Archive for October 27th, 2019

Create a PowerPoint presentation with detailed presentation notes section completed.

Serving the Public

 

Public administrators should find themselves in an environment that is mission-oriented. All efforts should be aimed at achieving organizational goals, which might mean marginalizing your own goals and values to some extent. This can be challenging. For this discussion, imagine you are a manager providing part of the new employee orientation. The part of the orientation tasked to you is to introduce those new to the public sector of the ethical expectations of public sector employees, the challenges they might face in doing so, and guidelines they might use for assessing the potential ethical consequences of the ethical challenges they face.

 

For this discussion, you will develop a PowerPoint presentation using one of two formats:

 

  1. Record a Kaltura presentation. This approach uses a PowerPoint presentation that advances itself, accompanied by an audio recording that guides viewers through the presentation. Include a transcript, a detailed outline, or presentation notes at the bottom of each slide of your audio recording, OR,
  2. Create a PowerPoint presentation with detailed presentation notes section completed. This approach uses a PowerPoint with detailed notes in the presentation notes area at the bottom of each slide. The presentation notes are a transcript of the presentation you would make if showing the presentation to an audience.

 

In presenting the information to the new employees, the PowerPoint must include the following:

 

  1. Title slide.
  2. Purpose slide.
  3. Content slide(s).
  4. Summary slide.
  5. References slide.

 

Based on the guidelines, the presentation must have a minimum of five slides. You will need at least one slide for content, but may use as many as you need.

Brick-And-Mortar Business

You have owned and operated a successful brick-and-mortar business for several years. Due to increased competition from other retailers, you have decided to expand your operations to sell your products via the Internet. Using your responses from previous discussion questions and assignments (be sure you include them in your analysis), develop a plan to implement and execute your strategy to go business.

*Please refer to the Grading Criteria for Comprehensive Learning Assessments (CLAs) on page 4-5 of the syllabus for specific guidelines and expectations. 6 references 

 
 
 

s this much like google commenting on the organizations tentativeness to the customer and quality of their products?

With the tool Customer Interaction Management Solution, what type of interactions would the system perform? Is this much like google commenting on the organizations tentativeness to the customer and quality of their products? Or is Customer Interaction Management (CIM) similiar to Customer Relationship Management (CRM)? Explain in 80 words or more.

 
 
 

Explain how to identify the type of hash, identifying a tool that can integrate with Linux and Windows so desktop users are able to verify hash values. Specify any online tools.

Write a paper in which you answer the following:

 

Before you start on this mission, both national organizations want to verify your ability to identify hash and encryptions standards. Answer the following questions, providing specific details for each topic:

 

  1. Explain how to identify the type of hash, identifying a tool that can integrate with Linux and Windows so desktop users are able to verify hash values. Specify any online tools.
  2. Describe the difference between RSA and ECDSA encryption algorithms and name a well-known product that uses each type of encryption. Be sure to cite your references.
  3. Use at least three (4) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

 

Part 2:

 

Here is a useful online resource to help with your tasked assignment from the FBI. Using the following link, decrypt the random messages and put them together into a useful missive. Identify the hash type and rearrange the messages in logical order to assemble the message.

 

http://hashtoolkit.com/

For this Assignment, select a human services administrator from this week’s video.

Misuse of funds is not the only thing that can cause problems with public trust. It is important for any organization that uses volunteers or takes donations to be transparent and accountable to the public. Organizations can take specific steps to assure that they are transparent and accountable in their actions. It is up to human services administrators to provide transparency and accountability for their organizations.

 

For this Assignment, select a human services administrator from this week’s video. Think of one example of how he or she provided transparency and accountability for his or her organization. Consider steps you as a human services administrator might take to provide transparency and accountability to the public for an organization with which you are associated or one with which you are familiar.

 

The assignment (2–3 pages):

 

  • Identify the human services administrator and briefly share one example of how he or she provided transparency and accountability for his or her organization.
  • Explain three steps that you, as a human services administrator, can take to provide transparency and accountability to the public for an organization with which you are associated or one with which you are familiar.
  • Share an insight you had regarding any differences in the way that you might provide transparency and accountability in comparison to the human services administrator you selected from this week’s video.

 

Support your Assignment with specific references to all resources used in its preparation. You are asked to provide a reference list for all resources, including those in the Learning Resources for this course. You should include in your references at least two resources included in this week’s resources and at least one outside scholarly resource.

Clinical Field Experience C: Reading And Writing I Do, We Do, You Do

With your mentor, decide on the direction you will take to provide small-group instruction to 3-4 students on a literacy topic in reading and/or writing.

 

Part 1: Reading and Writing: I Do, We Do, You Do Chart

 

Choose a reading and writing concept with a strategy that aligns to what students in your field experience classroom are currently learning.

 

Complete the “Reading and Writing: I Do, We Do, You Do” chart to guide appropriate instruction for the 3-4 students identified by your mentor teacher. Within the chart, identify the following to help design your lesson:

 

  • Reading and Writing Concept
  • I Do, We Do, You Do
  • Differentiation
  • Assessment

 

Upon completion of your chart, and with approval of your mentor teacher, facilitate the lesson to the students chosen.

 

Part 2: Reflection

 

Using the “Reading, Writing, and Print Concepts: I Do, We Do, You Do” chart, summarize and reflect upon your chart, strategy, and facilitation in 250-500 words. Explain how you will use your findings in your future professional practice.

 

Submit your “Reading and Writing: I Do, We Do, You Do” chart and reflection as one deliverable.

 

The lesson developed for this field experience will be used to complete your Literacy Toolkit assignment due in Topic 6. You will be asked to make revisions based on the implementation experience prior to submitting the unit plan at that time.

 

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

Pick one of the following terms for your research: Moral philosophy, justice, white-collar crime, differential association, or power.

Question:

 

Pick one of the following terms for your research: Moral philosophy, justice, white-collar crime, differential association, or power.

 

 

 

Each student will select one of the key terms above and conduct a search from  resources to find 1 recent peer-reviewed academic journal article (within the past 3 years) that closely relate to the concept.

 

 

 

 

 

Instructions :

 

Your submission must include the following information in the following format:

 

DEFINITION: A brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

 

SUMMARY:Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

 

DISCUSSION:Using 300-350 words, write a discussion, in your own words the way the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

 

REFERENCES: All references must be listed at the bottom of the submission–in APA format

Discuss how the religious and social issues of Europe helped to define and segregate the early American colonies.

1). As noted in the lecture, Philosopher George Santayana notably said, “Those who cannot remember the past are condemned to repeat it.” Why do you think it might be important to understand and study history—especially keeping your professional/life goals in mind?

 

 

 

Your journal entry must be at least 200 words. No references or citations are necessary.

 

  

 

 

 

2). Discuss how the religious and social issues of Europe helped to define and segregate the early American colonies.

 

 

 

Your response must be at least 200 words in length.

 

 

 

3).  If you were alive in the 1600s as a migrant, what would be the greater appeal of the American colonies: freedom of religion or economic opportunity? Why?

 

 

 

Your journal entry must be at least 200 words. No references or citations are necessary.

Operations Management Question

You are required to present your concept in a one-page (max) write-up

including references, outlining the research idea or problem and the results

expected from the study. In the study itself, you are expected to apply

operations management concepts to an existing problem i.e. in an organization

such as where you work. You are required to discuss issues of relevance

including best tools, techniques and practices in operations management.

Further, you are expected to apply these tools, techniques and practices for

the selected project, clearly indicating the benefits for an organization and

other interested parties.

 
 
 

Explain how to identify the type of hash, identifying a tool that can integrate with Linux and Windows so desktop users are able to verify hash values. Specify any online tools.

The CIA and FBI have been working as a joint task force to unearth the meaning behind a vast amount of intercepted digital communiqué between two known operatives believed to be spies. They have recruited your company to assist with the decryption of these messages.

 

Part 1:

 

Write a paper in which you answer the following:

 

Before you start on this mission, both national organizations want to verify your ability to identify hash and encryptions standards. Answer the following questions, providing specific details for each topic:

 

  1. Explain how to identify the type of hash, identifying a tool that can integrate with Linux and Windows so desktop users are able to verify hash values. Specify any online tools.
  2. Describe the difference between RSA and ECDSA encryption algorithms and name a well-known product that uses each type of encryption. Be sure to cite your references.
  3. Use at least three (4) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

 

Part 2:

 

Here is a useful online resource to help with your tasked assignment from the FBI. Using the following link, decrypt the random messages and put them together into a useful missive. Identify the hash type and rearrange the messages in logical order to assemble the message.

 

http://hashtoolkit.com/

error: Content is protected !!