birth of the universe came with dramatic sound effects, the Big Bang itself would have been silent. By definition, sound waves are created when something vibrates through a medium (water or air, for example). At the time of the Big Bang there was no space or air (or anything else) for sound waves to move through.</li>\n<li><strong>The Moon does not only come out at night.</strong> Because the Earth rotates about its axis every 24 hours, the Moon is only above the horizon for half of that time — 12 hours. When the Moon is below the horizon for you, you can’t see it though during those hours, but the Moon is visible to people living in the opposite hemisphere.</li>\n<li><strong>The Earth is not at the center of our solar system.</strong> The geocentric model of the universe was first posed by ancient Greek astronomers in 380 BCE and remained a popular theory until disproved by Galileo in the 17th century. Using some of the world’s first telescopes, Galileo used studies of the Moon and Venus to show that the concept of phases meant that the Sun had to be at the center of the universe, not Earth. He also discovered moons orbiting Jupiter, definitive proof that not everything orbited the Earth. While we’re at it, the Earth also is not flat. Again, give a shout-out to the ancient Greeks; observations of lunar cycles showed early astronomers that the Moon had to be spherical and, ergo, so was Earth.</li>\n<li><strong>Comets, meteors, shooting stars, and asteroids are not all the same.</strong> Shooting stars and meteors are, though! They’re chunks of rock that burn up as they pass through the Earth’s atmosphere. Asteroids are rocky celestial objects, usually larger than meteors, that orbit the Sun. Comets also orbit the Sun, but at a larger distance than asteroids, and consist of cosmic dust and ice instead of rock. Just to make matters more confusing, tiny pieces of asteroids or comets can fall to earth as meteors, and if any of this material makes it through the atmosphere to hit the ground, the resulting space rock is called a meteorite.</li>\n</ul>\n"},{"title":"How big are you compared to objects in space?","thumb":null,"image":null,"content":"<p>Are black holes smaller than Earth? Are comets bigger than a car? Look no further for a quick guide to guesstimating size in the universe (and use these numbers to practice your metric system skills!)</p>\n<ul>\n<li><strong>Average person height:</strong> 0.00175 km</li>\n<li><strong>Height of the Empire State Building:</strong> 0.4 km</li>\n<li><strong>Typical comet diameter:</strong> 10 km</li>\n<li><strong>Typical asteroid diameter:</strong> 250 km</li>\n<li><strong>Our Moon’s diameter:</strong> 3,475 km</li>\n<li><strong>Mercury (the smallest planet in our solar system) diameter:</strong> 4880 km</li>\n<li><strong>Earth’s diameter:</strong> 12,742 km</li>\n<li><strong>Jupiter (the largest planet in our solar system) diameter:</strong> 139,822 km</li>\n<li><strong>Supermassive black hole diameter:</strong> 6,000,000 km</li>\n<li><strong>The Milky Way Galaxy diameter:</strong> 9.5&#215;10<sup>17</sup> km</li>\n<li><strong>Local Supercluster diameter:</strong> 9.5&#215;10<sup>20</sup> km</li>\n</ul>\n"},{"title":"Astrophysics world record holders","thumb":null,"image":null,"content":"<p>If you’ve ever tried to break a world record, you know just how extreme humans like to be. Turns out, the universe is no different. Here are a few more-than-noteworthy achievements:</p>\n<ul>\n<li><strong>How fast can neutron stars spin? </strong>700 times per second</li>\n<li><strong>Largest planet in our solar system?</strong> Jupiter, twice as big as all other planets in our solar system put together</li>\n<li><strong>Tiniest fundamental particle?</strong> Quark (infinitely small)</li>\n<li><strong>Most powerful celestial object?</strong> Quasar (trillions of times brighter than the Sun, 100–1000× brighter than our galaxy)</li>\n<li><strong>Densest object in the universe?</strong> Neutron star (billions of tons per cubic inch)</li>\n<li><strong>Heaviest object in the universe?</strong> Black hole (up to 100 billion solar masses)</li>\n<li><strong>Galaxy furthest away from Earth?</strong> Candidate HD1, located 13.5 billion light-years from us</li>\n<li>C<strong>oldest celestial object? </strong>Boomerang Nebula, 1 degree K</li>\n<li><strong>Hottest celestial object?</strong> Supernova, up to 1 million degrees C</li>\n</ul>\n"},{"title":"The units of astrophysics","thumb":null,"image":null,"content":"<p>Without units, it’d be difficult to figure out how far away a store or restaurant is. Now try to figure out the distance from the Earth to the Moon without units! Below is a listing of some of the most common units that astrophysicists frequently refer to.</p>\n<h3>Astrophysical Units</h3>\n<table>\n<tbody>\n<tr>\n<th>Unit name</th>\n<th>Abbreviation</th>\n<th>Description</th>\n<th>Value</th>\n</tr>\n<tr>\n<td>Astronomical Unit</td>\n<td>AU</td>\n<td>1 AU = distance from Earth’s orbit to Sun</td>\n<td>93 million miles (150 million km)</td>\n</tr>\n<tr>\n<td>Light year</td>\n<td>ly</td>\n<td>1 light-year = distance traveled in a year at the speed of light</td>\n<td>6 trillion miles (9.7 trillion km)</td>\n</tr>\n<tr>\n<td>Cosmic year, or galactic year</td>\n<td></td>\n<td>The amount of time it takes the Sun (and our solar system) to orbit the center of the Milky Way</td>\n<td>About 225 million years</td>\n</tr>\n<tr>\n<td>Parsec</td>\n<td>pc</td>\n<td>The distance at which Earth’s orbit is visible as one arcsecond</td>\n<td>3.26 light-years or 1.9&#215;10<sup>13</sup> miles (3&#215;10<sup>13</sup> km)</td>\n</tr>\n<tr>\n<td>Megaparsec</td>\n<td>Mpc</td>\n<td>1 million parsecs</td>\n<td>1.9&#215;10<sup>19</sup> miles (3&#215;10<sup>19</sup> km)</td>\n</tr>\n<tr>\n<td>Solar mass</td>\n<td>M☉</td>\n<td>The mass of the Sun</td>\n<td>4.4&#215;10<sup>30</sup> pounds (2.0×10<sup>30</sup> kg)</td>\n</tr>\n<tr>\n<td>Earth mass</td>\n<td>M⊕</td>\n<td>The mass of the Earth</td>\n<td>1.3&#215;10<sup>25</sup> pounds (5.97×10<sup>24</sup> kg)</td>\n</tr>\n<tr>\n<td>Electron Volt</td>\n<td>eV</td>\n<td>The energy gained by an electron traveling through a 1-volt potential; used for measuring speed of high-energy cosmic rays</td>\n<td>1.6×10<sup>−19</sup> J</td>\n</tr>\n<tr>\n<td>Joule</td>\n<td>J</td>\n<td>A unit of energy or work, defined as the work of 1 Newton acting over 1 meter</td>\n<td>10<sup>7 </sup>ergs, or 0.737 foot-pounds</td>\n</tr>\n<tr>\n<td>Kelvin</td>\n<td>K</td>\n<td>Measure of thermodynamic temperature</td>\n<td>Absolute zero: 0 K = –459°F = –273°C</td>\n</tr>\n<tr>\n<td>Newton</td>\n<td>N</td>\n<td>Force required to accelerate 1 kg over 1 meter per second per second</td>\n<td>1 kg⋅m/s<sup>2</sup></td>\n</tr>\n<tr>\n<td>Jansky</td>\n<td>Jy</td>\n<td>Unit of radio-wave emission strength</td>\n<td>10<sup>−26</sup> W/m<sup>2</sup> per Hz</td>\n</tr>\n</tbody>\n</table>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2025-03-14T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":301677},{"headers":{"creationTime":"2025-02-22T19:53:07+00:00","modifiedTime":"2025-02-22T21:44:33+00:00","timestamp":"2025-02-23T00:01:12+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33756"},"slug":"science","categoryId":33756},{"name":"Geography","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34592"},"slug":"geography","categoryId":34592}],"title":"Human Geography For Dummies Cheat Sheet","strippedTitle":"human geography for dummies cheat sheet","slug":"human-geography-for-dummies-cheat-sheet","canonicalUrl":"","搜所双发动机SEO":{"metaDescription":"From cultural geography to political geography, gain a working overview of the fascinating discipline of human geography with this cheat sheet.","noIndex":0,"noFollow":0},"content":"Welcome to the world of Human Geography. It is a whole world that a shockingly large number of people do not even know exists. Human geography is an academic discipline regularly taught at the high school and university level that actually encompasses quite a few subdisciplines of geographic study. The traditional divisions of human geography study the following major fields.\r\n<ul>\r\n \t<li>Populations and migration</li>\r\n \t<li>Urban geography</li>\r\n \t<li>Economic geography</li>\r\n \t<li>Cultural geography</li>\r\n \t<li>Political geography</li>\r\n</ul>\r\nWithin those fields, a slew of other research areas can be included under the umbrella of human geography. Areas like medical geography study the relationship between space and medical care (like the spread of infectious diseases or the impact that location has on quality of life). Political geography is a geopolitics field that tries to understand the geographic factors that influence how different countries interact. The content in this book will give you a working overview of the terms and concepts covered within the field of human geography.\r\n\r\nThe materials are comparable to the content covered in a lower-level undergraduate college course or an upper-level high school course. This book is not an in-depth dive into any particular human geography topic. In fact, every topic included in this book could have entire books written about just that one idea. Many researchers have spent untold hours building the human geography field. The purpose of this book is to give you a taste of the breadth of human geography in easily digestible tidbits.\r\n\r\nAlso, this is not a textbook. Instead, it is a starting place for where human geography can take you.","description":"Welcome to the world of Human Geography. It is a whole world that a shockingly large number of people do not even know exists. Human geography is an academic discipline regularly taught at the high school and university level that actually encompasses quite a few subdisciplines of geographic study. The traditional divisions of human geography study the following major fields.\r\n<ul>\r\n \t<li>Populations and migration</li>\r\n \t<li>Urban geography</li>\r\n \t<li>Economic geography</li>\r\n \t<li>Cultural geography</li>\r\n \t<li>Political geography</li>\r\n</ul>\r\nWithin those fields, a slew of other research areas can be included under the umbrella of human geography. Areas like medical geography study the relationship between space and medical care (like the spread of infectious diseases or the impact that location has on quality of life). Political geography is a geopolitics field that tries to understand the geographic factors that influence how different countries interact. The content in this book will give you a working overview of the terms and concepts covered within the field of human geography.\r\n\r\nThe materials are comparable to the content covered in a lower-level undergraduate college course or an upper-level high school course. This book is not an in-depth dive into any particular human geography topic. In fact, every topic included in this book could have entire books written about just that one idea. Many researchers have spent untold hours building the human geography field. The purpose of this book is to give you a taste of the breadth of human geography in easily digestible tidbits.\r\n\r\nAlso, this is not a textbook. Instead, it is a starting place for where human geography can take you.","blurb":"","authors":[{"authorId":35366,"name":"Kyle Tredinnick","slug":"kyle-tredinnick","description":" <p> <b>Kyle Tredinnick</b> has taught geography courses in high schools in China, Minnesota, and Nebraska, as well as undergraduate and graduate courses in geography at the University of Nebraska at Omaha. He has served on the board for the National Council for Geographic Education and is an AP Human Geography exam reader for the College Board. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/35366"}}],"primaryCategoryTaxonomy":{"categoryId":34592,"title":"Geography","slug":"geography","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34592"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":290681,"title":"Geography For Dummies Cheat Sheet","slug":"geography-for-dummies-cheat-sheet","categoryList":["academics-the-arts","science","geography"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/290681"}},{"articleId":201417,"title":"Starting at the Bottom in Geography: Inside Earth","slug":"starting-at-the-bottom-in-geography-inside-earth","categoryList":["academics-the-arts","science","geography"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/201417"}},{"articleId":201220,"title":"Grasping the Global Geographical Grid: Hip, Hip, Hipparchus!","slug":"grasping-the-global-geographical-grid-hip-hip-hipparchus","categoryList":["academics-the-arts","science","geography"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/201220"}},{"articleId":200990,"title":"Mapping the Geography of Languages","slug":"mapping-the-geography-of-languages","categoryList":["academics-the-arts","science","geography"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/200990"}},{"articleId":200054,"title":"Geography: Making Sense of It All","slug":"geography-making-sense-of-it-all","categoryList":["academics-the-arts","science","geography"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/200054"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":301537,"slug":"human-geography-for-dummies","isbn":"9781394208272","categoryList":["academics-the-arts","science","geography"],"amazon":{"default":"//www.amazon.com/gp/product/1394208278/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1394208278/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1394208278-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1394208278/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1394208278/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/human-geography-for-dummies-cover-9781394208272-203x255.jpg","width":203,"height":255},"title":"Human Geography For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p> <b><b data-author-id=\"35366\">Kyle Tredinnick</b></b> has taught geography courses in high schools in China, Minnesota, and Nebraska, as well as undergraduate and graduate courses in geography at the University of Nebraska at Omaha. He has served on the board for the National Council for Geographic Education and is an AP Human Geography exam reader for the College Board.</p>","authors":[{"authorId":35366,"name":"Kyle Tredinnick","slug":"kyle-tredinnick","description":" <p> <b>Kyle Tredinnick</b> has taught geography courses in high schools in China, Minnesota, and Nebraska, as well as undergraduate and graduate courses in geography at the University of Nebraska at Omaha. He has served on the board for the National Council for Geographic Education and is an AP Human Geography exam reader for the College Board. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/35366"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;science&quot;,&quot;geography&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394208272&quot;]}]\" id=\"du-slot-65d7e048a2adc\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;science&quot;,&quot;geography&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394208272&quot;]}]\" id=\"du-slot-65d7e048a3460\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/"}}],"content":[{"title":"Human geography: more than memorizing maps and facts","thumb":null,"image":null,"content":"<p>The perception of geography being only the creation and memorization of maps could not be further from the truth. Although we utilize maps to understand spatial relationships better, human geography is a complex field of study that relies on a series of methods to understand humans’ relationship with the planet.</p>\n<h3>Read the land</h3>\n<p>Use the Five Themes of geography to contextualize an area from a geographic perspective. By looking at an area through the ideas of place, location, region, movement, and human-environment interaction, you’ll be more able to read the landscape and understand some of the geographic forces that have influenced different areas around the world.</p>\n<h3>Trends and patterns over space and time</h3>\n<p>Looking for spatial patterns of relationships and connections helps break down much of what happens — or has happened — as the result of geography. Things like culture, politics, economics, and even social structures are connected to events that have occurred in other places and are the result of years, decades, or even millennia of geographic influence. By looking at all of the different fields of human geography, you’ll work on connecting the world through geography.</p>\n<h3>The geoinquiry processes of addressing problems</h3>\n<p>Approach global issues with a geographic lens. Let’s face it: There are a lot of problems out there — environmental, political, economic, and social. Luckily, geographers take it upon themselves to better understand human and environmental concerns to improve life for us all using the geoinquiry process. By asking good questions and collecting and organizing data to be visualized and analyzed, human geographers can develop possible solutions and action plans to address these issues. This book is chock-full of examples of how human geography can do just that.</p>\n<h3>Data and why geographers love it</h3>\n<p>Get into the science of geography and see how the process works in action. Geographers are obsessed with data and things that can be observed. We’ll look at many examples of how that data can be used within the geoinquiry process to understand how the world works.</p>\n<h3>Human geography connects us all</h3>\n<p>Human Geography is interdisciplinary. Much like how it has multiple applications, multiple fields contribute to how we can better learn about our world. Borrowing from fields like economics, sociology, political science, history, ecology, earth and environmental science, and anthropology, human geographers look to put concepts from all those fields into a geographic perspective to see what new information we can learn through a spatial approach.</p>\n<h3>The tools that help us to understand our world</h3>\n<p>Along the way, we’ll use all types of geographic representations to help better understand all of these terms and concepts. Using maps, charts, diagrams, graphs, models, pictures, and maps, we’ll better understand how different phenomena are distributed to pick out trends and patterns. Geography is all about relationships. Whether it is relationships between humans and the environment or humans with each other, human geography allows us to examine the world in a way no other field can.</p>\n"},{"title":"Key human geography concepts","thumb":null,"image":null,"content":"<p>Throughout the book, a couple of ideas and terms are repeatedly used, which might differ from how they’re used in everyday speech. These terms help to set the tone of the entire field and establish how human geography is unique as a field of study.</p>\n<p><strong>Place:</strong> The human and physical characteristics of an area that help build up the identity of that location.  This is an overarching concept used to connect people and add a sense of ownership  and belonging to a location.</p>\n<p><strong>Location:</strong> The different ways of expressing where something is in the world. Location can be expressed either as specifically as possible or by explaining the location of one place by its relationship to other locations.</p>\n<p><strong>Movement:</strong> In human geography, we look at how movement builds connections. Whether it is the movement of goods, ideas, or people, these processes help bring us together.</p>\n<p><strong>Interactions:</strong> How does one place connect to another? Why are some places more similar to each other than other places? These are questions that the idea of interactions covers. An offshoot of movement, we look at how distance affects how different groups of people meld and mesh with one another.</p>\n<p><strong>Space: </strong>This is where things happen. A general term for areas with their own unique groupings of human and physical features. Location and place are connected to other ideas, so space is a “catch-all” term for areas where things occur.</p>\n<p><strong>Scale of Analysis:</strong> In this sense, we are looking at the different levels of analysis (global, regional, national, local). Human geography can change drastically when you change the scale at which you look at something. For example, if we look at a continent’s cultural traits (say language), we will get a completely different insight than if we zoom in on the local level. Human geographers are always interested to see what they can learn and how their understanding can change simply by changing the scale.</p>\n<p><strong>Regions:</strong> Human geographers are particularly interested in groupings, similarities between places, and organization. If it is possible to lump multiple places together based on their commonalities to form regions, then that allows the comparison of places on a whole other scale and level.</p>\n<p><strong>Cultural Landscape:</strong> Cultural landscape is about looking at a place and reading a landscape to gain further insight into the connections between a people and the physical landscape — or even between the people themselves.</p>\n<p><strong>Sense of place:</strong> This is how people interact with a location. This concept is so unique because it changes for every person. While a location may be insignificant for some, it might signify home for others, and they’ll fiercely defend it. The ideas included in the sense of place are deeply connected to how humans attach meaning to different locations.</p>\n<p><strong>Statehood:</strong> The processes through which countries establish themselves as political units and maintain their power. The whole realm of political geography examines the establishment of state sovereignty, and the relationship between space and power. States are the basic unit of this study at a global level. When we say “State,” we are referring to a country; when we say “state,” we are referring to the smaller subdivision of a State (similar to a province).</p>\n<p><strong>Nation:</strong> This concept is one of the most difficult to comprehend because it is a group of people with similar culture, experience, and heritage that help them bond. Those bonds’ strengths and ability to influence a location can greatly impact how people connect with each other and the physical environment. Nations often use the idea of a “homeland” to unify dispersed members and provide motivation to unite and establish a political unit that serves their specific needs.</p>\n<p><strong>Development:</strong> Development is changing one thing to another — economic, agricultural, or even population development. Referring to spaces as being “developed” does not make sense because it is a relative and constantly changing concept. To imply that one place is developed implies that it is done developing. In human geography, development is an ongoing process, and different areas go through different levels of development at different speeds and times.</p>\n"},{"title":"Start “earth writing” your geographic journey","thumb":null,"image":null,"content":"<p>The study of human geography is all about the world and how humans experience it. Every person will experience it differently and will be able to contribute something new. Geography literally translates to “Earth writing,” so that’s one thing that I would encourage you to start thinking of what you can do with this to add your own story. By fitting it into the existing fields and framework of human geography, you can contribute your ideas and perspectives to the body of human geography knowledge.</p>\n<p>There is a lot we can learn about ourselves through studying others. There are over 8 billion stories that contribute to who we are. This book incorporates as large of a fraction of that as possible, but there is always more to add. One of the beautiful things about human geography is that it has been built on many people’s experiences, and there is always more to add. Whatever is added will only ever enrich the subject, so get to it!</p>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Five years","lifeExpectancySetFrom":"2025-02-22T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":301596},{"headers":{"creationTime":"2017-03-27T16:48:27+00:00","modifiedTime":"2025-02-12T22:21:26+00:00","timestamp":"2025-02-13T00:01:08+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33756"},"slug":"science","categoryId":33756},{"name":"Neuroscience","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33767"},"slug":"neuroscience","categoryId":33767}],"title":"Neurobiology For Dummies Cheat Sheet","strippedTitle":"neurobiology for dummies cheat sheet","slug":"neurobiology-for-dummies-cheat-sheet","canonicalUrl":"","搜所双发动机SEO":{"metaDescription":"Neurobiology has all kinds of real-world (and not so real-world) applications. From curing paralysis to the possibility of cyborgs, neurobiology has answers to ","noIndex":0,"noFollow":0},"content":"Neurobiology has all kinds of real-world (and not so real-world) applications. From curing paralysis to the possibility of cyborgs, neurobiology has answers to many fascinating questions.","description":"Neurobiology has all kinds of real-world (and not so real-world) applications. From curing paralysis to the possibility of cyborgs, neurobiology has answers to many fascinating questions.","blurb":"","authors":[{"authorId":8948,"name":"Frank Amthor","slug":"frank-amthor","description":" <p><b>Frank Amthor, PhD,</b> is a professor of psychology at the University of Alabama and holds a secondary appointment in the UAB Medical School Department of Neurobiology. He has been an NIH-supported researcher for over 20 years and has published over 100 journal articles and conference abstracts.</p>","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/8948"}}],"primaryCategoryTaxonomy":{"categoryId":33767,"title":"Neuroscience","slug":"neuroscience","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33767"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":157936,"title":"Can Imaging Systems Read Our Minds?","slug":"can-imaging-systems-read-our-minds","categoryList":["academics-the-arts","science","neuroscience"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/157936"}},{"articleId":157921,"title":"How Can Paralysis Be Cured?","slug":"how-can-paralysis-be-cured","categoryList":["academics-the-arts","science","neuroscience"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/157921"}},{"articleId":157922,"title":"Can the Mind Be Downloaded?","slug":"can-the-mind-be-downloaded","categoryList":["academics-the-arts","science","neuroscience"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/157922"}},{"articleId":157923,"title":"Are Cyborgs Possible?","slug":"are-cyborgs-possible","categoryList":["academics-the-arts","science","neuroscience"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/157923"}},{"articleId":157910,"title":"Is Depression &#147;All in Your Mind&#148;?","slug":"is-depression-all-in-your-mind","categoryList":["academics-the-arts","science","neuroscience"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/157910"}}],"fromCategory":[{"articleId":225092,"title":"Chronic Pain and Differences in Pain Perception","slug":"chronic-pain-individual-differences-pain-perception","categoryList":["academics-the-arts","science","neuroscience"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/225092"}},{"articleId":225089,"title":"Pain-Free and Hating It: Peripheral Neuropathy","slug":"pain-free-hating-peripheral-neuropathy","categoryList":["academics-the-arts","science","neuroscience"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/225089"}},{"articleId":225085,"title":"Neurotransmitters That Reduce or Block Pain","slug":"neurotransmitters-reduce-block-pain","categoryList":["academics-the-arts","science","neuroscience"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/225085"}},{"articleId":225078,"title":"Somatosensory Receptor Outputs","slug":"somatosensory-receptor-outputs","categoryList":["academics-the-arts","science","neuroscience"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/225078"}},{"articleId":225075,"title":"Sensing Position & Movement: Proprioception & Kinesthesis","slug":"sensing-position-movement-proprioception-kinesthesis","categoryList":["academics-the-arts","science","neuroscience"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/225075"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":282418,"slug":"neurobiology-for-dummies","isbn":"9781118689318","categoryList":["academics-the-arts","science","neuroscience"],"amazon":{"default":"//www.amazon.com/gp/product/1118689313/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1118689313/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1118689313-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1118689313/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1118689313/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/neurobiology-for-dummies-cover-9781118689318-203x255.jpg","width":203,"height":255},"title":"Neurobiology For Dummies","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"<p><b data-author-id=\"8948\">Frank Amthor, PhD,</b> is a professor of psychology at the University of Alabama and holds a secondary appointment in the UAB Medical School Department of Neurobiology. He has been an NIH-supported researcher for over 20 years and has published over 100 journal articles and conference abstracts.</p>","authors":[{"authorId":8948,"name":"Frank Amthor","slug":"frank-amthor","description":" <p><b>Frank Amthor, PhD,</b> is a professor of psychology at the University of Alabama and holds a secondary appointment in the UAB Medical School Department of Neurobiology. He has been an NIH-supported researcher for over 20 years and has published over 100 journal articles and conference abstracts.</p>","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/8948"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;science&quot;,&quot;neuroscience&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781118689318&quot;]}]\" id=\"du-slot-65cab144c3bdd\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;science&quot;,&quot;neuroscience&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781118689318&quot;]}]\" id=\"du-slot-65cab144c6214\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":157921,"title":"How Can Paralysis Be Cured?","slug":"how-can-paralysis-be-cured","categoryList":["academics-the-arts","science","neuroscience"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/157921"}},{"articleId":157922,"title":"Can the Mind Be Downloaded?","slug":"can-the-mind-be-downloaded","categoryList":["academics-the-arts","science","neuroscience"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/157922"}},{"articleId":157936,"title":"Can Imaging Systems Read Our Minds?","slug":"can-imaging-systems-read-our-minds","categoryList":["academics-the-arts","science","neuroscience"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/157936"}},{"articleId":157923,"title":"Are Cyborgs Possible?","slug":"are-cyborgs-possible","categoryList":["academics-the-arts","science","neuroscience"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/157923"}}],"content":[{"title":"How Can Paralysis Be Cured?","thumb":null,"image":null,"content":"<p>Paralysis has multiple causes. The part of the brain that controls movement can be damaged, such as from a stroke. Injuries and diseases can interrupt the message transmitted from the brain to the muscles. But treatment and research are helping, and rapid advances in brain-computer interfaces (BCIs) are making these science-fiction–sounding approaches feasible in the near future:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\">Rehabilitation and training help in all types of paralysis by strengthening pathways and recruiting alternate ones to bypass the injury.</p>\n</li>\n<li>\n<p class=\"first-para\">Considerable current research is being done on the cause of the paralysis. Curing the actual disease is almost always the treatment of first choice.</p>\n</li>\n<li>\n<p class=\"first-para\">One promising treatment for strokes and tumors involves regrowing neurons by taking cells that have been reprogrammed to be neural stem cells and doing autologous transplants derived from the person’s own tissue put into the damaged region.</p>\n</li>\n<li>\n<p class=\"first-para\">Other research efforts involve the use of growth factors to stimulate regeneration in damaged brain areas.</p>\n</li>\n<li>\n<p class=\"first-para\">Prosthetics may be used to alleviate paralysis by capturing the high-level neural signal for movement, bypassing the injury, and stimulating movement closer to the muscle, or by capturing high-level motor command signals and performing body movements with mechanical devices, such as prosthetic limbs or exoskeletons that magnify with motors the force exerted by our limbs, or that respond to brain commands for movement recorded by electrodes.</p>\n</li>\n</ul>\n"},{"title":"Can the Mind Be Downloaded?","thumb":null,"image":null,"content":"<p>As computers become more powerful, there is increasing speculation about whether they could equal or surpass human intelligence. One thread in this discussion is the idea of downloading our minds into an artificial substrate such as a computer. Most neuroscientists are very skeptical about this idea for a few reasons:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\">What we actually know about the brain is that it’s extremely complex. It consists of on the order of 100 billion neurons each with a thousand connections to other neurons. No present-day substrate can come close to this complexity.</p>\n</li>\n<li>\n<p class=\"first-para\">Neuroscientists think that the essential function of the brain is carried out by neural computations that generate action potentials that are sent to other neurons.</p>\n</li>\n<li>\n<p class=\"first-para\">Even if we could measure the firing of every neuron in the brain, and the strength of every synapse producing that firing, and download or model that in silicon, we still don’t know if it would actually work like a human brain.</p>\n</li>\n</ul>\n<p>Bottom line: Your thoughts are your own, for the foreseeable future.</p>\n"},{"title":"Can Imaging Systems Read Our Minds?","thumb":null,"image":null,"content":"<p>Since functional magnetic resonance imaging (fMRI) machines became more common at the end of the 20th century, there have been more claims about the ability of this technology to extract the content of mental processing. Many aspects of the claims and counterclaims parallel those associated with so-called “lie detector” tests during their heyday in the late 20th century, including the ability to detect lying itself.</p>\n<p>fMRI scanners detect blood oxygenation levels and blood flow changes associated with metabolic changes in brain areas at a resolution of one to several cubic millimeters, depending on the magnet strength. This measurement is a one-dimensional index of the overall level of neural activity in that tissue volume, which is a complex circuit, composed of millions of neurons.</p>\n<p>What can be deduced from fMRI scans, practically and theoretically? The gross anatomy of the brain is characterized by localization of function, with distinct motor and sensory areas, and maps within those areas. For example, neuroscientists know exactly where the brain area is that controls the left hand, and, if a person in an fMRI magnet moved his left hand, that movement would easily be detected.</p>\n<p>In sensory systems, visual space is laid out in a complex topographic map on the brain. If a person imagines some specific shape directly in front of her, some of the same brain areas will be activated that would have been activated by actually seeing that shape. This brain activity associated with imagery also can be detected in a scanner. Brain areas whose activity is necessary to conjure up images, or to lie, are different from those involved in retrieving content from actual memory, and this also can be detected.</p>\n<p>Eventually, though, we run out of resolution. A 1 cubic millimeter volume of brain tissue has trillions of different states. No one-dimensional measure of the overall activity in this volume can distinguish among all these states. Scanners may well be able to distinguish between a finite number of alternatives characterized by significant differences in brain activity over many millimeters (such as images causing arousal), but they can’t with foreseeable non-invasive technology distinguish among complex, subtle differences in similar thought patterns.</p>\n"},{"title":"Are Cyborgs Possible?","thumb":null,"image":null,"content":"<p><i>Cyborgs</i> (cybernetic organisms) already exist! Any one of the more than 100,000 people worldwide who has a cochlear implant to restore hearing is essentially a cyborg, a functional combination of organic and machine parts. Your Great-Aunt Gertie suddenly seems much cooler, doesn’t she? The real question is how rapidly additional brain functions will be carried out with brain-computer interfaces (BCIs) and how quickly they’ll be developed.</p>\n<p>Here are some interesting ideas about cyborgs:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\">The beginning of the human cyborg era began with the need to restore lost function, particularly hearing, where the BCI was relatively straightforward.</p>\n</li>\n<li>\n<p class=\"first-para\">Research is underway to use a cyborg approach to repair some kinds of blindness via miniature cameras and arrays of stimulators to inject the camera signal into the nervous system.</p>\n</li>\n<li>\n<p class=\"first-para\">A long-standing project is aimed at replacing some memory functions in a portion of the medial lobe of the brain called the hippocampus with silicon circuitry.</p>\n</li>\n<li>\n<p class=\"first-para\">Just as the nervous system adapts to new and novel inputs, such as those that occur when learning how to ride a bicycle or drive a car, it can likely adapt to direct injection of signals into the nervous system.</p>\n</li>\n</ul>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2025-02-12T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":207772},{"headers":{"creationTime":"2021-10-27T21:31:33+00:00","modifiedTime":"2024-12-20T21:13:11+00:00","timestamp":"2024-12-21T00:01:13+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Study Skills & Test Prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"slug":"study-skills-test-prep","categoryId":33772},{"name":"CCSP","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"},"slug":"ccsp","categoryId":34392}],"title":"CCSP: Data Security Technologies and Strategies","strippedTitle":"ccsp: data security technologies and strategies","slug":"ccsp-data-security-technologies-and-strategies","canonicalUrl":"","搜所双发动机SEO":{"metaDescription":"When studying for the CCSP exam, consider how to implement data security technologies and design data security strategies.","noIndex":0,"noFollow":0},"content":"When studying for the <a href=\"//coursofppt.com/article/academics-the-arts/study-skills-test-prep/ccsp/ccsp-for-dummies-cheat-sheet-273450/\">CCSP exam</a>, you must consider how to implement data security technologies and design data security strategies that fit your business and security needs. The following technologies are commonly applied as part of a comprehensive data security strategy in the cloud:\r\n<ul>\r\n \t<li>Encryption and key management</li>\r\n \t<li>Hashing</li>\r\n \t<li>Data loss prevention (DLP)</li>\r\n \t<li>Data de-identification (by masking and data obfuscation)</li>\r\n \t<li>Tokenization</li>\r\n</ul>\r\n<h2 id=\"tab1\" >Encryption and key management</h2>\r\nAs encryption pertains to cloud data security, encryption and key management are critical topics that must be fully understood in order to pass the CCSP exam. With resource pooling (and multitenancy) being a key characteristic of cloud computing, it’s important to remember that physical separation and protections are not commonly available in cloud environments. As such, strategic use of encryption is crucial to ensuring secure data storage and use in the cloud.\r\n<p class=\"article-tips remember\">When designing or implementing encryption technologies, remember that an encryption architecture has three basic components:</p>\r\n\r\n<ul>\r\n \t<li>The data being secured</li>\r\n \t<li>The encryption engine that performs all encryption operations</li>\r\n \t<li>The encryption keys used to secure the data</li>\r\n</ul>\r\nWhile it would seem like encrypting everything would be the best way to ensure data security, it’s important to consider that encryption has a performance impact on systems; system resources are used in order to process encryption algorithms every time data is encrypted or decrypted, which can add up if encryption is used excessively. As a CCSP, it is up to you to implement encryption so that data is as secure as possible while minimizing the impact to system performance.\r\n\r\nCountless other challenges and considerations exist when implementing encryption technologies, both on-prem and in cloud environments. Some key cloud encryption challenges are\r\n<ul>\r\n \t<li>Almost all data processing requires that data is in an unencrypted state. If a cloud customer is using a CSP for data analysis or processing, then encryption can be challenging to implement.</li>\r\n \t<li>Encryption keys are cached in memory when in use and often stay there for some time. This consideration is a major point of in multitenant environments because memory is a shared resource between tenants. CSPs must implement protections against tenants’ keys being accessed by tenants who share the same resources.</li>\r\n \t<li>Cloud data is often highly replicated (for availability purposes), which can make encryption and key managing challenging. Most CSPs have mechanisms in place to ensure that any copies of encrypted data remain encrypted.</li>\r\n \t<li>Throughout the entire data lifecycle, data can change states, locations, and format, which can require different applications of encryption along the way. Managing these changes may be a challenge, but understanding the Cloud Secure Data Lifecycle can help design complete end-to-end encryption solutions.</li>\r\n \t<li>Encryption is a confidentiality control at heart. It does not address threats to integrity of data on its own. Other technologies discussed throughout this chapter should be implemented to address integrity concerns.</li>\r\n \t<li>The effectiveness of an encryption solution is dependent upon how securely the encryption keys are stored and managed. As soon as an encryption key gets into the wrong hands, all data protected with that key is compromised. Keys that are managed by the CSP may potentially be accessed by malicious insiders, while customer-managed encryption keys are often mishandled or mismanaged.</li>\r\n</ul>\r\nAs the last point indicates, key management is a huge factor in ensuring that encryption implementations effectively secure cloud data. Because of its importance and the challenges associated with key management in the cloud, this task is typically one of the most complicated ones associated with securing cloud data.\r\n\r\nWhen developing your organization’s encryption and key management strategy, it’s important that you consider the following:\r\n<ul>\r\n \t<li><strong>Key generation:</strong> <span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">Encryption keys should be generated within a trusted, secure cryptographic module. FIPS 140-</span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">3 </span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">validated modules have been tested and certified to meet certain requirements that </span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">demonstrate</span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\"> tamper resistance and integrity of encryption keys.</span></li>\r\n \t<li><strong>Key distribution:</strong> It’s important that encryption keys are distributed securely to prevent theft or compromise during transit. One best practice is to encrypt keys with a separate encryption key while distributing to other parties (in PKI applications, for example). The worst thing that could happen is sending out a bunch of “secret” keys that get stolen by malicious eavesdroppers!</li>\r\n \t<li><strong>Key storage:</strong> Encryption keys must be protected at rest (both in volatile and persistent memory) and should never be stored in plaintext. Keys may be stored and managed internally on a virtual machine or other integrated application, externally and separate from the data itself, or managed by a trusted third party that provides key escrow services for secure key management. A <em>Hardware Security Module </em>(HSM) is a physical device that safeguards encryption keys. Many cloud providers provide HSM services, as well as software-based HSM capabilities.</li>\r\n \t<li><strong>Key destruction or deletion:</strong> At the end of the encryption key’s lifecycle, there will be a time that the key is no longer needed. <em>Key destruction</em> is the removal of an encryption key from its operational location. <em>Key deletion</em> takes it a step further and also removes any information that could be used to reconstruct that key. To prevent a Denial of Service due to unavailable keys, deletion should only occur after an archival period that includes substantial analysis to ensure that the key is in fact no longer needed.</li>\r\n</ul>\r\n<p class=\"article-tips tip\">Cloud environments rely heavily on encryption throughout the entire data lifecycle. While encryption itself is used for confidentiality, the widespread use of encryption means that availability of the encryption keys themselves is a major concern. Pay close attention to availability as you’re designing your key management systems and processes.</p>\r\n\r\n<h2 id=\"tab2\" >Hashing</h2>\r\n<em>Hashing</em>, as depicted, is the process of taking an arbitrary piece of data and generating a unique string or number of fixed-length from it. Hashing can be applied to any type of data — documents, images, database files, virtual machines, and more.\r\n\r\n[caption id=\"attachment_274158\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274158\" src=\"//coursofppt.com/wp-content/uploads/ccsp-hashing.jpg\" alt=\"Hashing.\" width=\"556\" height=\"284\" /> Hashing.[/caption]\r\n\r\nHashing in a data structure provides a mechanism to ensure the integrity of data. Hashes are similar to human fingerprints, which can be used to uniquely identify a single person to whom that fingerprint belongs. As seen, even the slightest change to a large text file will noticeably change the output of the hashing algorithm. Hashing is incredibly useful when you want to be sure that what you’re looking at now is the same as what you created before. In cloud environments, hashing helps verify that virtual machine instances haven’t been modified (maliciously or accidentally) without your knowledge. Simply hash your VM image before running it and compare it to the hash of the known-good VM image; the hash outputs should be identical.\r\n<p class=\"article-tips warning\">The term hashing is sometimes used interchangeably with encryption, but they are very different! Encryption is a two-way function, meaning what can be encrypted can be decrypted. Conversely, hashing is a one-way function. You can only generate a hash of an object; you cannot retrieve an object from its hash. Encryption, again, is used to provide confidentiality, while hashing provides integrity checking. Be careful not to confuse these two terms!</p>\r\nSeveral hashing algorithms are available, but the SHA (Secure Hash Algorithm) family of algorithms are amongst the most popular. Specific algorithms are outside the scope of this book, but you can research SHA-1, SHA-2, and SHA-3 for additional context.\r\n<h2 id=\"tab3\" >Data Loss Prevention (DLP)</h2>\r\n<em>Data loss prevention </em>(DLP), also known as data leakage prevention, is the set of technologies and practices used to identify and classify sensitive data, while ensuring that sensitive data is not lost or accessed by unauthorized parties.\r\n\r\n[caption id=\"attachment_274157\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274157\" src=\"//coursofppt.com/wp-content/uploads/ccsp-data-loss-prevention.jpg\" alt=\"Data Loss Prevention (DLP).\" width=\"556\" height=\"88\" /> Data Loss Prevention (DLP).[/caption]\r\n\r\nDLP can be applied to help restrict the flow of both structured and unstructured data to authorized locations and users. Effective use of DLP goes a long way to helping organizations safeguard their data’s confidentiality, both on-prem and in the cloud. To put it plainly, DLP analyzes data storage, identifies sensitive data components, and prevents users from accidentally or maliciously sending that sensitive data to the wrong party.\r\n\r\nWhen designing a DLP strategy, organizations must consider how the technology fits in with their existing technologies, processes, and architecture. DLP controls need to be thoroughly understood and applied in a manner that aligns with the organization’s overall enterprise architecture in order to ensure that only the right type of data is blocked from being transmitted.\r\n\r\nHybrid cloud users, or users that utilize a combination of cloud-based and on-prem services, should pay extremely close attention to their enterprise security architecture while developing a DLP strategy. Because data traverses both cloud and noncloud environments, a poor DLP implementation can result in segmented data security policies that are hard to manage and ineffective.\r\n<p class=\"article-tips remember\">DLP that is incorrectly implemented can lead to false-positives (for example, blocking legitimate traffic) or false-negatives (allowing sensitive data to be sent to unauthorized parties).</p>\r\nDLP implementations consist of three core components or stages:\r\n<ul>\r\n \t<li><strong>Discovery and classification:</strong> The first stage of DLP is discovery and classification. <em>Discovery</em> is the process of finding all instances of data, and <em>classification</em> is the act of categorizing that data based on its sensitivity and other characteristics. Examples of classifications may include “credit card data,” “Social Security numbers,” “health records,” and so on. Comprehensive discovery and proper classification is crucial to success during the remaining DLP stages.</li>\r\n \t<li><strong>Monitoring:</strong> After data has been fully discovered and classified, it is able to be monitored. Monitoring is an essential component of the DLP implementation and involves watching data as it moves throughout the cloud data lifecycle. The monitoring stage is where the DLP implementation is looking to identify data that is being misused or handled outside of established usage policies. Effective DLP monitoring should happen on storage devices, networking devices, servers, workstations, and other endpoints — and it should evaluate traffic across all potential export routes (email, Internet browsers, and so on).</li>\r\n \t<li><strong>Enforcement:</strong> The final DLP stage, enforcement, is where action is taken on policy violations identified during the monitoring stage. These actions are configured based on the classification of data and the potential impact of its loss. Violations of less sensitive data is traditionally logged and/or alerted on, while more sensitive data can actually be blocked from unauthorized exposure or loss. A common use-case here is financial services companies that detect credit card numbers being emailed to unauthorized domains and are able to stop the email in its tracks, before it ever leaves the corporate network.</li>\r\n</ul>\r\nAlways remember “Security follows the data” — and DLP technology is no different. When creating a DLP implementation strategy, it’s important that you consider techniques for monitoring activity in every data state. DLP data states are\r\n<ul>\r\n \t<li><strong>DLP at rest:</strong> For data at rest, the DLP implementation is stored wherever the data is stored, such as a workstation, file server, or some other form of storage system. Although this DLP implementation is often the simplest, it may need to work in conjunction with other DLP implementations to be most effective.</li>\r\n \t<li><strong>DLP in transit:</strong> <em>Network-based DLP</em> is data loss prevention that involves monitoring outbound traffic near the network perimeter. This DLP implementation monitors traffic over Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol Secure (HTTPS), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP), and other protocols.</li>\r\n</ul>\r\n<p class=\"article-tips warning\">If the network traffic being monitored is encrypted, you will need to integrate encryption and key management technologies into your DLP solution. Standard DLP implementations cannot effectively monitor encrypted traffic, such as HTTPS.</p>\r\n\r\n<ul>\r\n \t<li><strong>DLP in use:</strong> <em>Host-based,</em> or <em>endpoint-based, DLP</em> is data loss prevention that involves installation of a DLP application on a workstation or other endpoint device. This DLP implementation allows monitoring of all data in use on the client device and provides insights that network-based DLP are not able to provide.</li>\r\n</ul>\r\n<p class=\"article-tips tip\">Because of the massive scale of many cloud environments, host-based DLP can be a major challenge. There are simply too many hosts and endpoints to monitor without a sophisticated strategy that involves automated deployment. Despite this challenge, host-based DLP is not impossible in the cloud, and CSPs continue to make monitoring easier as new cloud-native DLP features become available.</p>\r\nAfter you understand DLP and how it can be used to protect cloud data, there are a few considerations that cloud security professionals commonly face when implementing cloud-based DLP:\r\n<ul>\r\n \t<li>Cloud data is highly distributed and replicated across locations. Data can move between servers, from one data center to another, to and from backup storage, or between a customer and the cloud provider. This movement, along with the data replication that ensures availability, present challenges that need to be worked through in a DLP strategy.</li>\r\n \t<li>DLP technologies can impact performance. Host-based DLP scan all data access activities on an endpoint, and network-based DLP scan all outbound network traffic across a network boundary. This constant monitoring and scanning can impact system and network performance and must be considered while developing and testing your DLP strategy.</li>\r\n \t<li>Cloud-based DLP can get expensive. The pay-for-what-you-use model is often a great savings to cloud customers, but when it comes to DLP, the constant resource utilization associated with monitoring traffic can quickly add up. It’s important to model and plan for resource consumption costs on top of the costs of the DLP solution itself.</li>\r\n</ul>\r\n<h2 id=\"tab4\" >Data de-identification</h2>\r\nConfidentiality is incredibly important, especially in the cloud. While mechanisms like encryption and DLP go a long way to providing data confidentiality, they’re not always feasible. <em>Data de-identification</em> (or <em>anonymization</em>) is the process of removing information that can be used to identify a specific individual from a dataset. This technique is commonly used as a privacy measure to protect Personally Identifiable Information (PII) or other sensitive information from being exposed when an entire dataset is shared. The following figure depicts the purest form of data de-identification; in this example, student names have been removed in order to protect the confidentiality of their grades.\r\n\r\nSeveral techniques are available to de-identify sensitive information; masking (or obfuscation) and tokenization are two of the most commonly used methods.\r\n\r\n[caption id=\"attachment_274156\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274156\" src=\"//coursofppt.com/wp-content/uploads/ccsp-data-de-identification.jpg\" alt=\"Data de-identification.\" width=\"556\" height=\"158\" /> Data de-identification.[/caption]\r\n<h3>Masking</h3>\r\n<em>Masking</em> is the process of partially or completely replacing sensitive data with random characters or other nonsensitive data. Masking, or <em>obfuscation, </em>can happen in a number of ways, but the following figure is a visual depiction of the most popular type of data masking, which is commonly used to protect credit card numbers and other sensitive financial information.\r\n\r\n[caption id=\"attachment_274155\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274155\" src=\"//coursofppt.com/wp-content/uploads/ccsp-data-masking.jpg\" alt=\"Data masking.\" width=\"556\" height=\"205\" /> Data masking.[/caption]\r\n\r\nAs a cloud security professional, you can use several techniques when masking or obfuscating data. Here are a few to remember:\r\n<ul>\r\n \t<li><strong>Substitution:</strong> <em>Substitution</em> mimics the look of real data, but replaces (or appends) it with some unrelated value. Substitution can either be random or algorithmic, with the latter allowing two-way substitution — meaning if you have the algorithm, then you can retrieve the original data from the masked dataset.</li>\r\n \t<li><strong>Scrambling:</strong> <em>Scrambling</em> mimics the look of real data, but simply jumbles the characters into a random order. For example, a customer’s whose account number is #5551234 may be shown as #1552435 in a development environment. (For what it’s worth, my scrambled phone number is 0926381135.)</li>\r\n \t<li><strong>Deletion or nulling:</strong> This technique is just what it sounds like. When using this masking technique, data appears blank or empty to anyone who isn’t authorized to view it.</li>\r\n</ul>\r\nAside from being used to comply with regulatory regulations (like HIPAA or PCI DSS), data masking is often used when organizations need to use production data in a test or development environment. By masking the data, development environments are able to use real data without exposing sensitive data elements to unauthorized viewers or less secure environments.\r\n<h3>Tokenization</h3>\r\n<em>Tokenization</em> is the process of substituting a sensitive piece of data with a nonsensitive replacement, called a <em>token.</em> The token is merely a reference back to the sensitive data, but has no meaning or sensitivity on its own. The token maintains the look and feel of the original data and is mapped back to the original data by the tokenization engine or application. Tokenization allows code to continue to run seamlessly, even with randomized tokens in place of sensitive data.\r\n<p class=\"article-tips tip\"><em>Tokenization</em> can be outsourced to external, cloud-based tokenization services (referred to as tokenization-as-a-service). When using these services, it’s prudent to understand how the provider secures your data both at rest and in transit between you and their systems.</p>","description":"When studying for the <a href=\"//coursofppt.com/article/academics-the-arts/study-skills-test-prep/ccsp/ccsp-for-dummies-cheat-sheet-273450/\">CCSP exam</a>, you must consider how to implement data security technologies and design data security strategies that fit your business and security needs. The following technologies are commonly applied as part of a comprehensive data security strategy in the cloud:\r\n<ul>\r\n \t<li>Encryption and key management</li>\r\n \t<li>Hashing</li>\r\n \t<li>Data loss prevention (DLP)</li>\r\n \t<li>Data de-identification (by masking and data obfuscation)</li>\r\n \t<li>Tokenization</li>\r\n</ul>\r\n<h2 id=\"tab1\" >Encryption and key management</h2>\r\nAs encryption pertains to cloud data security, encryption and key management are critical topics that must be fully understood in order to pass the CCSP exam. With resource pooling (and multitenancy) being a key characteristic of cloud computing, it’s important to remember that physical separation and protections are not commonly available in cloud environments. As such, strategic use of encryption is crucial to ensuring secure data storage and use in the cloud.\r\n<p class=\"article-tips remember\">When designing or implementing encryption technologies, remember that an encryption architecture has three basic components:</p>\r\n\r\n<ul>\r\n \t<li>The data being secured</li>\r\n \t<li>The encryption engine that performs all encryption operations</li>\r\n \t<li>The encryption keys used to secure the data</li>\r\n</ul>\r\nWhile it would seem like encrypting everything would be the best way to ensure data security, it’s important to consider that encryption has a performance impact on systems; system resources are used in order to process encryption algorithms every time data is encrypted or decrypted, which can add up if encryption is used excessively. As a CCSP, it is up to you to implement encryption so that data is as secure as possible while minimizing the impact to system performance.\r\n\r\nCountless other challenges and considerations exist when implementing encryption technologies, both on-prem and in cloud environments. Some key cloud encryption challenges are\r\n<ul>\r\n \t<li>Almost all data processing requires that data is in an unencrypted state. If a cloud customer is using a CSP for data analysis or processing, then encryption can be challenging to implement.</li>\r\n \t<li>Encryption keys are cached in memory when in use and often stay there for some time. This consideration is a major point of in multitenant environments because memory is a shared resource between tenants. CSPs must implement protections against tenants’ keys being accessed by tenants who share the same resources.</li>\r\n \t<li>Cloud data is often highly replicated (for availability purposes), which can make encryption and key managing challenging. Most CSPs have mechanisms in place to ensure that any copies of encrypted data remain encrypted.</li>\r\n \t<li>Throughout the entire data lifecycle, data can change states, locations, and format, which can require different applications of encryption along the way. Managing these changes may be a challenge, but understanding the Cloud Secure Data Lifecycle can help design complete end-to-end encryption solutions.</li>\r\n \t<li>Encryption is a confidentiality control at heart. It does not address threats to integrity of data on its own. Other technologies discussed throughout this chapter should be implemented to address integrity concerns.</li>\r\n \t<li>The effectiveness of an encryption solution is dependent upon how securely the encryption keys are stored and managed. As soon as an encryption key gets into the wrong hands, all data protected with that key is compromised. Keys that are managed by the CSP may potentially be accessed by malicious insiders, while customer-managed encryption keys are often mishandled or mismanaged.</li>\r\n</ul>\r\nAs the last point indicates, key management is a huge factor in ensuring that encryption implementations effectively secure cloud data. Because of its importance and the challenges associated with key management in the cloud, this task is typically one of the most complicated ones associated with securing cloud data.\r\n\r\nWhen developing your organization’s encryption and key management strategy, it’s important that you consider the following:\r\n<ul>\r\n \t<li><strong>Key generation:</strong> <span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">Encryption keys should be generated within a trusted, secure cryptographic module. FIPS 140-</span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">3 </span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">validated modules have been tested and certified to meet certain requirements that </span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">demonstrate</span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\"> tamper resistance and integrity of encryption keys.</span></li>\r\n \t<li><strong>Key distribution:</strong> It’s important that encryption keys are distributed securely to prevent theft or compromise during transit. One best practice is to encrypt keys with a separate encryption key while distributing to other parties (in PKI applications, for example). The worst thing that could happen is sending out a bunch of “secret” keys that get stolen by malicious eavesdroppers!</li>\r\n \t<li><strong>Key storage:</strong> Encryption keys must be protected at rest (both in volatile and persistent memory) and should never be stored in plaintext. Keys may be stored and managed internally on a virtual machine or other integrated application, externally and separate from the data itself, or managed by a trusted third party that provides key escrow services for secure key management. A <em>Hardware Security Module </em>(HSM) is a physical device that safeguards encryption keys. Many cloud providers provide HSM services, as well as software-based HSM capabilities.</li>\r\n \t<li><strong>Key destruction or deletion:</strong> At the end of the encryption key’s lifecycle, there will be a time that the key is no longer needed. <em>Key destruction</em> is the removal of an encryption key from its operational location. <em>Key deletion</em> takes it a step further and also removes any information that could be used to reconstruct that key. To prevent a Denial of Service due to unavailable keys, deletion should only occur after an archival period that includes substantial analysis to ensure that the key is in fact no longer needed.</li>\r\n</ul>\r\n<p class=\"article-tips tip\">Cloud environments rely heavily on encryption throughout the entire data lifecycle. While encryption itself is used for confidentiality, the widespread use of encryption means that availability of the encryption keys themselves is a major concern. Pay close attention to availability as you’re designing your key management systems and processes.</p>\r\n\r\n<h2 id=\"tab2\" >Hashing</h2>\r\n<em>Hashing</em>, as depicted, is the process of taking an arbitrary piece of data and generating a unique string or number of fixed-length from it. Hashing can be applied to any type of data — documents, images, database files, virtual machines, and more.\r\n\r\n[caption id=\"attachment_274158\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274158\" src=\"//coursofppt.com/wp-content/uploads/ccsp-hashing.jpg\" alt=\"Hashing.\" width=\"556\" height=\"284\" /> Hashing.[/caption]\r\n\r\nHashing in a data structure provides a mechanism to ensure the integrity of data. Hashes are similar to human fingerprints, which can be used to uniquely identify a single person to whom that fingerprint belongs. As seen, even the slightest change to a large text file will noticeably change the output of the hashing algorithm. Hashing is incredibly useful when you want to be sure that what you’re looking at now is the same as what you created before. In cloud environments, hashing helps verify that virtual machine instances haven’t been modified (maliciously or accidentally) without your knowledge. Simply hash your VM image before running it and compare it to the hash of the known-good VM image; the hash outputs should be identical.\r\n<p class=\"article-tips warning\">The term hashing is sometimes used interchangeably with encryption, but they are very different! Encryption is a two-way function, meaning what can be encrypted can be decrypted. Conversely, hashing is a one-way function. You can only generate a hash of an object; you cannot retrieve an object from its hash. Encryption, again, is used to provide confidentiality, while hashing provides integrity checking. Be careful not to confuse these two terms!</p>\r\nSeveral hashing algorithms are available, but the SHA (Secure Hash Algorithm) family of algorithms are amongst the most popular. Specific algorithms are outside the scope of this book, but you can research SHA-1, SHA-2, and SHA-3 for additional context.\r\n<h2 id=\"tab3\" >Data Loss Prevention (DLP)</h2>\r\n<em>Data loss prevention </em>(DLP), also known as data leakage prevention, is the set of technologies and practices used to identify and classify sensitive data, while ensuring that sensitive data is not lost or accessed by unauthorized parties.\r\n\r\n[caption id=\"attachment_274157\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274157\" src=\"//coursofppt.com/wp-content/uploads/ccsp-data-loss-prevention.jpg\" alt=\"Data Loss Prevention (DLP).\" width=\"556\" height=\"88\" /> Data Loss Prevention (DLP).[/caption]\r\n\r\nDLP can be applied to help restrict the flow of both structured and unstructured data to authorized locations and users. Effective use of DLP goes a long way to helping organizations safeguard their data’s confidentiality, both on-prem and in the cloud. To put it plainly, DLP analyzes data storage, identifies sensitive data components, and prevents users from accidentally or maliciously sending that sensitive data to the wrong party.\r\n\r\nWhen designing a DLP strategy, organizations must consider how the technology fits in with their existing technologies, processes, and architecture. DLP controls need to be thoroughly understood and applied in a manner that aligns with the organization’s overall enterprise architecture in order to ensure that only the right type of data is blocked from being transmitted.\r\n\r\nHybrid cloud users, or users that utilize a combination of cloud-based and on-prem services, should pay extremely close attention to their enterprise security architecture while developing a DLP strategy. Because data traverses both cloud and noncloud environments, a poor DLP implementation can result in segmented data security policies that are hard to manage and ineffective.\r\n<p class=\"article-tips remember\">DLP that is incorrectly implemented can lead to false-positives (for example, blocking legitimate traffic) or false-negatives (allowing sensitive data to be sent to unauthorized parties).</p>\r\nDLP implementations consist of three core components or stages:\r\n<ul>\r\n \t<li><strong>Discovery and classification:</strong> The first stage of DLP is discovery and classification. <em>Discovery</em> is the process of finding all instances of data, and <em>classification</em> is the act of categorizing that data based on its sensitivity and other characteristics. Examples of classifications may include “credit card data,” “Social Security numbers,” “health records,” and so on. Comprehensive discovery and proper classification is crucial to success during the remaining DLP stages.</li>\r\n \t<li><strong>Monitoring:</strong> After data has been fully discovered and classified, it is able to be monitored. Monitoring is an essential component of the DLP implementation and involves watching data as it moves throughout the cloud data lifecycle. The monitoring stage is where the DLP implementation is looking to identify data that is being misused or handled outside of established usage policies. Effective DLP monitoring should happen on storage devices, networking devices, servers, workstations, and other endpoints — and it should evaluate traffic across all potential export routes (email, Internet browsers, and so on).</li>\r\n \t<li><strong>Enforcement:</strong> The final DLP stage, enforcement, is where action is taken on policy violations identified during the monitoring stage. These actions are configured based on the classification of data and the potential impact of its loss. Violations of less sensitive data is traditionally logged and/or alerted on, while more sensitive data can actually be blocked from unauthorized exposure or loss. A common use-case here is financial services companies that detect credit card numbers being emailed to unauthorized domains and are able to stop the email in its tracks, before it ever leaves the corporate network.</li>\r\n</ul>\r\nAlways remember “Security follows the data” — and DLP technology is no different. When creating a DLP implementation strategy, it’s important that you consider techniques for monitoring activity in every data state. DLP data states are\r\n<ul>\r\n \t<li><strong>DLP at rest:</strong> For data at rest, the DLP implementation is stored wherever the data is stored, such as a workstation, file server, or some other form of storage system. Although this DLP implementation is often the simplest, it may need to work in conjunction with other DLP implementations to be most effective.</li>\r\n \t<li><strong>DLP in transit:</strong> <em>Network-based DLP</em> is data loss prevention that involves monitoring outbound traffic near the network perimeter. This DLP implementation monitors traffic over Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol Secure (HTTPS), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP), and other protocols.</li>\r\n</ul>\r\n<p class=\"article-tips warning\">If the network traffic being monitored is encrypted, you will need to integrate encryption and key management technologies into your DLP solution. Standard DLP implementations cannot effectively monitor encrypted traffic, such as HTTPS.</p>\r\n\r\n<ul>\r\n \t<li><strong>DLP in use:</strong> <em>Host-based,</em> or <em>endpoint-based, DLP</em> is data loss prevention that involves installation of a DLP application on a workstation or other endpoint device. This DLP implementation allows monitoring of all data in use on the client device and provides insights that network-based DLP are not able to provide.</li>\r\n</ul>\r\n<p class=\"article-tips tip\">Because of the massive scale of many cloud environments, host-based DLP can be a major challenge. There are simply too many hosts and endpoints to monitor without a sophisticated strategy that involves automated deployment. Despite this challenge, host-based DLP is not impossible in the cloud, and CSPs continue to make monitoring easier as new cloud-native DLP features become available.</p>\r\nAfter you understand DLP and how it can be used to protect cloud data, there are a few considerations that cloud security professionals commonly face when implementing cloud-based DLP:\r\n<ul>\r\n \t<li>Cloud data is highly distributed and replicated across locations. Data can move between servers, from one data center to another, to and from backup storage, or between a customer and the cloud provider. This movement, along with the data replication that ensures availability, present challenges that need to be worked through in a DLP strategy.</li>\r\n \t<li>DLP technologies can impact performance. Host-based DLP scan all data access activities on an endpoint, and network-based DLP scan all outbound network traffic across a network boundary. This constant monitoring and scanning can impact system and network performance and must be considered while developing and testing your DLP strategy.</li>\r\n \t<li>Cloud-based DLP can get expensive. The pay-for-what-you-use model is often a great savings to cloud customers, but when it comes to DLP, the constant resource utilization associated with monitoring traffic can quickly add up. It’s important to model and plan for resource consumption costs on top of the costs of the DLP solution itself.</li>\r\n</ul>\r\n<h2 id=\"tab4\" >Data de-identification</h2>\r\nConfidentiality is incredibly important, especially in the cloud. While mechanisms like encryption and DLP go a long way to providing data confidentiality, they’re not always feasible. <em>Data de-identification</em> (or <em>anonymization</em>) is the process of removing information that can be used to identify a specific individual from a dataset. This technique is commonly used as a privacy measure to protect Personally Identifiable Information (PII) or other sensitive information from being exposed when an entire dataset is shared. The following figure depicts the purest form of data de-identification; in this example, student names have been removed in order to protect the confidentiality of their grades.\r\n\r\nSeveral techniques are available to de-identify sensitive information; masking (or obfuscation) and tokenization are two of the most commonly used methods.\r\n\r\n[caption id=\"attachment_274156\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274156\" src=\"//coursofppt.com/wp-content/uploads/ccsp-data-de-identification.jpg\" alt=\"Data de-identification.\" width=\"556\" height=\"158\" /> Data de-identification.[/caption]\r\n<h3>Masking</h3>\r\n<em>Masking</em> is the process of partially or completely replacing sensitive data with random characters or other nonsensitive data. Masking, or <em>obfuscation, </em>can happen in a number of ways, but the following figure is a visual depiction of the most popular type of data masking, which is commonly used to protect credit card numbers and other sensitive financial information.\r\n\r\n[caption id=\"attachment_274155\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274155\" src=\"//coursofppt.com/wp-content/uploads/ccsp-data-masking.jpg\" alt=\"Data masking.\" width=\"556\" height=\"205\" /> Data masking.[/caption]\r\n\r\nAs a cloud security professional, you can use several techniques when masking or obfuscating data. Here are a few to remember:\r\n<ul>\r\n \t<li><strong>Substitution:</strong> <em>Substitution</em> mimics the look of real data, but replaces (or appends) it with some unrelated value. Substitution can either be random or algorithmic, with the latter allowing two-way substitution — meaning if you have the algorithm, then you can retrieve the original data from the masked dataset.</li>\r\n \t<li><strong>Scrambling:</strong> <em>Scrambling</em> mimics the look of real data, but simply jumbles the characters into a random order. For example, a customer’s whose account number is #5551234 may be shown as #1552435 in a development environment. (For what it’s worth, my scrambled phone number is 0926381135.)</li>\r\n \t<li><strong>Deletion or nulling:</strong> This technique is just what it sounds like. When using this masking technique, data appears blank or empty to anyone who isn’t authorized to view it.</li>\r\n</ul>\r\nAside from being used to comply with regulatory regulations (like HIPAA or PCI DSS), data masking is often used when organizations need to use production data in a test or development environment. By masking the data, development environments are able to use real data without exposing sensitive data elements to unauthorized viewers or less secure environments.\r\n<h3>Tokenization</h3>\r\n<em>Tokenization</em> is the process of substituting a sensitive piece of data with a nonsensitive replacement, called a <em>token.</em> The token is merely a reference back to the sensitive data, but has no meaning or sensitivity on its own. The token maintains the look and feel of the original data and is mapped back to the original data by the tokenization engine or application. Tokenization allows code to continue to run seamlessly, even with randomized tokens in place of sensitive data.\r\n<p class=\"article-tips tip\"><em>Tokenization</em> can be outsourced to external, cloud-based tokenization services (referred to as tokenization-as-a-service). When using these services, it’s prudent to understand how the provider secures your data both at rest and in transit between you and their systems.</p>","blurb":"","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"primaryCategoryTaxonomy":{"categoryId":34392,"title":"CCSP","slug":"ccsp","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"}},"secondaryCategoryTaxonomy":{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"}},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"Encryption and key management","target":"#tab1"},{"label":"Hashing","target":"#tab2"},{"label":"Data Loss Prevention (DLP)","target":"#tab3"},{"label":"Data de-identification","target":"#tab4"}],"relatedArticles":{"fromBook":[{"articleId":274173,"title":"The Secure Software Development Lifecycle (SDLC) Process","slug":"the-secure-software-development-lifecycle-sdlc-process","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274173"}},{"articleId":274167,"title":"CCSP Exam and Virtualization","slug":"ccsp-exam-and-virtualization","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274167"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}},{"articleId":274120,"title":"Design Principles of Secure Cloud Computing","slug":"design-principles-of-secure-cloud-computing","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274120"}}],"fromCategory":[{"articleId":274173,"title":"The Secure Software Development Lifecycle (SDLC) Process","slug":"the-secure-software-development-lifecycle-sdlc-process","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274173"}},{"articleId":274167,"title":"CCSP Exam and Virtualization","slug":"ccsp-exam-and-virtualization","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274167"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}},{"articleId":274120,"title":"Design Principles of Secure Cloud Computing","slug":"design-principles-of-secure-cloud-computing","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274120"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281662,"slug":"ccsp-for-dummies-with-online-practice","isbn":"9781394212811","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"amazon":{"default":"//www.amazon.com/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/139421281X-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/ccsp-for-dummies-2nd-edition-cover-9781394212811-203x255.jpg","width":203,"height":255},"title":"CCSP For Dummies","testBankPinActivationLink":"//coursofppt.com/go/fdactivatepin","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"33440\">Arthur J. Deane</b></b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.</p>","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-658380490b5e9\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-658380490bc8a\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2024-12-20T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":274154},{"headers":{"creationTime":"2021-10-28T00:22:49+00:00","modifiedTime":"2024-12-20T21:01:44+00:00","timestamp":"2024-12-21T00:01:12+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Study Skills & Test Prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"slug":"study-skills-test-prep","categoryId":33772},{"name":"CCSP","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"},"slug":"ccsp","categoryId":34392}],"title":"CCSP Exam and Virtualization","strippedTitle":"ccsp exam and virtualization","slug":"ccsp-exam-and-virtualization","canonicalUrl":"","搜所双发动机SEO":{"metaDescription":"To prepare for the CCSP exam, learn about virtualization, which is the process of creating software instances of actual hardware.","noIndex":0,"noFollow":0},"content":"Domain 3, which includes cloud platform and infrastructure security, represents 17 percent of the <a href=\"//coursofppt.com/article/academics-the-arts/study-skills-test-prep/ccsp/ccsp-for-dummies-cheat-sheet-273450/\">CCSP certification exam</a>. <em>Virtualization</em> is the process of creating software instances of actual hardware. VMs, for example, are software instances of actual computers. Software-Defined Networks are virtualized networks. Nowadays, you can pretty much find any traditional hardware available as a virtualized solution.\r\n\r\nVirtualization is the secret sauce behind cloud computing, as it allows a single piece of hardware to be shared by multiple customers. Concepts like multitenancy and resource pooling would not exist as they do today — and you wouldn’t be reading this book — if it weren’t for the advent of virtualization!\r\n\r\nVirtualization offers many clear benefits. Following is a list of some of the most noteworthy:\r\n<ul>\r\n \t<li><strong>Increases scalability:</strong> Virtualized environments are designed to grow as your demand grows. Instead of buying new hardware, you simply spin up additional virtual instances.</li>\r\n \t<li><strong>Allows faster resource provisioning:</strong> It’s much quicker and easier to spin up virtualized hardware from a console than it is to physically boot-up multiple pieces of hardware.</li>\r\n \t<li><strong>Reduces downtime:</strong> Restoring or redeploying physical hardware takes a lot of time, especially at scale. Failover for virtualized resources can happen much more quickly, which means your systems remain up and running longer.</li>\r\n \t<li><strong>Avoids vendor lock-in:</strong> Virtualization abstracts software from hardware, meaning your virtualized resources are more portable than their physical counterparts. Unhappy with your vendor? Pack up your VMs and move to another one!</li>\r\n \t<li><strong>Saves</strong> <strong>time (and money):</strong> Virtualized resources can be easily centrally managed, reducing the need for personnel and equipment to maintain your infrastructure. In addition, less hardware usually means less money.</li>\r\n</ul>\r\nThe preceding list reiterates why virtualization is such a critical technology and reminds you of the deep connection between virtualization and cloud computing.\r\n\r\nThe most common implementation of virtualization is the hypervisor. A hypervisor is a computing layer that allows multiple guest Operating Systems to run on a single physical host device. The following figure shows an overview of hypervisor architecture.\r\n\r\n[caption id=\"attachment_274169\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274169\" src=\"//coursofppt.com/wp-content/uploads/ccsp-virtualization.jpg\" alt=\"hypervisor\" width=\"556\" height=\"404\" /> Hypervisor overview.[/caption]\r\n\r\nThe hypervisor abstracts software from hardware and allows each of the guest OSes to share the host’s hardware resources, while giving the guests the impression that they’re all alone on that host. The two categories of hypervisors are Type 1 and Type 2. A Type 1 hypervisor is also known as a bare metal hypervisor, as it runs directly on the hardware. Type 2 hypervisors, however, run on the host’s Operating System. This figure shows a comparison of the two.\r\n\r\n[caption id=\"attachment_274168\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274168\" src=\"//coursofppt.com/wp-content/uploads/ccsp-hypervisor-comparison.jpg\" alt=\"hypervisor comparison\" width=\"556\" height=\"541\" /> Type 1 versus Type 2 hypervisors.[/caption]\r\n\r\nDespite all the advantages of virtualization, and hypervisors specifically, you, as a CCSP candidate, should remember some challenges:\r\n<ul>\r\n \t<li><strong>Hypervisor security:</strong> The hypervisor is an additional piece of software, hardware, or firmware that sits between the host and each guest. As a result, it expands the attack surface and comes with its own set of vulnerabilities that the good guys must discover and patch before the bad guys get to them. If not fixed, hypervisor flaws can lead to external attacks on VMs or even VM-to-VM attacks, where one cloud tenant can access or compromise another tenant’s data.</li>\r\n \t<li><strong>VM security:</strong> Virtual machines are nothing more than files that sit on a disk or other storage mechanism. Imagine your entire home computer wrapped up into a single icon that sits on your desktop — that’s pretty much what a virtual machine comes down to. If not sufficiently protected, a VM image is susceptible to compromise while dormant or offline. Use controls like Access Control Lists (ACLs), encryption, and hashing to protect the confidentiality and integrity of your VM files.</li>\r\n \t<li><strong>Network security:</strong> Network traffic within virtualized environments cannot be monitored and protected by physical security controls, such as network-based intrusion detection systems. You must select appropriate tools to monitor inter- and intra-VM network traffic.</li>\r\n</ul>\r\n<p class=\"article-tips tech\">The concept of <em>virtual machine introspection</em> (VMI) allows a hypervisor to monitor its guest Operating Systems during runtime. Not all hypervisors are capable of VMI, but it’s a technique that can prove invaluable for securing VMs during operation.</p>\r\n\r\n<ul>\r\n \t<li><strong>Resource utilization:</strong> If not properly configured, a single VM can exhaust a host’s resources, leaving other VMs out of luck. Resource utilization is where the concept of limits (discussed in the “Reservations, limits, and shares” section of this chapter) comes in handy. It’s essential that you manage VMs as if they share a pool of resources — because they do!</li>\r\n</ul>","description":"Domain 3, which includes cloud platform and infrastructure security, represents 17 percent of the <a href=\"//coursofppt.com/article/academics-the-arts/study-skills-test-prep/ccsp/ccsp-for-dummies-cheat-sheet-273450/\">CCSP certification exam</a>. <em>Virtualization</em> is the process of creating software instances of actual hardware. VMs, for example, are software instances of actual computers. Software-Defined Networks are virtualized networks. Nowadays, you can pretty much find any traditional hardware available as a virtualized solution.\r\n\r\nVirtualization is the secret sauce behind cloud computing, as it allows a single piece of hardware to be shared by multiple customers. Concepts like multitenancy and resource pooling would not exist as they do today — and you wouldn’t be reading this book — if it weren’t for the advent of virtualization!\r\n\r\nVirtualization offers many clear benefits. Following is a list of some of the most noteworthy:\r\n<ul>\r\n \t<li><strong>Increases scalability:</strong> Virtualized environments are designed to grow as your demand grows. Instead of buying new hardware, you simply spin up additional virtual instances.</li>\r\n \t<li><strong>Allows faster resource provisioning:</strong> It’s much quicker and easier to spin up virtualized hardware from a console than it is to physically boot-up multiple pieces of hardware.</li>\r\n \t<li><strong>Reduces downtime:</strong> Restoring or redeploying physical hardware takes a lot of time, especially at scale. Failover for virtualized resources can happen much more quickly, which means your systems remain up and running longer.</li>\r\n \t<li><strong>Avoids vendor lock-in:</strong> Virtualization abstracts software from hardware, meaning your virtualized resources are more portable than their physical counterparts. Unhappy with your vendor? Pack up your VMs and move to another one!</li>\r\n \t<li><strong>Saves</strong> <strong>time (and money):</strong> Virtualized resources can be easily centrally managed, reducing the need for personnel and equipment to maintain your infrastructure. In addition, less hardware usually means less money.</li>\r\n</ul>\r\nThe preceding list reiterates why virtualization is such a critical technology and reminds you of the deep connection between virtualization and cloud computing.\r\n\r\nThe most common implementation of virtualization is the hypervisor. A hypervisor is a computing layer that allows multiple guest Operating Systems to run on a single physical host device. The following figure shows an overview of hypervisor architecture.\r\n\r\n[caption id=\"attachment_274169\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274169\" src=\"//coursofppt.com/wp-content/uploads/ccsp-virtualization.jpg\" alt=\"hypervisor\" width=\"556\" height=\"404\" /> Hypervisor overview.[/caption]\r\n\r\nThe hypervisor abstracts software from hardware and allows each of the guest OSes to share the host’s hardware resources, while giving the guests the impression that they’re all alone on that host. The two categories of hypervisors are Type 1 and Type 2. A Type 1 hypervisor is also known as a bare metal hypervisor, as it runs directly on the hardware. Type 2 hypervisors, however, run on the host’s Operating System. This figure shows a comparison of the two.\r\n\r\n[caption id=\"attachment_274168\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274168\" src=\"//coursofppt.com/wp-content/uploads/ccsp-hypervisor-comparison.jpg\" alt=\"hypervisor comparison\" width=\"556\" height=\"541\" /> Type 1 versus Type 2 hypervisors.[/caption]\r\n\r\nDespite all the advantages of virtualization, and hypervisors specifically, you, as a CCSP candidate, should remember some challenges:\r\n<ul>\r\n \t<li><strong>Hypervisor security:</strong> The hypervisor is an additional piece of software, hardware, or firmware that sits between the host and each guest. As a result, it expands the attack surface and comes with its own set of vulnerabilities that the good guys must discover and patch before the bad guys get to them. If not fixed, hypervisor flaws can lead to external attacks on VMs or even VM-to-VM attacks, where one cloud tenant can access or compromise another tenant’s data.</li>\r\n \t<li><strong>VM security:</strong> Virtual machines are nothing more than files that sit on a disk or other storage mechanism. Imagine your entire home computer wrapped up into a single icon that sits on your desktop — that’s pretty much what a virtual machine comes down to. If not sufficiently protected, a VM image is susceptible to compromise while dormant or offline. Use controls like Access Control Lists (ACLs), encryption, and hashing to protect the confidentiality and integrity of your VM files.</li>\r\n \t<li><strong>Network security:</strong> Network traffic within virtualized environments cannot be monitored and protected by physical security controls, such as network-based intrusion detection systems. You must select appropriate tools to monitor inter- and intra-VM network traffic.</li>\r\n</ul>\r\n<p class=\"article-tips tech\">The concept of <em>virtual machine introspection</em> (VMI) allows a hypervisor to monitor its guest Operating Systems during runtime. Not all hypervisors are capable of VMI, but it’s a technique that can prove invaluable for securing VMs during operation.</p>\r\n\r\n<ul>\r\n \t<li><strong>Resource utilization:</strong> If not properly configured, a single VM can exhaust a host’s resources, leaving other VMs out of luck. Resource utilization is where the concept of limits (discussed in the “Reservations, limits, and shares” section of this chapter) comes in handy. It’s essential that you manage VMs as if they share a pool of resources — because they do!</li>\r\n</ul>","blurb":"","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"primaryCategoryTaxonomy":{"categoryId":34392,"title":"CCSP","slug":"ccsp","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"}},"secondaryCategoryTaxonomy":{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"}},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":274173,"title":"The Secure Software Development Lifecycle (SDLC) Process","slug":"the-secure-software-development-lifecycle-sdlc-process","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274173"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274154,"title":"CCSP: Data Security Technologies and Strategies","slug":"ccsp-data-security-technologies-and-strategies","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274154"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}},{"articleId":274120,"title":"Design Principles of Secure Cloud Computing","slug":"design-principles-of-secure-cloud-computing","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274120"}}],"fromCategory":[{"articleId":274173,"title":"The Secure Software Development Lifecycle (SDLC) Process","slug":"the-secure-software-development-lifecycle-sdlc-process","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274173"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274154,"title":"CCSP: Data Security Technologies and Strategies","slug":"ccsp-data-security-technologies-and-strategies","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274154"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}},{"articleId":274120,"title":"Design Principles of Secure Cloud Computing","slug":"design-principles-of-secure-cloud-computing","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274120"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281662,"slug":"ccsp-for-dummies-with-online-practice","isbn":"9781394212811","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"amazon":{"default":"//www.amazon.com/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/139421281X-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/ccsp-for-dummies-2nd-edition-cover-9781394212811-203x255.jpg","width":203,"height":255},"title":"CCSP For Dummies","testBankPinActivationLink":"//coursofppt.com/go/fdactivatepin","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"33440\">Arthur J. Deane</b></b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.</p>","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-65838048f0e88\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-65838048f1f74\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2024-12-20T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":274167},{"headers":{"creationTime":"2021-10-28T01:14:02+00:00","modifiedTime":"2024-12-20T20:40:13+00:00","timestamp":"2024-12-20T21:01:11+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Study Skills & Test Prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"slug":"study-skills-test-prep","categoryId":33772},{"name":"CCSP","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"},"slug":"ccsp","categoryId":34392}],"title":"The Secure Software Development Lifecycle (SDLC) Process","strippedTitle":"the secure software development lifecycle (sdlc) process","slug":"the-secure-software-development-lifecycle-sdlc-process","canonicalUrl":"","搜所双发动机SEO":{"metaDescription":"Get an overview of the Secure Software Development Lifecycle process, which you need to know to pass the CCSP certification exam.","noIndex":0,"noFollow":0},"content":"The Secure Software Development Lifecycle process is covered under Domain 4, which represents 17 percent of the CCSP certification exam. Streamlined and secure application development requires a consistent methodology and a well-defined process of getting from concept to finished product. SDLC is the series of steps that is followed to build, modify, and maintain computing software.\r\n<h2 id=\"tab1\" >Business requirements</h2>\r\nYour organization’s business requirements should be a key consideration whenever you develop new software or even when you modify existing applications. You should make sure that you have a firm understanding of your organization’s goals (overall and specific to your project) and knowledge of the end-user’s needs and expectations.\r\n\r\nIt’s important to gather input from as many stakeholders as possible as early as possible to support the success of your application. Gathering requirements from relevant leaders and business units across your organization is crucial to ensuring that you don’t waste development cycles on applications or features that don’t meet the needs of your business.\r\n\r\nThese business requirements are a critical input into the SDLC.\r\n<h2 id=\"tab2\" >SDLC phases</h2>\r\nWhile the SDLC process has multiple different variations, it most commonly includes the steps, or phases:\r\n<ul>\r\n \t<li>Planning</li>\r\n \t<li>Defining</li>\r\n \t<li>Designing</li>\r\n \t<li>Developing</li>\r\n \t<li>Testing</li>\r\n \t<li>Deploying and maintaining</li>\r\n</ul>\r\n<img class=\"aligncenter size-full wp-image-301274\" src=\"//coursofppt.com/wp-content/uploads/9781394212811-cs03.jpg\" alt=\"diagram showing the software development lifecyle overview\" width=\"394\" height=\"400\" />\r\n<p class=\"article-tips tip\">There’s a good chance that you will see at least one question related to the SDLC on your exam. Remember that the titles of each phase may vary slightly from one methodology to the next, but make sure that you have a strong understanding of the overall flow and the order of operations.</p>\r\n<p class=\"article-tips remember\">Although none of the stages specifically reference security, it is important that you consider security at each and every step of the SDLC process. Waiting until later stages of the process can introduce unnecessary security risks, which can add unforeseen costs and extend your project timeline.</p>\r\n\r\n<h3>SDLC Planning phase</h3>\r\nThe Planning phase is the most fundamental stage of the SDLC and is sometimes called Requirements Gathering. During this initial phase, the project scope is established and high-level requirements are gathered to support the remaining lifecycle phases. The project team should work with senior leadership and all project stakeholders to create the overall project timeline and identify project costs and resources required.\r\n\r\nDuring the Planning phase, you must consider all requirements and desired features and conduct a cost-benefit analysis to determine the potential financial impact versus the proposed value to the end-user. Using all the information that you gather during this phase, you should then validate the economic and technical feasibility of proceeding with the project.\r\n\r\nThe Planning phase is where risks should initially be identified. Your project team should consider what may go wrong and how you can mitigate, or lower, the impact of those risks. For example, imagine that you’re building an online banking application. As part of the Planning phase, you should not only consider all functional requirements of such an application, but also security and compliance requirements, such as satisfying PCI DSS. Consider what risks currently exist within your organization (or your cloud environment) that might get in the way of demonstrating PCI DSS and then plan ways to address those risks.\r\n<h3>SDLC Defining phase</h3>\r\nYou may also see this phase referred to as Requirements Analysis. During the Defining phase, you use all the business requirements, feasibility studies, and stakeholder input from the Planning phase to document clearly defined product requirements. Your product requirements should provide full details of the specific features and functionality of your proposed application. These requirements will ultimately feed your design decisions, so it needs to be as thorough as possible.\r\n\r\nIn addition, during this phase you must define the specific hardware and software requirements required for your development team — identify what type of dev environment is needed, designate your programming language, and define all technical resources needed to complete the project.\r\n<p class=\"article-tips tip\">This phase is where you should specifically define all your application security requirements and identify the tools and resources necessary to develop those accordingly. You should be thinking about where encryption is required, what type of access control features are needed, and what requirements you have for maintaining your code’s integrity.</p>\r\n\r\n<h3>SDLC Designing phase</h3>\r\nThe Designing phase is where you take your product requirements and software specifications and turn them into an actual design plan, often called a <em>design specification document</em>. This design plan is then used during the next phase to guide the actual development and implementation of your application.\r\n\r\nDuring the Designing phase, your developers, systems architects, and other technical staff create the high-level system and software design to meet each identified requirement. Your mission during this phase is to design the overall software architecture and create a plan that identifies the technical details of your application’s design. In cloud development, this phase includes defining the required amount of CPU cores, RAM, and bandwidth, while also identifying which cloud services are required for full functionality of your application. This component is critical because it may identify a need for your organization to provision additional cloud resources. Your design should define all software components that need to be created, interconnections with third-party systems, the front-end user interface, and all data flows (both within the application and between users and the application).\r\n\r\nAt this stage of the SDLC, you should also conduct threat modeling exercises and integrate your risk mitigation decisions (from the Planning phase) into your formal designs. In other words, you want to fully identify potential risks.\r\n<h3>SDLC Developing phase</h3>\r\nSoftware developers, rejoice! After weeks or even months of project planning, you can finally write some code! During this phase of the SDLC, your development team breaks up the work documented in previous steps into pieces (or modules) that are coded individually. Database developers create the required data storage architecture, front-end developers create the interface that users will interact with, and back-end developers code all the behind-the-scenes inner-workings of the application. This phase is typically the longest of the SDLC, but if the previous steps are followed carefully, it can be the least complicated part of the whole process.\r\n\r\nDuring this phase, developers should conduct peer reviews of each other’s code to check for flaws, and each individual module should be unit tested to verify its functionality prior to being rolled into the larger project. Some development teams skip this part and struggle mightily to debug flaws once an application is completed.\r\n\r\nIn addition to conducting functional testing of each module, the time is right to begin security testing. Your organization should conduct static code analysis and security scanning of each module before integration into the project. Failure to do so may allow individual software vulnerabilities to get lost in the overall codebase, and multiple individual security flaws may combine to present a larger aggregate risk, or combined risk.\r\n<h3>SDLA Testing phase</h3>\r\nOnce the code is fully developed, the application enters the Testing phase. During this phase, application testers seek to verify whether the application functions as desired and according to the documented requirements; the ultimate goal here is to uncover all flaws within the application and report those flaws to the developers for patching. This cyclical process continues until all product requirements have been validated and all flaws have been fixed.\r\n\r\nAs a completed application, security testers have more tools at their disposal to uncover security flaws. Instead of relying solely on static code analysis, testers can use dynamic analysis to identify flaws that occur only when the code is executed.\r\n<p class=\"article-tips tip\">The Testing phase is one of the most crucial phases of the SDLC, as it is the main gate between your development team and customers. Testing should be conducted in accordance with an application testing plan that identifies what and how to test. Management and relevant stakeholders should carefully review and approve your testing plan before testing begins.</p>\r\n\r\n<h3>Deploying and maintaining</h3>\r\nOnce the application has passed the Testing phase, it is ready to be deployed for customer use. There are often multiple stages of deployment (Alpha, Beta, and General Availability are common ones), each with its own breadth of deployment (for example, alpha releases tend to be deployed to select customers, whereas general availability means it’s ready for everyone).\r\n\r\nOnce applications have been tested and successfully deployed, they enter a maintenance phase where they’re continually monitored and updated. During the Maintaining phase, the production software undergoes an ongoing cycle of the SDLC process, where security patches and other updates go through the same planning, defining, designing, developing, testing, and deploying activities discussed in the preceding sections.\r\n\r\nMany SDLC models include a separate phase for disposal or termination, which happens when an application is no longer needed or supported. From a security perspective, you should keep in mind that data (including portions of applications) may remain in cloud environments even after deletion. Consult your contracts and SLAs for commitments that your CSP makes for data deletion.\r\n<h2 id=\"tab3\" >Methodologies</h2>\r\nAlthough the steps within the SDLC remain largely constant, several SDLC methodologies, or models, exist, and each approaches these steps in slightly different ways. Two of the most commonly referenced and used methodologies are waterfall and agile.\r\n<h3>Waterfall</h3>\r\n<em>Waterfall</em> is the oldest and most straightforward SDLC methodology. In this model, you complete one phase and then continue on to the next — you move in sequential order, flowing through every step of the cycle from beginning to end. Each phase of this model relies on successful completion of the previous phase; there’s no going back, because... well, because waterfalls don’t flow up.\r\n\r\nSome advantages of the waterfall methodology include\r\n<ul>\r\n \t<li>It’s simple to manage and easy to follow.</li>\r\n \t<li>Tracking and measuring progress is easy because you have a clearly defined end state early on.</li>\r\n \t<li>The measure twice, cut once approach allows applications to be developed based upon a more complete understanding of all requirements and deliverables from the start.</li>\r\n \t<li>The process can largely occur without customer intervention after requirements are initially gathered. Customers and developers agree on desired outcomes early in the project.</li>\r\n</ul>\r\nSome challenges that come with waterfall include\r\n<ul>\r\n \t<li>It’s rigid. Requirements must be fully developed early in the process and are difficult to change once the design has been completed.</li>\r\n \t<li>Products may take longer to deliver compared to more iterative models, like agile.</li>\r\n \t<li>It relies very little on the customer or end-user, which may make some customers feel left out.</li>\r\n \t<li>Testing is delayed until late in the process, which may allow small issues to build up into larger ones before they’re detected.</li>\r\n</ul>\r\n<h3>Agile</h3>\r\n<em>Agile</em> is more of the new kid on the block, having been introduced in the 1990s. In this model, instead of proceeding in a linear and sequential fashion, development and testing activities occur simultaneously and cyclically.\r\n\r\nApplication development is separated into <em>sprints</em> that produce a succession of releases that each improves upon the previous release. With the agile model, the goal is to move quickly and to fail fast — create your first release, test it, fix it, and create your next release fast!\r\n\r\nSome advantages of the agile methodology include\r\n<ul>\r\n \t<li>It’s flexible. You can move from one phase to the next without worrying that the previous phase isn’t perfect or complete.</li>\r\n \t<li>Time to market is much quicker than waterfall.</li>\r\n \t<li>It’s very user-focused; the customer has frequent opportunities to give feedback on the application.</li>\r\n \t<li>Risks may be reduced because the iterative nature of agile allows you get feedback and conduct testing early and often.</li>\r\n</ul>\r\nSome challenges that come with Agile include\r\n<ul>\r\n \t<li>It can be challenging to apply in real-life projects, especially larger projects with many stakeholders and components.</li>\r\n \t<li>The product end-state is less predictable than waterfall. With agile, you iterate until you’re happy with the result.</li>\r\n \t<li>It requires a very high level of collaboration and frequent communication between developers, customers, and other stakeholders. This challenge can be a pro, but sometimes has a negative impact on developers and project timelines.</li>\r\n</ul>","description":"The Secure Software Development Lifecycle process is covered under Domain 4, which represents 17 percent of the CCSP certification exam. Streamlined and secure application development requires a consistent methodology and a well-defined process of getting from concept to finished product. SDLC is the series of steps that is followed to build, modify, and maintain computing software.\r\n<h2 id=\"tab1\" >Business requirements</h2>\r\nYour organization’s business requirements should be a key consideration whenever you develop new software or even when you modify existing applications. You should make sure that you have a firm understanding of your organization’s goals (overall and specific to your project) and knowledge of the end-user’s needs and expectations.\r\n\r\nIt’s important to gather input from as many stakeholders as possible as early as possible to support the success of your application. Gathering requirements from relevant leaders and business units across your organization is crucial to ensuring that you don’t waste development cycles on applications or features that don’t meet the needs of your business.\r\n\r\nThese business requirements are a critical input into the SDLC.\r\n<h2 id=\"tab2\" >SDLC phases</h2>\r\nWhile the SDLC process has multiple different variations, it most commonly includes the steps, or phases:\r\n<ul>\r\n \t<li>Planning</li>\r\n \t<li>Defining</li>\r\n \t<li>Designing</li>\r\n \t<li>Developing</li>\r\n \t<li>Testing</li>\r\n \t<li>Deploying and maintaining</li>\r\n</ul>\r\n<img class=\"aligncenter size-full wp-image-301274\" src=\"//coursofppt.com/wp-content/uploads/9781394212811-cs03.jpg\" alt=\"diagram showing the software development lifecyle overview\" width=\"394\" height=\"400\" />\r\n<p class=\"article-tips tip\">There’s a good chance that you will see at least one question related to the SDLC on your exam. Remember that the titles of each phase may vary slightly from one methodology to the next, but make sure that you have a strong understanding of the overall flow and the order of operations.</p>\r\n<p class=\"article-tips remember\">Although none of the stages specifically reference security, it is important that you consider security at each and every step of the SDLC process. Waiting until later stages of the process can introduce unnecessary security risks, which can add unforeseen costs and extend your project timeline.</p>\r\n\r\n<h3>SDLC Planning phase</h3>\r\nThe Planning phase is the most fundamental stage of the SDLC and is sometimes called Requirements Gathering. During this initial phase, the project scope is established and high-level requirements are gathered to support the remaining lifecycle phases. The project team should work with senior leadership and all project stakeholders to create the overall project timeline and identify project costs and resources required.\r\n\r\nDuring the Planning phase, you must consider all requirements and desired features and conduct a cost-benefit analysis to determine the potential financial impact versus the proposed value to the end-user. Using all the information that you gather during this phase, you should then validate the economic and technical feasibility of proceeding with the project.\r\n\r\nThe Planning phase is where risks should initially be identified. Your project team should consider what may go wrong and how you can mitigate, or lower, the impact of those risks. For example, imagine that you’re building an online banking application. As part of the Planning phase, you should not only consider all functional requirements of such an application, but also security and compliance requirements, such as satisfying PCI DSS. Consider what risks currently exist within your organization (or your cloud environment) that might get in the way of demonstrating PCI DSS and then plan ways to address those risks.\r\n<h3>SDLC Defining phase</h3>\r\nYou may also see this phase referred to as Requirements Analysis. During the Defining phase, you use all the business requirements, feasibility studies, and stakeholder input from the Planning phase to document clearly defined product requirements. Your product requirements should provide full details of the specific features and functionality of your proposed application. These requirements will ultimately feed your design decisions, so it needs to be as thorough as possible.\r\n\r\nIn addition, during this phase you must define the specific hardware and software requirements required for your development team — identify what type of dev environment is needed, designate your programming language, and define all technical resources needed to complete the project.\r\n<p class=\"article-tips tip\">This phase is where you should specifically define all your application security requirements and identify the tools and resources necessary to develop those accordingly. You should be thinking about where encryption is required, what type of access control features are needed, and what requirements you have for maintaining your code’s integrity.</p>\r\n\r\n<h3>SDLC Designing phase</h3>\r\nThe Designing phase is where you take your product requirements and software specifications and turn them into an actual design plan, often called a <em>design specification document</em>. This design plan is then used during the next phase to guide the actual development and implementation of your application.\r\n\r\nDuring the Designing phase, your developers, systems architects, and other technical staff create the high-level system and software design to meet each identified requirement. Your mission during this phase is to design the overall software architecture and create a plan that identifies the technical details of your application’s design. In cloud development, this phase includes defining the required amount of CPU cores, RAM, and bandwidth, while also identifying which cloud services are required for full functionality of your application. This component is critical because it may identify a need for your organization to provision additional cloud resources. Your design should define all software components that need to be created, interconnections with third-party systems, the front-end user interface, and all data flows (both within the application and between users and the application).\r\n\r\nAt this stage of the SDLC, you should also conduct threat modeling exercises and integrate your risk mitigation decisions (from the Planning phase) into your formal designs. In other words, you want to fully identify potential risks.\r\n<h3>SDLC Developing phase</h3>\r\nSoftware developers, rejoice! After weeks or even months of project planning, you can finally write some code! During this phase of the SDLC, your development team breaks up the work documented in previous steps into pieces (or modules) that are coded individually. Database developers create the required data storage architecture, front-end developers create the interface that users will interact with, and back-end developers code all the behind-the-scenes inner-workings of the application. This phase is typically the longest of the SDLC, but if the previous steps are followed carefully, it can be the least complicated part of the whole process.\r\n\r\nDuring this phase, developers should conduct peer reviews of each other’s code to check for flaws, and each individual module should be unit tested to verify its functionality prior to being rolled into the larger project. Some development teams skip this part and struggle mightily to debug flaws once an application is completed.\r\n\r\nIn addition to conducting functional testing of each module, the time is right to begin security testing. Your organization should conduct static code analysis and security scanning of each module before integration into the project. Failure to do so may allow individual software vulnerabilities to get lost in the overall codebase, and multiple individual security flaws may combine to present a larger aggregate risk, or combined risk.\r\n<h3>SDLA Testing phase</h3>\r\nOnce the code is fully developed, the application enters the Testing phase. During this phase, application testers seek to verify whether the application functions as desired and according to the documented requirements; the ultimate goal here is to uncover all flaws within the application and report those flaws to the developers for patching. This cyclical process continues until all product requirements have been validated and all flaws have been fixed.\r\n\r\nAs a completed application, security testers have more tools at their disposal to uncover security flaws. Instead of relying solely on static code analysis, testers can use dynamic analysis to identify flaws that occur only when the code is executed.\r\n<p class=\"article-tips tip\">The Testing phase is one of the most crucial phases of the SDLC, as it is the main gate between your development team and customers. Testing should be conducted in accordance with an application testing plan that identifies what and how to test. Management and relevant stakeholders should carefully review and approve your testing plan before testing begins.</p>\r\n\r\n<h3>Deploying and maintaining</h3>\r\nOnce the application has passed the Testing phase, it is ready to be deployed for customer use. There are often multiple stages of deployment (Alpha, Beta, and General Availability are common ones), each with its own breadth of deployment (for example, alpha releases tend to be deployed to select customers, whereas general availability means it’s ready for everyone).\r\n\r\nOnce applications have been tested and successfully deployed, they enter a maintenance phase where they’re continually monitored and updated. During the Maintaining phase, the production software undergoes an ongoing cycle of the SDLC process, where security patches and other updates go through the same planning, defining, designing, developing, testing, and deploying activities discussed in the preceding sections.\r\n\r\nMany SDLC models include a separate phase for disposal or termination, which happens when an application is no longer needed or supported. From a security perspective, you should keep in mind that data (including portions of applications) may remain in cloud environments even after deletion. Consult your contracts and SLAs for commitments that your CSP makes for data deletion.\r\n<h2 id=\"tab3\" >Methodologies</h2>\r\nAlthough the steps within the SDLC remain largely constant, several SDLC methodologies, or models, exist, and each approaches these steps in slightly different ways. Two of the most commonly referenced and used methodologies are waterfall and agile.\r\n<h3>Waterfall</h3>\r\n<em>Waterfall</em> is the oldest and most straightforward SDLC methodology. In this model, you complete one phase and then continue on to the next — you move in sequential order, flowing through every step of the cycle from beginning to end. Each phase of this model relies on successful completion of the previous phase; there’s no going back, because... well, because waterfalls don’t flow up.\r\n\r\nSome advantages of the waterfall methodology include\r\n<ul>\r\n \t<li>It’s simple to manage and easy to follow.</li>\r\n \t<li>Tracking and measuring progress is easy because you have a clearly defined end state early on.</li>\r\n \t<li>The measure twice, cut once approach allows applications to be developed based upon a more complete understanding of all requirements and deliverables from the start.</li>\r\n \t<li>The process can largely occur without customer intervention after requirements are initially gathered. Customers and developers agree on desired outcomes early in the project.</li>\r\n</ul>\r\nSome challenges that come with waterfall include\r\n<ul>\r\n \t<li>It’s rigid. Requirements must be fully developed early in the process and are difficult to change once the design has been completed.</li>\r\n \t<li>Products may take longer to deliver compared to more iterative models, like agile.</li>\r\n \t<li>It relies very little on the customer or end-user, which may make some customers feel left out.</li>\r\n \t<li>Testing is delayed until late in the process, which may allow small issues to build up into larger ones before they’re detected.</li>\r\n</ul>\r\n<h3>Agile</h3>\r\n<em>Agile</em> is more of the new kid on the block, having been introduced in the 1990s. In this model, instead of proceeding in a linear and sequential fashion, development and testing activities occur simultaneously and cyclically.\r\n\r\nApplication development is separated into <em>sprints</em> that produce a succession of releases that each improves upon the previous release. With the agile model, the goal is to move quickly and to fail fast — create your first release, test it, fix it, and create your next release fast!\r\n\r\nSome advantages of the agile methodology include\r\n<ul>\r\n \t<li>It’s flexible. You can move from one phase to the next without worrying that the previous phase isn’t perfect or complete.</li>\r\n \t<li>Time to market is much quicker than waterfall.</li>\r\n \t<li>It’s very user-focused; the customer has frequent opportunities to give feedback on the application.</li>\r\n \t<li>Risks may be reduced because the iterative nature of agile allows you get feedback and conduct testing early and often.</li>\r\n</ul>\r\nSome challenges that come with Agile include\r\n<ul>\r\n \t<li>It can be challenging to apply in real-life projects, especially larger projects with many stakeholders and components.</li>\r\n \t<li>The product end-state is less predictable than waterfall. With agile, you iterate until you’re happy with the result.</li>\r\n \t<li>It requires a very high level of collaboration and frequent communication between developers, customers, and other stakeholders. This challenge can be a pro, but sometimes has a negative impact on developers and project timelines.</li>\r\n</ul>","blurb":"","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"primaryCategoryTaxonomy":{"categoryId":34392,"title":"CCSP","slug":"ccsp","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"}},"secondaryCategoryTaxonomy":{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"}},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"Business requirements","target":"#tab1"},{"label":"SDLC phases","target":"#tab2"},{"label":"Methodologies","target":"#tab3"}],"relatedArticles":{"fromBook":[{"articleId":274167,"title":"CCSP Exam and Virtualization","slug":"ccsp-exam-and-virtualization","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274167"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274154,"title":"CCSP: Data Security Technologies and Strategies","slug":"ccsp-data-security-technologies-and-strategies","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274154"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}},{"articleId":274120,"title":"Design Principles of Secure Cloud Computing","slug":"design-principles-of-secure-cloud-computing","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274120"}}],"fromCategory":[{"articleId":274167,"title":"CCSP Exam and Virtualization","slug":"ccsp-exam-and-virtualization","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274167"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274154,"title":"CCSP: Data Security Technologies and Strategies","slug":"ccsp-data-security-technologies-and-strategies","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274154"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}},{"articleId":274120,"title":"Design Principles of Secure Cloud Computing","slug":"design-principles-of-secure-cloud-computing","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274120"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281662,"slug":"ccsp-for-dummies-with-online-practice","isbn":"9781394212811","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"amazon":{"default":"//www.amazon.com/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/139421281X-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/ccsp-for-dummies-2nd-edition-cover-9781394212811-203x255.jpg","width":203,"height":255},"title":"CCSP For Dummies","testBankPinActivationLink":"//coursofppt.com/go/fdactivatepin","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"33440\">Arthur J. Deane</b></b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.</p>","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-65835617a6b76\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-65835617a734f\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2024-12-20T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":274173},{"headers":{"creationTime":"2021-09-16T20:48:32+00:00","modifiedTime":"2024-12-20T20:39:39+00:00","timestamp":"2024-12-20T21:01:11+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Study Skills & Test Prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"slug":"study-skills-test-prep","categoryId":33772},{"name":"CCSP","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"},"slug":"ccsp","categoryId":34392}],"title":"CCSP For Dummies Cheat Sheet","strippedTitle":"ccsp for dummies cheat sheet","slug":"ccsp-for-dummies-cheat-sheet","canonicalUrl":"","搜所双发动机SEO":{"metaDescription":"Preparing to take the CCSP exam? Get some tips on taking the exam and learn a bit about cloud computing and the Shared Responsibility Model.","noIndex":0,"noFollow":0},"content":"The Certified Cloud Security Professional (CCSP) credential is based upon a Common Body of Knowledge (CBK) jointly developed by the International Information Systems Security Certification Consortium (ISC)<sup>2</sup> and the Cloud Security Alliance (CSA).\r\n\r\nThe CBK (and the associated exam) includes six domains that cover separate, but interrelated, areas: Cloud Concepts, Architecture and Design; Cloud Data Security; Cloud Platform & Infrastructure Security; Cloud Application Security; <a href=\"//coursofppt.com/programming/certification/assess-mitigate-vulnerabilities-security-architectures-designs-solution-elements/\" target=\"_blank\" rel=\"noopener\">Cloud Security</a> Operations; and Legal, Risk and Compliance. A ton of information is in these domains, and you can use this Cheat Sheet to remember some of the most important parts.","description":"The Certified Cloud Security Professional (CCSP) credential is based upon a Common Body of Knowledge (CBK) jointly developed by the International Information Systems Security Certification Consortium (ISC)<sup>2</sup> and the Cloud Security Alliance (CSA).\r\n\r\nThe CBK (and the associated exam) includes six domains that cover separate, but interrelated, areas: Cloud Concepts, Architecture and Design; Cloud Data Security; Cloud Platform & Infrastructure Security; Cloud Application Security; <a href=\"//coursofppt.com/programming/certification/assess-mitigate-vulnerabilities-security-architectures-designs-solution-elements/\" target=\"_blank\" rel=\"noopener\">Cloud Security</a> Operations; and Legal, Risk and Compliance. A ton of information is in these domains, and you can use this Cheat Sheet to remember some of the most important parts.","blurb":"","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"primaryCategoryTaxonomy":{"categoryId":34392,"title":"CCSP","slug":"ccsp","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"}},"secondaryCategoryTaxonomy":{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"}},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":274173,"title":"The Secure Software Development Lifecycle (SDLC) Process","slug":"the-secure-software-development-lifecycle-sdlc-process","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274173"}},{"articleId":274167,"title":"CCSP Exam and Virtualization","slug":"ccsp-exam-and-virtualization","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274167"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274154,"title":"CCSP: Data Security Technologies and Strategies","slug":"ccsp-data-security-technologies-and-strategies","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274154"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}}],"fromCategory":[{"articleId":274173,"title":"The Secure Software Development Lifecycle (SDLC) Process","slug":"the-secure-software-development-lifecycle-sdlc-process","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274173"}},{"articleId":274167,"title":"CCSP Exam and Virtualization","slug":"ccsp-exam-and-virtualization","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274167"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274154,"title":"CCSP: Data Security Technologies and Strategies","slug":"ccsp-data-security-technologies-and-strategies","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274154"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281662,"slug":"ccsp-for-dummies-with-online-practice","isbn":"9781394212811","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"amazon":{"default":"//www.amazon.com/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/139421281X-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/ccsp-for-dummies-2nd-edition-cover-9781394212811-203x255.jpg","width":203,"height":255},"title":"CCSP For Dummies","testBankPinActivationLink":"//coursofppt.com/go/fdactivatepin","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"33440\">Arthur J. Deane</b></b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.</p>","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-65835617514bf\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-65835617527d3\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/"}}],"content":[{"title":"Helpful tips to prepare for the CCSP exam","thumb":null,"image":null,"content":"<p>Taking any standardized test can be a bit scary — and the CCSP is a definitely no joke! Not to worry, though. With proper preparation (like reading <em>CCSP For Dummies with Online Practice</em>) and following these key tips, you’ll be well on your way to acing the exam!</p>\n<ul>\n<li><strong>Brush up on the prerequisites.</strong> Passing the CCSP exam requires that you know a lot about information security and a lot about cloud computing. To make studying for the CCSP a little less underwhelming, make sure that you already have a strong grasp of general IT topics, like networking and databases. Having Information Security experience is also a great idea, but <em>CCSP For Dummies</em> includes a chapter dedicated to Information Security fundamentals, if you need a primer or refresher.</li>\n<li><strong>Register for exam . . . like now!</strong> It’s so easy to say, “I’ll register when I’m ready for the exam,” but setting a test date and sticking to it is a great way to stay motivated by working toward a specific goal. Worst case scenario: You can always reschedule your exam.</li>\n<li><strong>Identify your learning style.</strong> Some people learn best by reading several books cover to cover, and others like a combination of reading, classroom learning, and study groups. Set yourself up for success by identifying what works best for you and making that happen.</li>\n<li><strong>Make your study plan.</strong> Create an aggressive, yet realistic, study plan that you’ll stick to. Sixty to 90 days (in addition to your lifetime of experiences) is a good target for most people. Stay away from longer than 120-day study plans — longer periods tend to lead to shorter attention spans.</li>\n<li><strong>Practice, practice, practice.</strong> Do plenty practice questions after you read <em>CCSP For Dummies</em> and throughout your studies. Start with the practice questions that come with the book and then scour the interwebs for as many other practice sets as you can find — just make sure they’re legitimate sources!</li>\n</ul>\n"},{"title":"The Shared Responsibility Model","thumb":null,"image":null,"content":"<p>Talk about cloud computing, and the Shared Responsibility Model almost always creeps into the conversation — seriously! The Shared Responsibility is a critical concept that underlies how the cloud and cloud data is secured. When you’re studying for the CCSP, you should really understand this topic like the back of your hand.</p>\n<p>The cloud Shared Responsibility Model identifies the separate, but connected, responsibilities held by the cloud provider and the cloud customer.</p>\n<p>In general, the cloud provider is responsible for security of the cloud, while the cloud customer is responsible for “security in the cloud.” See the following figure.</p>\n<div class=\"figure-container\"><figure id=\"attachment_301272\" aria-labelledby=\"figcaption_attachment_301272\" class=\"wp-caption aligncenter\" style=\"width: 545px\"><img loading=\"lazy\" class=\"wp-image-301272 size-full\" src=\"//coursofppt.com/wp-content/uploads/9781394212811-cs01.jpg\" alt=\"diagram showing the Shared Responsibility Model overview\" width=\"535\" height=\"322\" /><figcaption id=\"figcaption_attachment_301272\" class=\"wp-caption-text\">Shared Responsibility Model overview.</figcaption></figure></div><div class=\"clearfix\"></div>\n<p>In general, the cloud provider is responsible for security of the cloud, while the cloud customer is responsible for “security in the cloud.” See the following figure.</p>\n<p>The responsibilities will be broken up differently based on the cloud service model that you’re using — IaaS, PaaS, or SaaS. See the following figure.&nbsp;</p>\n<div class=\"figure-container\"><figure id=\"attachment_301273\" aria-labelledby=\"figcaption_attachment_301273\" class=\"wp-caption aligncenter\" style=\"width: 545px\"><img loading=\"lazy\" class=\"wp-image-301273 size-full\" src=\"//coursofppt.com/wp-content/uploads/9781394212811-cs02.jpg\" alt=\"diagram showing the responsibilities by service model\" width=\"535\" height=\"393\" /><figcaption id=\"figcaption_attachment_301273\" class=\"wp-caption-text\">Responsibilities by service model.</figcaption></figure></div><div class=\"clearfix\"></div>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2023-02-18T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":273450},{"headers":{"creationTime":"2024-12-01T20:11:31+00:00","modifiedTime":"2024-12-01T20:11:31+00:00","timestamp":"2024-12-01T21:01:10+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Language & Language Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33687"},"slug":"language-language-arts","categoryId":33687},{"name":"Learning Languages","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33689"},"slug":"learning-languages","categoryId":33689},{"name":"Swahili","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/35352"},"slug":"swahili","categoryId":35352}],"title":"Swahili For Dummies Cheat Sheet","strippedTitle":"swahili for dummies cheat sheet","slug":"swahili-for-dummies-cheat-sheet","canonicalUrl":"","搜所双发动机SEO":{"metaDescription":"Learn Swahili basics with our Dummes cheat sheet - useful phrases for greetings, questions, numbers, and calendar days.","noIndex":0,"noFollow":0},"content":"<span data-contrast=\"auto\">Whether you’re planning to visit East Africa for a few days or stay long term, it’s a good idea to have some basic phrases up your sleeve to help you manage conversations in Swahili smoothly. In this cheat sheet, you’ll find useful phrases to use in greetings, asking questions, dealing with numbers, and understanding the calendar days.</span>","description":"<span data-contrast=\"auto\">Whether you’re planning to visit East Africa for a few days or stay long term, it’s a good idea to have some basic phrases up your sleeve to help you manage conversations in Swahili smoothly. In this cheat sheet, you’ll find useful phrases to use in greetings, asking questions, dealing with numbers, and understanding the calendar days.</span>","blurb":"In the Swahili For Dummies cheat sheet, you’ll find useful phrases to use in greetings, asking questions, dealing with numbers, and understanding the calendar days.","authors":[{"authorId":35353,"name":"Seline Okeno","slug":"seline-okeno","description":"<b>Seline Ayugi Okeno</b> was born and raised in Siaya, Kenya. She holds a B.Ed. Arts from Maseno University in Kenya and an M.A. in Applied Lin­guistics from Ohio University. She is currently a Swahili and English Teaching Fellow at The University of Edinburgh in Scotland.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/35353"}},{"authorId":35354,"name":"Asmaha Heddi","slug":"asmaha-heddi","description":"<b>Asmaha Heddi</b> hails from Arusha, Tanzania. She is a Kiswahili lecturer at the University of Kansas. She holds a B.A. from the University of Dar es Salaam in Tanzania and an M.A. in Applied Linguistics from Ohio University.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/35354"}}],"primaryCategoryTaxonomy":{"categoryId":35352,"title":"Swahili","slug":"swahili","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/35352"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":301260,"slug":"swahili-for-dummies","isbn":"9781394191567","categoryList":["academics-the-arts","language-language-arts","learning-languages","swahili"],"amazon":{"default":"//www.amazon.com/gp/product/1394191561/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1394191561/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1394191561-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1394191561/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1394191561/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/swahili-for-dummies-cover-9781394191567-203x255.jpg","width":203,"height":255},"title":"Swahili For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><b>Seline Ayugi Okeno</b> was born and raised in Siaya, Kenya. She holds a B.Ed. Arts from Maseno University in Kenya and an M.A. in Applied Lin­guistics from Ohio University. She is currently a Swahili and English Teaching Fellow at The University of Edinburgh in Scotland. <b><b data-author-id=\"35354\">Asmaha Heddi</b></b> hails from Arusha, Tanzania. She is a Kiswahili lecturer at the University of Kansas. She holds a B.A. from the University of Dar es Salaam in Tanzania and an M.A. in Applied Linguistics from Ohio University.</p>","authors":[{"authorId":35353,"name":"Seline Okeno","slug":"seline-okeno","description":"<b>Seline Ayugi Okeno</b> was born and raised in Siaya, Kenya. She holds a B.Ed. Arts from Maseno University in Kenya and an M.A. in Applied Lin­guistics from Ohio University. She is currently a Swahili and English Teaching Fellow at The University of Edinburgh in Scotland.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/35353"}},{"authorId":35354,"name":"Asmaha Heddi","slug":"asmaha-heddi","description":"<b>Asmaha Heddi</b> hails from Arusha, Tanzania. She is a Kiswahili lecturer at the University of Kansas. She holds a B.A. from the University of Dar es Salaam in Tanzania and an M.A. in Applied Linguistics from Ohio University.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/35354"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;language-language-arts&quot;,&quot;learning-languages&quot;,&quot;swahili&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394191567&quot;]}]\" id=\"du-slot-656a49968016e\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;language-language-arts&quot;,&quot;learning-languages&quot;,&quot;swahili&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394191567&quot;]}]\" id=\"du-slot-656a499682660\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/"}}],"content":[{"title":"Greeting in Swahili","thumb":null,"image":null,"content":"<p>Every initial social interaction in Swahili begins with a greeting and ends with a farewell. Here are some basic greetings and farewells to remember.</p>\n<table aria-rowcount=\"5\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td><b>habari?</b>(hah-bah-ree) (How are you?)</td>\n<td><b>Nzuri </b>(n-zoo-ree) (fine/well)</td>\n</tr>\n<tr aria-rowindex=\"2\">\n<td><b>hujambo? </b>(hoo-jah-mboh) (<i>How are you?</i>)</td>\n<td><b>Sijambo </b>(see-<i>jah</i>-mboh) (<i>I am fine.</i>)</td>\n</tr>\n<tr aria-rowindex=\"3\">\n<td><b>mambo? </b>(<i>mah</i>-mboh) (H<i>ow are things?)</i></td>\n<td><b>Poa </b>(<i>poh</i>-ah) (<i>great</i>)</td>\n</tr>\n<tr aria-rowindex=\"4\">\n<td><b>kwaheri </b>(kwah-<i>heh</i>-ree) (<i>goodbye</i>)</td>\n<td><b>kwaheri </b>(kwah-<i>heh</i>-ree) (<i>goodbye</i>)</td>\n</tr>\n<tr aria-rowindex=\"5\">\n<td><b>baadaye </b>(bah-ah-dah-yeh) (later)</td>\n<td><b>baadaye </b>(bah-ah-dah-yeh) (later)</td>\n</tr>\n</tbody>\n</table>\n"},{"title":"Basic Swahili questions","thumb":null,"image":null,"content":"<p>Asking questions is a great way of showing interest and getting to know someone or a place. Dive straight into conversing with Swahili speakers by asking them questions about themselves and things you want to see. Start by learning the basic question words — what English speakers refer to as the W- words:</p>\n<ul>\n<li><b>nani?</b> (<i>nah</i>-nee) (<i>who?)</i></li>\n<li><b>wapi?</b> (<i>wah</i>-pee) (<i>where?)</i></li>\n<li><b>lini?</b> (<i>lee</i>-nee) (<i>where?)</i></li>\n<li><b>nini?</b> (<i>nee</i>-nee) (<i>what?)</i></li>\n<li><b>gani?</b> (<i>gah</i>-nee) (<i>which?)</i></li>\n</ul>\n<p>With those under your belt, you can start asking questions like the ones that follow:</p>\n<ul>\n<li><b>Jina lako ni nani?</b> (<i>jee</i>-nah <i>lah</i>-koh nee <i>nah</i>-nee) (<i>What is your name?</i>)</li>\n<li><b>Unatoka wapi?</b> (oo-nah-<i>toh</i>-kah <i>wah</i>-pee) (<i>Where are you from</i>?)</li>\n<li><b>Unaishi wapi?</b> (oo-nah-<i>ee</i>-shee <i>wah</i>-pee) (<i>Where do you live?)</i></li>\n<li><b>Unasema lugha gani?</b> (oo-nah-<i>seh</i>-mah <i>loo</i>-gah <i>gah</i>-nee) (<i>Which language(s) do you speak?)</i></li>\n<li><b>Unasoma nini? </b>(oo-nah-<i>soh</i>-mah <i>nee</i>-nee) <i>(What do you study?)</i></li>\n<li><b>Unafanya kazi gani?</b> (oo-nah-<i>fah</i>-nyah <i>kah</i>-zee <i>gah</i>-nee) (<i>What’s your job?)</i></li>\n<li><b>Ni saa ngapi?</b> (nee <i>sah</i>-ah <i>ngah</i>-pee) (<i>What is the time?)</i></li>\n<li><b>Posta iko wapi?</b> (<i>poh</i>-stah <i>ee</i>-koh <i>wah</i>-pee) (<i>Where’s the post office?)</i></li>\n</ul>\n"},{"title":"Swahili numbers","thumb":null,"image":null,"content":"<p>Get ready to state your phone number, exchange money, buy goods, and tell the time by practicing Swahili numbers. Here are some numbers to get you started:</p>\n<table aria-rowcount=\"18\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td><i>0 </i><b>sufuri </b>(soo-<i>foo</i>-ree)</td>\n<td>18 <b>kumi na nane </b>(<i>koo</i>-mee nah <i>nah</i>-neh)</td>\n</tr>\n<tr aria-rowindex=\"2\">\n<td>1 <b>moja </b>(<i>moh</i>-jah)</td>\n<td>19 <b>kumi na tisa </b>(<i>koo</i>-mee nah <i>tee</i>-sah)</td>\n</tr>\n<tr aria-rowindex=\"3\">\n<td>2 <b>mbili </b>(<i>mbee</i>-lee)</td>\n<td>20 <b>ishirini </b>(ee-shee-<i>ree</i>-nee)</td>\n</tr>\n<tr aria-rowindex=\"4\">\n<td>3 <b>tatu </b>(<i>tah</i>-too)</td>\n<td>21 <b>ishirini na moja</b>(ee-shee-<i>ree</i>-nee nah <i>moh</i>-jah)</td>\n</tr>\n<tr aria-rowindex=\"5\">\n<td>4 <b>nne </b>(<i>n</i>-neh)</td>\n<td>22 <b>ishirini na mbili </b>(ee-shee-<i>ree</i>-nee nah m-<i>bee</i>-lee)</td>\n</tr>\n<tr aria-rowindex=\"6\">\n<td>5 <b>tano </b>(<i>tah</i>-no)</td>\n<td></td>\n</tr>\n<tr aria-rowindex=\"7\">\n<td>6<b> sita</b> (<i>see</i>-tah)</td>\n<td>30 <b>thelathini</b> (theh-lah-<i>thee</i>-nee)</td>\n</tr>\n<tr aria-rowindex=\"8\">\n<td>7 <b>saba </b>(<i>sah</i>-bah)</td>\n<td>40 <b>arobaini </b>(ah-roh-bah-<i>ee</i>-nee)</td>\n</tr>\n<tr aria-rowindex=\"9\">\n<td>8 <b>nane </b>(<i>na</i>-neh)</td>\n<td>50 <b>hamsini </b>(ham-<i>see</i>-nee)</td>\n</tr>\n<tr aria-rowindex=\"10\">\n<td>9 <b>tisa </b>(<i>tee</i>-sah)</td>\n<td>60 <b>sitini</b> (see-<i>tee</i>-nee)</td>\n</tr>\n<tr aria-rowindex=\"11\">\n<td>10 <b>kumi </b>(<i>koo</i>-mee)</td>\n<td>70 <b>sabini</b> (sah-<i>bee</i>-nee)</td>\n</tr>\n<tr aria-rowindex=\"12\">\n<td>11 <b>kumi na moja </b>(<i>koo</i>-mee nah <i>moh</i>-jah)</td>\n<td>80 <b>themanini</b> (theh-mah-<i>nee</i>-nee)</td>\n</tr>\n<tr aria-rowindex=\"13\">\n<td>12 <b>kumi na mbili </b>(<i>koo</i>-mee nah m-<i>bee</i>-lee)</td>\n<td>90 <b>tisini</b> (tee-<i>see</i>-nee)</td>\n</tr>\n<tr aria-rowindex=\"14\">\n<td>13 <b>kumi na tatu </b>(<i>koo</i>-mee nah ta<i>h</i>-too)</td>\n<td>100 <b>mia moja</b> (<i>mee</i>-ah <i>moh</i>-jah)</td>\n</tr>\n<tr aria-rowindex=\"15\">\n<td>14 <b>kumi na nne </b>(<i>koo</i>-mee nah <i>n</i>-neh)</td>\n<td>1000 <b>elfu moja</b> <i>(ehl</i>-foo <i>moh</i>-jah)</td>\n</tr>\n<tr aria-rowindex=\"16\">\n<td>15 <b>kumi na tano </b>(<i>koo</i>-mee nah <i>tah</i>-jah)</td>\n<td>10,000 <b>elfu kumi</b> (<i>ehl</i>-foo <i>koo</i>-mee)</td>\n</tr>\n<tr aria-rowindex=\"17\">\n<td>16 <b>kumi na sita </b>(<i>koo</i>-mee nah <i>see</i>-tah)</td>\n<td>100,000 <b>laki moja</b> (<i>lah</i>-kee <i>moh</i>-jah)</td>\n</tr>\n<tr aria-rowindex=\"18\">\n<td>17 <b>kumi na saba </b>(<i>koo</i>-mee nah <i>sah</i>-bah)</td>\n<td>1,000,000 <b>milioni moja</b> (mee-lee-<i>oh-</i>nee <i>moh</i>-jah)</td>\n</tr>\n</tbody>\n</table>\n"},{"title":"The Swahili calendar ","thumb":null,"image":null,"content":"<p>To make sure you don’t miss any of your crucial appointments, be sure to learn the basics of the Swahili calendar. Here are the Swahili days of the week as well as the months of the year to help you.</p>\n<h3>Weekdays</h3>\n<ul>\n<li><b>Jumamosi</b> (joo-mah-<i>moh</i>-see) (<i>Saturday)</i></li>\n<li><b>Jumapili </b>(joo-mah-<i>pee</i>-lee) (<i>Sunday)</i></li>\n<li><b>Jumatatu</b> (joo-mah-<i>tah</i>-too) (<i>Monday)</i></li>\n<li><b>Jumanne</b> (joo-mah-<i>n</i>-neh) (<i>Tuesday</i></li>\n<li><b>Jumatano</b> (joo-mah-<i>tah</i>-noh) (<i>Wednesday</i></li>\n<li><b>Alhamisi</b> (al-hah-<i>mee</i>-see) (<i>Thursday)</i></li>\n<li><b>Ijumaa</b> (ee-joo-<i>mah</i>-ah) (<i>Friday)</i></li>\n</ul>\n<h3>Months</h3>\n<ul>\n<li><b>mwezi wa kwanza</b> (m-<i>weh</i>-zee wah kwah-<i>n</i>-zah) (<i>January)</i></li>\n<li><b>mwezi wa pili</b> (m-<i>weh</i>-zee wah <i>pee</i>-lee) (<i>February)</i></li>\n<li><b>mwezi wa tatu</b> (m-<i>weh</i>-zee wah <i>tah</i>-too) (<i>March)</i></li>\n<li><b>mwezi wa nne</b> (m-<i>weh</i>-zee wah <i>n</i>-neh) (<i>April)</i></li>\n<li><b>mwezi wa tano</b> (m-<i>weh</i>-zee wah <i>tah</i>-noh) (<i>May)</i></li>\n<li><b>mwezi wa sita</b> (m-<i>weh</i>-zee wah <i>see</i>-ta) (<i>June)</i></li>\n<li><b>mwezi wa saba</b> (m-<i>weh</i>-zee wah <i>sah</i>-bah) (<i>July)</i></li>\n<li><b>mwezi wa nane</b> (m-<i>weh</i>-zee wah<i> nah</i>-neh) (<i>August)</i></li>\n<li><b>mwezi wa tisa</b> (m-<i>weh</i>-zee wah <i>tee</i>-sa) (<i>September)</i></li>\n<li><b>mwezi wa kumi</b> (m-<i>weh</i>-zee wah <i>koo</i>-mee) (<i>October)</i></li>\n<li><b>mwezi wa kumi na moja</b> (m-<i>weh</i>-zee wah<i> koo</i>-mee nah <i>moh</i>-jah) (<i>November)</i></li>\n<li><b>mwezi wa kumi na mbili</b> (m-<i>weh</i>-zee wah <i>koo</i>-mee nah m-<i>bee</i>-lee) (<i>December)</i></li>\n</ul>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Five years","lifeExpectancySetFrom":"2024-12-01T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":301262},{"headers":{"creationTime":"2017-03-27T16:56:42+00:00","modifiedTime":"2024-11-21T21:15:39+00:00","timestamp":"2024-11-22T00:01:10+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33756"},"slug":"science","categoryId":33756},{"name":"Genetics","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33765"},"slug":"genetics","categoryId":33765}],"title":"Genetics For Dummies Cheat Sheet","strippedTitle":"genetics for dummies cheat sheet","slug":"genetics-for-dummies-cheat-sheet","canonicalUrl":"","搜所双发动机SEO":{"metaDescription":"Use this cheat sheet to get a handle on some key genetics terms and concepts, including the structure of DNA and the laws of inheritance.","noIndex":0,"noFollow":0},"content":"Genetics is a complex field with lots of details to keep straight. But when you get a handle on some key terms and concepts, including <a href=\"//coursofppt.com/article/academics-the-arts/science/biology/how-biologists-read-a-gene-with-dna-sequencing-169067/\">the structure of DNA</a> and the laws of inheritance, you can start putting the pieces together for a better understanding of genetics.","description":"Genetics is a complex field with lots of details to keep straight. But when you get a handle on some key terms and concepts, including <a href=\"//coursofppt.com/article/academics-the-arts/science/biology/how-biologists-read-a-gene-with-dna-sequencing-169067/\">the structure of DNA</a> and the laws of inheritance, you can start putting the pieces together for a better understanding of genetics.","blurb":"","authors":[{"authorId":9201,"name":"Rene Fester Kratz","slug":"rene-fester-kratz","description":"<p><b>René Fester Kratz, PhD</b>, teaches cell biology and microbiology at Everett Community College. Kratz is the author of <i>Molecular &amp; Cell Biology For Dummies</i>, <i>Biology For Dummies</i>, and <i>Biology Essentials For Dummies</i>.</p>","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9201"}},{"authorId":33264,"name":"Lisa Spock","slug":"lisa-spock","description":"<p><b>Lisa J. Spock, PhD, CGC</b>, is a clinical genomics specialist. Previously, she was a genetic counselor at Indiana University School of Medicine.</p>","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33264"}}],"primaryCategoryTaxonomy":{"categoryId":33765,"title":"Genetics","slug":"genetics","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33765"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":267900,"title":"Gene Editing","slug":"gene-editing","categoryList":["academics-the-arts","science","genetics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/267900"}},{"articleId":267897,"title":"Genetically Modified Organisms: Animals, Plants, Bacteria","slug":"genetically-modified-organisms-animals-plants-bacteria","categoryList":["academics-the-arts","science","genetics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/267897"}},{"articleId":267894,"title":"What are Transgenic Organisms?","slug":"what-are-transgenic-organisms","categoryList":["academics-the-arts","science","genetics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/267894"}},{"articleId":267891,"title":"10 Defining Events in Genetics","slug":"10-defining-events-in-genetics","categoryList":["academics-the-arts","science","genetics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/267891"}},{"articleId":267874,"title":"10 Hot Issues in Genetics","slug":"10-hot-issues-in-genetics","categoryList":["academics-the-arts","science","genetics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/267874"}}],"fromCategory":[{"articleId":267900,"title":"Gene Editing","slug":"gene-editing","categoryList":["academics-the-arts","science","genetics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/267900"}},{"articleId":267897,"title":"Genetically Modified Organisms: Animals, Plants, Bacteria","slug":"genetically-modified-organisms-animals-plants-bacteria","categoryList":["academics-the-arts","science","genetics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/267897"}},{"articleId":267894,"title":"What are Transgenic Organisms?","slug":"what-are-transgenic-organisms","categoryList":["academics-the-arts","science","genetics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/267894"}},{"articleId":267891,"title":"10 Defining Events in Genetics","slug":"10-defining-events-in-genetics","categoryList":["academics-the-arts","science","genetics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/267891"}},{"articleId":267874,"title":"10 Hot Issues in Genetics","slug":"10-hot-issues-in-genetics","categoryList":["academics-the-arts","science","genetics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/267874"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":282228,"slug":"genetics-for-dummies","isbn":"9781394210190","categoryList":["academics-the-arts","science","genetics"],"amazon":{"default":"//www.amazon.com/gp/product/1394210191/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1394210191/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1394210191-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1394210191/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1394210191/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/genetics-for-dummies-4th-edition-cover-203x255.jpg","width":203,"height":255},"title":"Genetics For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><b>René Fester Kratz, PhD</b>, teaches cell biology and microbiology at Everett Community College. Kratz is the author of <i>Molecular &amp; Cell Biology For Dummies</i>, <i>Biology For Dummies</i>, and <i>Biology Essentials For Dummies</i>.</p> <p><b>Lisa J. Spock, PhD, CGC</b>, is a clinical genomics specialist. Previously, she was a genetic counselor at Indiana University School of Medicine.</p>","authors":[{"authorId":9201,"name":"Rene Fester Kratz","slug":"rene-fester-kratz","description":"<p><b>René Fester Kratz, PhD</b>, teaches cell biology and microbiology at Everett Community College. Kratz is the author of <i>Molecular &amp; Cell Biology For Dummies</i>, <i>Biology For Dummies</i>, and <i>Biology Essentials For Dummies</i>.</p>","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9201"}},{"authorId":33264,"name":"Lisa Spock","slug":"lisa-spock","description":"<p><b>Lisa J. Spock, PhD, CGC</b>, is a clinical genomics specialist. Previously, she was a genetic counselor at Indiana University School of Medicine.</p>","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33264"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;science&quot;,&quot;genetics&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394210190&quot;]}]\" id=\"du-slot-655d44c6dd893\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;science&quot;,&quot;genetics&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394210190&quot;]}]\" id=\"du-slot-655d44c6dea6e\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":193203,"title":"The Scientific Language of Genetics","slug":"the-scientific-language-of-genetics","categoryList":["academics-the-arts","science","genetics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/193203"}},{"articleId":193202,"title":"The Structure of the Cell Nucleus and Its Chromosomes","slug":"the-structure-of-the-cell-nucleus-and-its-chromosomes","categoryList":["academics-the-arts","science","genetics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/193202"}},{"articleId":193229,"title":"Mendel’s Laws of Inheritance","slug":"mendels-laws-of-inheritance","categoryList":["academics-the-arts","science","genetics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/193229"}},{"articleId":193228,"title":"The Structure of DNA","slug":"the-structure-of-dna-2","categoryList":["academics-the-arts","science","genetics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/193228"}},{"articleId":193201,"title":"Uncover Inheritance Based on Genotype and Phenotype Ratios","slug":"uncover-inheritance-based-on-genotype-and-phenotype-ratios","categoryList":["academics-the-arts","science","genetics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/193201"}}],"content":[{"title":"The scientific language of genetics","thumb":null,"image":null,"content":"<p>From chromosomes to DNA to dominant and recessive alleles, learning the language of genetics is equivalent to learning the subject itself. The following key terms are guaranteed to appear frequently in your study of all things genetic:</p>\n<ul>\n<li><strong>Alleles:</strong> Alternative versions of a gene</li>\n<li><strong>Autosomal chromosome:</strong> A non-sex chromosome</li>\n<li><strong>Chromosome:</strong> A linear or circular strand composed of DNA that contains genes</li>\n<li><strong>Diploid:</strong> An organism with two copies of each chromosome</li>\n<li><strong>DNA:</strong> Deoxyribonucleic acid; the molecule that carries genetic information</li>\n<li><strong>Dominant:</strong> An allele or phenotype that completely masks a recessive allele or phenotype</li>\n<li><strong>Gene:</strong> The fundamental unit of heredity; a specific section of DNA within a chromosome that codes for a specific molecule, usually a protein</li>\n<li><strong>Genotype:</strong> The genetic makeup of an individual; the allele(s) possessed at a given locus</li>\n<li><strong>Heterozygote:</strong> An individual with two different alleles of a given gene or locus</li>\n<li><strong>Homozygote:</strong> An individual with two identical alleles of a given gene or locus</li>\n<li><strong>Locus:</strong> A specific location on a chromosome</li>\n<li><strong>Phenotype:</strong> The physical characteristics of an individual</li>\n<li><strong>Recessive:</strong> An allele or phenotype that is masked by a dominant allele or phenotype; recessive traits are exhibited only when an individual has two recessive alleles at the same locus or gene</li>\n</ul>\n"},{"title":"The structure of the cell nucleus and its chromosomes","thumb":null,"image":null,"content":"<p>If you could open the nucleus of a cell and peek inside, you’d find chromosomes — the strands of DNA where genes reside. This figure helps you see how all chromosomes, DNA, and genes relate to one another.</p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-266853\" src=\"//coursofppt.com/wp-content/uploads/genetics-cell-nucleus.jpg\" alt=\"illustration of cell nucleus\" width=\"453\" height=\"303\" /></p>\n"},{"title":"Mendel’s laws of inheritance","thumb":null,"image":null,"content":"<p>Genetic inheritance rests upon three fundamental concepts put forth by Gregor Mendel, a monk and part-time scientist who founded the entire discipline of genetics. Mendel’s three laws of inheritance include:</p>\n<ul>\n<li><strong>Segregation:</strong> In diploid organisms, chromosome pairs (and their alleles) are separated into individual <em>gametes</em> (eggs or sperm) to transmit genetic information to offspring.</li>\n<li><strong>Dominance:</strong> A dominant allele completely masks the effects of a recessive allele. A dominant allele produces the same phenotype in heterozygotes and in homozygotes.</li>\n<li><strong>Independent assortment:</strong> Alleles on different chromosomes are distributed randomly to individual gametes.</li>\n</ul>\n"},{"title":"The structure of DNA","thumb":null,"image":null,"content":"<p>DNA is made up of long chains of nucleotides. To make a complete DNA molecule, single nucleotides join to make chains that come together as matched pairs and form long double strands. Each nucleotide is composed of the following:</p>\n<ul>\n<li>A five-sided (pentose) sugar called <em>deoxyribose</em></li>\n<li>A phosphate</li>\n<li>One of four nitrogen-rich bases: adenine, guanine, cytosine, or thymine</li>\n</ul>\n<p>Nucleotides are joined together by phosphodiester bonds. Nucleotide chains are antiparallel and complementary.</p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-266854\" src=\"//coursofppt.com/wp-content/uploads/genetics-DNA.jpg\" alt=\"illustration of DNA\" width=\"275\" height=\"432\" /></p>\n"},{"title":"Uncover inheritance based on genotype and phenotype ratios","thumb":null,"image":null,"content":"<p>Every genetics problem, from those on an exam to one that determines what coat color your dog’s puppies may have, can be solved in the same manner. Here’s a simple approach to any genetics problem:</p>\n<ol>\n<li><strong>Determine how many traits you’re dealing with.</strong></li>\n<li><strong>Count the number of phenotypes for each trait.</strong></li>\n<li><strong>Carefully read the problem to identify the question.</strong><br />\nDo you need to calculate the ratios of genotype (for example, AA, Aa, or aa) or phenotype (such as yellow or green)? Are you trying to determine something about the parents or the offspring?</li>\n<li><strong>Look for words that mean <em>and</em> and <em>or</em> to help determine which probabilities to multiply (<em>and</em>) and which to add (<em>or</em>).</strong></li>\n</ol>\n<p>When solving genetics problems, it pays to know what patterns to look for. The parent genotypes and offspring phenotypic ratios in this table can help you figure out what kind of inheritance is at work.</p>\n<table width=\"726\">\n<tbody>\n<tr>\n<td><strong>Parent Genotypes</strong></td>\n<td><strong>Offspring Phenotypic Ratio</strong></td>\n<td><strong>Type of Inheritance</strong></td>\n</tr>\n<tr>\n<td>Aa x Aa</td>\n<td>3 A_ : 1 aa</td>\n<td>Monohybrid cross, simple dominance</td>\n</tr>\n<tr>\n<td>Aa x Aa</td>\n<td>1 AA : 2 Aa : 1 aa</td>\n<td>Incomplete dominance</td>\n</tr>\n<tr>\n<td>AaBb x AaBb</td>\n<td>9 A_B_ : 3 A_bb : 3 aaB_ : 1 aabb</td>\n<td>Dihybrid cross, simple dominance</td>\n</tr>\n<tr>\n<td>AaBb x AaBb</td>\n<td>9 A_B_ : 3 A_bb : 4 aaB_ : aabb</td>\n<td>Recessive epistasis</td>\n</tr>\n<tr>\n<td>AaBb x AaBb</td>\n<td>12 A_B_ : A_bb : 3 aaBb : 1 aabb</td>\n<td>Dominant epistasis</td>\n</tr>\n</tbody>\n</table>\n"},{"title":"The Central Dogma of Genetics","thumb":null,"image":null,"content":"<p>The <em>Central Dogma of Genetics</em> is that the genetic information stored in genes is first transcribed into messenger RNA (mRNA) and is then translated into protein. Transcription occurs in the nucleus of a cell and uses the sequence of a gene to create an mRNA transcript. Each gene is identified by transcription machinery and includes its regulatory sequences (promoter, enhancers, silencers), exons (the sequences that code for the protein product), introns (the intervening sequences located between the exons that do not code for protein product), and the sequences that signal the end of the gene (terminator sequence).</p>\n<p>After the mRNA is created, a cap is added to one end, a poly-A tail is added to the other end, and the introns are removed by splicing. The mRNA then moves out of the nucleus, where it is then translated. During translation, the mRNA sequence is read in 3-base pair segments called codons. Each 3-base pair codon codes for a specific amino acid (the building blocks of protein). The result of translation is a string of amino acids that are joined to create the final protein product (a polypeptide chain), which is then folded and sometimes modified to make the active form.</p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-266855\" src=\"//coursofppt.com/wp-content/uploads/genetics-dogma.jpg\" alt=\"illustration showing the Central Dogma of Genetics\" width=\"420\" height=\"400\" /></p>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Five years","lifeExpectancySetFrom":"2024-11-21T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":209126},{"headers":{"creationTime":"2023-12-08T22:44:52+00:00","modifiedTime":"2024-11-02T14:12:55+00:00","timestamp":"2024-11-02T15:01:12+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Language & Language Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33687"},"slug":"language-language-arts","categoryId":33687},{"name":"Learning Languages","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33689"},"slug":"learning-languages","categoryId":33689},{"name":"Italian","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33698"},"slug":"italian","categoryId":33698}],"title":"Italian Workbook For Dummies Cheat Sheet","strippedTitle":"italian workbook for dummies cheat sheet","slug":"italian-workbook-for-dummies-cheat","canonicalUrl":"","搜所双发动机SEO":{"metaDescription":"This Cheat Sheet will come in handy as you're learning Italian. It provides a quick reference for tenses, articles, pronouns, and more.","noIndex":0,"noFollow":0},"content":"As you're studying Italian, either on your own or in a course, keep this Cheat Sheet handy for a quick reference on articles, personal pronouns, tenses, and more.","description":"As you're studying Italian, either on your own or in a course, keep this Cheat Sheet handy for a quick reference on articles, personal pronouns, tenses, and more.","blurb":"","authors":[{"authorId":9663,"name":"Teresa L. Picarazzi","slug":"teresa-l-picarazzi","description":" <p><b>Teresa Picarazzi, PhD,</b> has taught Italian language, literature, and cinema for more than 30 years. She now teaches Italian at The Hopkins School in New Haven. She has lived, studied, and worked in Florence, Siena, Urbino, Cortona, and Ravenna, Italy. She has written books and several articles on Italian politics and culture. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9663"}}],"primaryCategoryTaxonomy":{"categoryId":33698,"title":"Italian","slug":"italian","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33698"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":208553,"title":"Italian For Dummies Cheat Sheet","slug":"italian-for-dummies-cheat-sheet","categoryList":["academics-the-arts","language-language-arts","learning-languages","italian"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/208553"}},{"articleId":207900,"title":"Italian Grammar For Dummies Cheat Sheet","slug":"italian-grammar-for-dummies-cheat-sheet","categoryList":["academics-the-arts","language-language-arts","learning-languages","italian"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/207900"}},{"articleId":207893,"title":"Italian All-in-One For Dummies Cheat Sheet","slug":"italian-all-in-one-for-dummies-cheat-sheet","categoryList":["academics-the-arts","language-language-arts","learning-languages","italian"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/207893"}},{"articleId":200932,"title":"Picking Up Italian Quickly","slug":"picking-up-italian-quickly","categoryList":["academics-the-arts","language-language-arts","learning-languages","italian"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/200932"}},{"articleId":200457,"title":"Discussing Your Job in Italian","slug":"discussing-your-job-in-italian","categoryList":["academics-the-arts","language-language-arts","learning-languages","italian"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/200457"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":296160,"slug":"italian-workbook-for-dummies","isbn":"9781119986706","categoryList":["academics-the-arts","language-language-arts","learning-languages","italian"],"amazon":{"default":"//www.amazon.com/gp/product/1119986702/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1119986702/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1119986702-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1119986702/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1119986702/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/italian-workbook-for-dummies-cover-9781119986706-204x255.jpg","width":204,"height":255},"title":"Italian Workbook For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"","authors":[{"authorId":34784,"name":"","slug":"","description":" <p><b>The National Gardening Association </b>is the leading garden-based educational organization in the United States. Visit http//:garden.org.</p> <p><b>Charlie Nardozzi</b> is a nationally recognized garden writer, radio and TV show host, consultant, and speaker. Charlie delights in making gardening information simple, easy, fun, and accessible to everyone.</p> ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/34784"}},{"authorId":9663,"name":"Teresa L. Picarazzi","slug":"teresa-l-picarazzi","description":" <p><b>Teresa Picarazzi, PhD,</b> has taught Italian language, literature, and cinema for more than 30 years. She now teaches Italian at The Hopkins School in New Haven. She has lived, studied, and worked in Florence, Siena, Urbino, Cortona, and Ravenna, Italy. She has written books and several articles on Italian politics and culture. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9663"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;language-language-arts&quot;,&quot;learning-languages&quot;,&quot;italian&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119986706&quot;]}]\" id=\"du-slot-6543b9b92e5ad\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;language-language-arts&quot;,&quot;learning-languages&quot;,&quot;italian&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119986706&quot;]}]\" id=\"du-slot-6543b9b92ed99\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/"}}],"content":[{"title":"Definite and indefinite articles, and the partitive","thumb":null,"image":null,"content":"<p>In Italian, articles vary in gender, number, and spelling. They’re the best predictor of a noun’s gender. The following table outlines the two types of articles and the partitive, and their variations.</p>\n<table>\n<tbody>\n<tr>\n<td width=\"143\"><strong>Gender/Number</strong></td>\n<td width=\"127\"><strong>Definite (the)</strong></td>\n<td width=\"135\"><strong>Indefinite (a, an)</strong></td>\n<td width=\"219\"><strong>Partitive (a little, some, any; [preposition di + definite article])</strong></td>\n</tr>\n<tr>\n<td width=\"143\">m sing.</td>\n<td width=\"127\"><strong>il</strong>/<strong>lo</strong>/<strong>l’</strong></td>\n<td width=\"135\"><strong>uno</strong>/<strong>un</strong></td>\n<td width=\"219\"><strong>del</strong>/<strong>dello</strong>/<strong>dell’</strong></td>\n</tr>\n<tr>\n<td width=\"143\">f sing.</td>\n<td width=\"127\"><strong>la</strong>/<strong>l’</strong></td>\n<td width=\"135\"><strong>una/un’</strong></td>\n<td width=\"219\"><strong>della</strong>/<strong>dell’</strong></td>\n</tr>\n<tr>\n<td width=\"143\">m pl.</td>\n<td width=\"127\"><strong>i</strong>/<strong>gli</strong></td>\n<td width=\"135\"><strong>—</strong></td>\n<td width=\"219\"><strong>dei</strong>/<strong>degli</strong></td>\n</tr>\n<tr>\n<td width=\"143\">f pl.</td>\n<td width=\"127\"><strong>le</strong></td>\n<td width=\"135\"><strong>—</strong></td>\n<td width=\"219\"><strong>delle</strong></td>\n</tr>\n</tbody>\n</table>\n"},{"title":"Personal pronouns","thumb":null,"image":null,"content":"<p>Personal pronouns in Italian serve the same purpose as in English. Italian has some pronouns that English doesn’t have, though: stressed and reflexive pronouns.</p>\n<table width=\"678\">\n<tbody>\n<tr>\n<td width=\"120\"><strong>Person</strong></td>\n<td width=\"108\"><strong>Subject</strong></td>\n<td width=\"102\"><strong>Direct Object</strong></td>\n<td width=\"114\"><strong>Indirect Object</strong></td>\n<td width=\"114\"><strong>Stressed</strong></td>\n<td width=\"120\"><strong>Reflexive</strong></td>\n</tr>\n<tr>\n<td width=\"120\">1st sing.</td>\n<td width=\"108\"><strong>io</strong></td>\n<td width=\"102\"><strong>mi</strong></td>\n<td width=\"114\"><strong>mi</strong></td>\n<td width=\"114\"><strong>Me</strong></td>\n<td width=\"120\"><strong>mi</strong></td>\n</tr>\n<tr>\n<td width=\"120\">2nd sing.</td>\n<td width=\"108\"><strong>tu</strong></td>\n<td width=\"102\"><strong>ti</strong></td>\n<td width=\"114\"><strong>ti</strong></td>\n<td width=\"114\"><strong>Te</strong></td>\n<td width=\"120\"><strong>ti</strong></td>\n</tr>\n<tr>\n<td width=\"120\">3rd sing.</td>\n<td width=\"108\"><strong>lui</strong>/<strong>lei</strong>/<strong>Lei</strong></td>\n<td width=\"102\"><strong>lo</strong>/<strong>la</strong>/<strong>la</strong></td>\n<td width=\"114\"><strong>gli</strong>/<strong>le</strong>/<strong>Le</strong></td>\n<td width=\"114\"><strong>lui</strong>/<strong>lei</strong>/<strong>Lei</strong></td>\n<td width=\"120\"><strong>si</strong></td>\n</tr>\n<tr>\n<td width=\"120\">1st pl.</td>\n<td width=\"108\"><strong>noi</strong></td>\n<td width=\"102\"><strong>ci</strong></td>\n<td width=\"114\"><strong>ci</strong></td>\n<td width=\"114\"><strong>Noi</strong></td>\n<td width=\"120\"><strong>ci</strong></td>\n</tr>\n<tr>\n<td width=\"120\">2nd pl.</td>\n<td width=\"108\"><strong>voi</strong></td>\n<td width=\"102\"><strong>vi</strong></td>\n<td width=\"114\"><strong>vi</strong></td>\n<td width=\"114\"><strong>Voi</strong></td>\n<td width=\"120\"><strong>vi</strong></td>\n</tr>\n<tr>\n<td width=\"120\">3rd pl.</td>\n<td width=\"108\"><strong>loro</strong></td>\n<td width=\"102\"><strong>le</strong>/<strong>li</strong></td>\n<td width=\"114\"><strong>gli</strong></td>\n<td width=\"114\"><strong>loro</strong></td>\n<td width=\"120\"><strong>si</strong></td>\n</tr>\n</tbody>\n</table>\n"},{"title":"Simple prepositions","thumb":null,"image":null,"content":"<p>Italian has eight basic prepositions (amongst many), which correspond to the basic prepositions used in English. Remember, though, that although the translations shown here reflect the meanings in each language, the usage sometimes differs between the two languages, depending on context.</p>\n<p>The basic prepositions are as follows; I’ve put a star by the ones that are typically — but not always! — contracted with a definite article:</p>\n<ul>\n<li><strong>di</strong>* (<em>of</em>, <em>about</em>, <em>some</em>, possession)</li>\n<li><strong>a</strong>* (<em>at</em>, <em>to</em>)</li>\n<li><strong>da</strong>* (<em>from</em>, <em>by</em>, <em>at</em>)</li>\n<li><strong>in</strong>* (<em>in</em>, <em>into</em>, <em>to</em>)</li>\n<li><strong>con</strong> (<em>with</em>)</li>\n<li><strong>su</strong>* (<em>on</em>, <em>onto</em>)</li>\n<li><strong>per</strong> (<em>for</em>, <em>through</em>)</li>\n<li><strong>fra</strong>/<strong>tra</strong> (<em>between</em>, <em>among</em>)</li>\n</ul>\n"},{"title":"Tenses in Italian","thumb":null,"image":null,"content":"<p>This section provides you with samples of the tenses included in the book.</p>\n<p><strong>Modo indicativo (indicative mood)</strong></p>\n<table>\n<tbody>\n<tr>\n<td width=\"312\"> <strong>Modo Indicativo (Indicative Mood) Tenses</strong></td>\n<td width=\"312\"><strong>Example Using guardare (to look/to watch)</strong></td>\n</tr>\n<tr>\n<td width=\"312\"><strong>presente</strong> (<em>simple present</em>)</td>\n<td width=\"312\"><strong>Io guardo.</strong> (<em>I look/I’m looking/I’m watching/I do watch.</em>)</td>\n</tr>\n<tr>\n<td width=\"312\"><strong>presente progressivo</strong> (<em>present progressive</em>)</td>\n<td width=\"312\"><strong>Io sto guardando.</strong> (I<em>‘m looking./</em>I’m watching</td>\n</tr>\n<tr>\n<td width=\"312\"><strong>imperfetto</strong> (<em>imperfect</em>)</td>\n<td width=\"312\"><strong>Io guardavo.</strong> (<em>I looked/I was watching.</em>)</td>\n</tr>\n<tr>\n<td width=\"312\"><strong>imperfetto progressivo </strong>(<em>past</em>/<em>imperfect progressive</em>)</td>\n<td width=\"312\"><strong>Io stavo guardando. </strong>(<em>I was looking.</em>)</td>\n</tr>\n<tr>\n<td width=\"312\"><strong>passato prossimo</strong> (<em>present perfect</em>)</td>\n<td width=\"312\"><strong>Io ho guardato.</strong> (<em>I have looked/I did look.</em>)</td>\n</tr>\n<tr>\n<td width=\"312\"><strong>trapassato prossimo</strong> (<em>past perfect</em>)</td>\n<td width=\"312\"><strong>Io avevo guardato</strong> (<em>I had looked.</em>)</td>\n</tr>\n<tr>\n<td width=\"312\"><strong>futuro</strong> (<em>future</em>)</td>\n<td width=\"312\"><strong>Io guarderò.</strong> (<em>I will look.</em>); infinitive stem</td>\n</tr>\n<tr>\n<td width=\"312\"><strong>Future anteriore</strong> (<em>future perfect</em>)</td>\n<td width=\"312\"><strong>avrò</strong><strong> guardato</strong> (<em>I will have looked/watched.</em>)</td>\n</tr>\n</tbody>\n</table>\n<p>&nbsp;</p>\n<p><strong>Modo condizionale (conditional mood): Infinitive Stem + –ei, –esti, –ebbe, –emmo, –este, –ebbero</strong></p>\n<table>\n<tbody>\n<tr>\n<td width=\"312\"><strong>Tense</strong></td>\n<td width=\"312\"><strong>Example Using guardare (to look/watch)</strong></td>\n</tr>\n<tr>\n<td width=\"312\"><strong>presente</strong> (<em>present</em>)</td>\n<td width=\"312\"><strong>Io guarderei. </strong>(<em>I would look/watch.</em>)</td>\n</tr>\n<tr>\n<td width=\"312\"><strong>passato</strong> (<em>past</em>)</td>\n<td width=\"312\"><strong>Io avrei guardato.</strong> (<em>I would have looked.</em>)</td>\n</tr>\n</tbody>\n</table>\n<p>&nbsp;</p>\n<p><strong>Modo imperativo (imperative mood)</strong></p>\n<table>\n<tbody>\n<tr>\n<td width=\"312\"><strong>Subject Pronouns</strong></td>\n<td width=\"312\"><strong>Example Using guardare (to look/to watch)</strong></td>\n</tr>\n<tr>\n<td width=\"312\"><strong>Tu</strong></td>\n<td width=\"312\"><strong>Guarda! </strong>(<em>[You] look!</em>)</td>\n</tr>\n<tr>\n<td width=\"312\"><strong>Lei</strong> (<em>you</em>, formal)</td>\n<td width=\"312\"><strong>Guardi! </strong>(<em>[You] look!</em>)</td>\n</tr>\n<tr>\n<td width=\"312\"><strong>Noi</strong></td>\n<td width=\"312\"><strong>Guardiamo! </strong>(<em>[We] Let’s look!</em>)</td>\n</tr>\n<tr>\n<td width=\"312\"><strong>Voi</strong></td>\n<td width=\"312\"><strong>Guardate!</strong> (<em>[You all] look!</em>)</td>\n</tr>\n<tr>\n<td width=\"312\"><strong>Loro</strong> (plural; <em>you</em>, formal)</td>\n<td width=\"312\"><strong>Guardino! </strong><em>[You] look!</em>)</td>\n</tr>\n</tbody>\n</table>\n<p>&nbsp;</p>\n<p><strong>Modo participio (participle)</strong></p>\n<table>\n<tbody>\n<tr>\n<td width=\"156\"><strong>Infinitive Ending</strong></td>\n<td width=\"160\"><strong>Participle Ending</strong></td>\n<td width=\"140\"><strong>Example Infinitive</strong></td>\n<td width=\"168\"><strong>Example Participle</strong></td>\n</tr>\n<tr>\n<td width=\"156\"><strong>­–are</strong></td>\n<td width=\"160\"><strong>–ato</strong></td>\n<td width=\"140\"><strong>guardare</strong> (<em>to watch</em>)</td>\n<td width=\"168\"><strong>guardato</strong> (<em>watched</em>)</td>\n</tr>\n<tr>\n<td width=\"156\"><strong>–ere</strong></td>\n<td width=\"160\"><strong>–uto</strong></td>\n<td width=\"140\"><strong>ripetere</strong> (<em>to repeat</em>)</td>\n<td width=\"168\"><strong>ripetuto</strong> (<em>repeated</em>)</td>\n</tr>\n<tr>\n<td width=\"156\"><strong>–ire</strong></td>\n<td width=\"160\"><strong>–ito</strong></td>\n<td width=\"140\"><strong>finire</strong> (<em>to finish</em>/<em>to end</em>)</td>\n<td width=\"168\"><strong>finito</strong> (<em>finished</em>/<em>ended</em>)</td>\n</tr>\n<tr>\n<td width=\"156\">Irregular</td>\n<td width=\"160\">Irregular</td>\n<td width=\"140\"><strong>dire</strong> (<em>to say</em>/<em>to tell</em>)</td>\n<td width=\"168\"><strong>detto</strong> (<em>said</em>/<em>told</em>)</td>\n</tr>\n</tbody>\n</table>\n<p>&nbsp;</p>\n<p><strong>Modo gerundio (gerund)</strong></p>\n<table>\n<tbody>\n<tr>\n<td width=\"156\"><strong>Infinitive Ending</strong></td>\n<td width=\"156\"><strong>Gerund Ending</strong></td>\n<td width=\"156\"><strong>Example Infinitive</strong></td>\n<td width=\"156\"><strong>Example Gerund</strong></td>\n</tr>\n<tr>\n<td width=\"156\"><strong>–are</strong></td>\n<td width=\"156\"><strong>–ando</strong></td>\n<td width=\"156\"><strong>guardare</strong> (<em>to look</em>)</td>\n<td width=\"156\"><strong>guardando</strong> (<em>looking</em>)</td>\n</tr>\n<tr>\n<td width=\"156\"><strong>–ere</strong></td>\n<td width=\"156\"><strong>–endo</strong></td>\n<td width=\"156\"><strong>ripetere</strong> (<em>to repeat</em>)</td>\n<td width=\"156\"><strong>ripetendo</strong> (<em>repeating</em>)</td>\n</tr>\n<tr>\n<td width=\"156\"><strong>–ire</strong></td>\n<td width=\"156\"><strong>–endo</strong></td>\n<td width=\"156\"><strong>dormire</strong> (<em>to sleep</em>)</td>\n<td width=\"156\"><strong>dormendo</strong> (<em>sleeping</em>)</td>\n</tr>\n</tbody>\n</table>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Five years","lifeExpectancySetFrom":"2023-12-08T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":296223}],"_links":{"self":{"self":"//dummies-api.coursofppt.com/v2/categories/33662/categoryArticles?sortField=time&sortOrder=1&size=10&offset=0"},"next":{"self":"//dummies-api.coursofppt.com/v2/categories/33662/categoryArticles?sortField=time&sortOrder=1&size=10&offset=10"},"last":{"self":"//dummies-api.coursofppt.com/v2/categories/33662/categoryArticles?sortField=time&sortOrder=1&size=10&offset=8601"}}},"objectTitle":"","status":"success","pageType":"article-category","objectId":"33662","page":1,"sortField":"time","sortOrder":1,"categoriesIds":[],"articleTypes":[],"filterData":{"categoriesFilter":[{"itemId":0,"itemName":"All Categories","count":8581},{"itemId":33662,"itemName":"Academics & The Arts","count":3},{"itemId":33663,"itemName":"Art & Architecture","count":162},{"itemId":33670,"itemName":"History","count":375},{"itemId":33686,"itemName":"Humanities","count":20},{"itemId":33687,"itemName":"Language & Language Arts","count":1156},{"itemId":33712,"itemName":"Law","count":50},{"itemId":33720,"itemName":"Math","count":1583},{"itemId":33730,"itemName":"Music","count":1654},{"itemId":33747,"itemName":"Performing Arts","count":102},{"itemId":33751,"itemName":"Political Science","count":97},{"itemId":33756,"itemName":"Science","count":1485},{"itemId":33772,"itemName":"Study Skills & Test Prep","count":1727},{"itemId":33800,"itemName":"Teaching","count":167}],"articleTypeFilter":[{"articleType":"All Types","count":8581},{"articleType":"Articles","count":8026},{"articleType":"Cheat Sheet","count":314},{"articleType":"Step by Step","count":129},{"articleType":"Videos","count":112}]},"filterDataLoadedStatus":"success","pageSize":10},"adsState":{"pageScripts":{"headers":{"timestamp":"2025-03-18T10:50:01+00:00"},"adsId":0,"data":{"scripts":[{"pages":["all"],"location":"header","script":"<!--Optimizely Script-->\r\n<script src=\"//cdn.optimizely.com/js/10563184655.js\"></script>","enabled":false},{"pages":["all"],"location":"header","script":"<!-- comScore Tag -->\r\n<script>var _comscore = _comscore || [];_comscore.push({ c1: \"2\", c2: \"15097263\" });(function() {var s = document.createElement(\"script\"), el = document.getElementsByTagName(\"script\")[0]; s.async = true;s.src = (document.location.protocol == \"https:\" ? \"//sb\" : \"//b\") + \".scorecardresearch.com/beacon.js\";el.parentNode.insertBefore(s, el);})();</script><noscript><img src=\"//sb.scorecardresearch.com/p?c1=2&c2=15097263&cv=2.0&cj=1\" /></noscript>\r\n<!-- / comScore Tag -->","enabled":true},{"pages":["all"],"location":"footer","script":"<!--BEGIN QUALTRICS WEBSITE FEEDBACK SNIPPET-->\r\n<script type='text/javascript'>\r\n(function(){var g=function(e,h,f,g){\r\nthis.get=function(a){for(var a=a+\"=\",c=document.cookie.split(\";\"),b=0,e=c.length;b<e;b++){for(var d=c[b];\" \"==d.charAt(0);)d=d.substring(1,d.length);if(0==d.indexOf(a))return d.substring(a.length,d.length)}return null};\r\nthis.set=function(a,c){var b=\"\",b=new Date;b.setTime(b.getTime()+6048E5);b=\"; expires=\"+b.toGMTString();document.cookie=a+\"=\"+c+b+\"; path=/; \"};\r\nthis.check=function(){var a=this.get(f);if(a)a=a.split(\":\");else if(100!=e)\"v\"==h&&(e=Math.random()>=e/100?0:100),a=[h,e,0],this.set(f,a.join(\":\"));else return!0;var c=a[1];if(100==c)return!0;switch(a[0]){case \"v\":return!1;case \"r\":return c=a[2]%Math.floor(100/c),a[2]++,this.set(f,a.join(\":\")),!c}return!0};\r\nthis.go=function(){if(this.check()){var a=document.createElement(\"script\");a.type=\"text/javascript\";a.src=g;document.body&&document.body.appendChild(a)}};\r\nthis.start=function(){var t=this;\"complete\"!==document.readyState?window.addEventListener?window.addEventListener(\"load\",function(){t.go()},!1):window.attachEvent&&window.attachEvent(\"onload\",function(){t.go()}):t.go()};};\r\ntry{(new g(100,\"r\",\"QSI_S_ZN_5o5yqpvMVjgDOuN\",\"//zn5o5yqpvmvjgdoun-wiley.siteintercept.qualtrics.com/SIE/?Q_ZID=ZN_5o5yqpvMVjgDOuN\")).start()}catch(i){}})();\r\n</script><div id='ZN_5o5yqpvMVjgDOuN'><!--DO NOT REMOVE-CONTENTS PLACED HERE--></div>\r\n<!--END WEBSITE FEEDBACK SNIPPET-->","enabled":false},{"pages":["all"],"location":"header","script":"<!-- Hotjar Tracking Code for //coursofppt.com -->\r\n<script>\r\n (function(h,o,t,j,a,r){\r\n h.hj=h.hj||function(){(h.hj.q=h.hj.q||[]).push(arguments)};\r\n h._hjSettings={hjid:257151,hjsv:6};\r\n a=o.getElementsByTagName('head')[0];\r\n r=o.createElement('script');r.async=1;\r\n r.src=t+h._hjSettings.hjid+j+h._hjSettings.hjsv;\r\n a.appendChild(r);\r\n })(window,document,'//static.hotjar.com/c/hotjar-','.js?sv=');\r\n</script>","enabled":false},{"pages":["article"],"location":"header","script":"<!-- //Connect Container: dummies --> <script src=\"//get.s-onetag.com/bffe21a1-6bb8-4928-9449-7beadb468dae/tag.min.js\" async defer></script>","enabled":true},{"pages":["homepage"],"location":"header","script":"<meta name=\"facebook-domain-verification\" content=\"irk8y0irxf718trg3uwwuexg6xpva0\" />","enabled":true},{"pages":["homepage","article","category","search"],"location":"footer","script":"<!-- Facebook Pixel Code -->\r\n<noscript>\r\n<img height=\"1\" width=\"1\" src=\"//www.facebook.com/tr?id=256338321977984&ev=PageView&noscript=1\"/>\r\n</noscript>\r\n<!-- End Facebook Pixel Code -->","enabled":true}]}},"pageScriptsLoadedStatus":"success"},"navigationState":{"navigationCollections":[{"collectionId":287568,"title":"BYOB (Be Your Own Boss)","hasSubCategories":false,"url":"/collection/for-the-entry-level-entrepreneur-287568"},{"collectionId":293237,"title":"Be a Rad Dad","hasSubCategories":false,"url":"/collection/be-the-best-dad-293237"},{"collectionId":295890,"title":"Career Shifting","hasSubCategories":false,"url":"/collection/career-shifting-295890"},{"collectionId":294090,"title":"Contemplating the Cosmos","hasSubCategories":false,"url":"/collection/theres-something-about-space-294090"},{"collectionId":287563,"title":"For Those Seeking Peace of Mind","hasSubCategories":false,"url":"/collection/for-those-seeking-peace-of-mind-287563"},{"collectionId":287570,"title":"For the Aspiring Aficionado","hasSubCategories":false,"url":"/collection/for-the-bougielicious-287570"},{"collectionId":291903,"title":"For the Budding Cannabis Enthusiast","hasSubCategories":false,"url":"/collection/for-the-budding-cannabis-enthusiast-291903"},{"collectionId":299891,"title":"For the College Bound","hasSubCategories":false,"url":"/collection/for-the-college-bound-299891"},{"collectionId":291934,"title":"For the Exam-Season Crammer","hasSubCategories":false,"url":"/collection/for-the-exam-season-crammer-291934"},{"collectionId":301547,"title":"For the Game Day Prepper","hasSubCategories":false,"url":"/collection/big-game-day-prep-made-easy-301547"}],"navigationCollectionsLoadedStatus":"success","navigationCategories":{"books":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/books/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/books/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/books/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/books/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/books/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/books/level-0-category-0"}},"articles":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/articles/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/articles/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/articles/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/articles/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/articles/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/articles/level-0-category-0"}}},"navigationCategoriesLoadedStatus":"success"},"searchState":{"searchList":[],"searchStatus":"initial","relatedArticlesList":[],"relatedArticlesStatus":"initial"},"routeState":{"name":"ArticleCategory","path":"/category/articles/academics-the-arts-33662/","hash":"","query":{},"params":{"category":"academics-the-arts-33662"},"fullPath":"/category/articles/academics-the-arts-33662/","meta":{"routeType":"category","breadcrumbInfo":{"suffix":"Articles","baseRoute":"/category/articles"},"prerenderWithAsyncData":true},"from":{"name":null,"path":"/","hash":"","query":{},"params":{},"fullPath":"/","meta":{}}},"profileState":{"auth":{},"userOptions":{},"status":"success"}}
fun88 casino net cách chơi keno trực tuyến game đánh bài baccarat baccarat quốc tế sòng bài trực tuyến