Archive for June 16th, 2022

Assignment

APA Paper:  Research and discuss 2 mobile apps that you find useful in your own personal or professional lives. Discuss the functionality and usefulness along with any improvements that you would recommend. The paper must be 2 pages (at least 500 words) and add the APA Title Page and References page (4 pages total). Use 2 peer reviewed references.

Physics

In this week, we discussed about the properties of sound waves and that they require a medium to travel. Movies, like 2001: A Space Odyssey, show space as deadly silent. On the other hand, Star Wars movies present booming sound effects in spcae. For the discussion this week, you will share your perspectives about movie(s) that strike a balance between science and fiction, especially about sound in outer space.

OBJECTIVES

  1. Identify a movie about Outer Space that you plan to watch or would like to watch again.
  2. Look for the science facts and fiction presented in the movie, especially related to sound in outer space.
  3. Share the perspectives with your class.

DISCUSSION PROMPT

Name of the movie.

Was it filled with Science facts or fiction? Specific Examples.

Was there a balance between the science and fiction in the movie? Examples.

Class discussions

 400 words 

In the Ancient Greek world (the world of Socrates, Plato, and Aristotle, often regarded as the birthplace of philosophy) a symposium was a banquet held after a meal, an after party of sorts that usually included drinking, dancing, recitals, and engaging conversations on the topics of the day.

For our purposes in this course, the Symposium discussions will not involve dancing, recitals, or a banquet, but they will provide food for thought on current ethical issues and direct application of the ethical theory discussed in each of these weeks.

It is almost impossible these days to turn on the news or log onto social media without encountering a controversy that cries out for ethical discussion. For these Symposium discussions, your instructor will choose a topic of current ethical interest and a resource associated with it for you to read or watch. Your task is to consider how the ethical theory of the week might be used to examine, understand, or evaluate the issue.

This week, you will consider how utilitarianism applies to a controversy, dilemma, event, or scenario selected by your instructor. It is a chance for you to discuss together the ethical issues and questions that it raises, your own response to those, and whether that aligns with or does not align with a utilitarian approach. The aim is not to simply assert your own view or to denigrate other views, but to identify, evaluate, and discuss the moral reasoning involved in addressing the chosen issue.

Your posts should remain focused on the ethical considerations, and at some point in your contribution you must specifically address the way a utilitarian would approach this issue by explaining and evaluating that approach.

If you have a position, you should strive to provide reasons in defense of that position.

 600 words

Choose one of these objections and briefly explain the core idea in your own words. 

  1. Reflect on the theory: 

Present a scenario (real or imagined) in which a committed utilitarian would probably make one choice, but someone who finds this objection compelling would probably make a different choice.  (In other words, put yourself in the mind of someone making that objection, and youre imagining a scenario in which that person would likely make a certain ethical judgment but a utilitarian would make a different ethical judgment.)

  1. Reflect on yourself: 

In your view, does considering this situation strengthen and support the objection (thus showing a weakness to utilitarianism), or does it help strengthen utilitarianism by showing how a utilitarian could respond to that objection? 

Module Two – Milestone One

Milestone One: Draft of Overview and Societal Perception In Module Two, you will submit a 3- to 4-page draft of the Overview and Societal Perception portions of the report. Address all critical elements from Section I and II above in this draft. Select and summarize an event or incident and describe the challenges the sport organization faces. Your analysis should be written from the perspective of the society with which the sport organization is affiliated. This means that you are answering both questions A and B in Section II above as if you were a member of the society surrounding the sport organization. This milestone is graded with the Milestone One Rubric. 

Submit a draft of the Overview and Societal Perception sections of your final project. Address all critical elements from Section I and II in the Final Project Document in this draft. Select and summarize an event or incident and describe the challenges the sport organization faces.

Your analysis should be written from the perspective of the society with which the sport organization is affiliated. This means that you are answering both questions A and B in Section II of the Final Project Document, as if you were a member of the society surrounding the sport organization.

proposal

You might think of proposing a solution as a double-layered argument: first, you must argue that a problem worthy of attention or action exists and, second, that a particular solution will best solve it. The goal is not necessarily to convince readers that only one solution is possible, but that a particular solution to an important problem has merit. 

ORG 812 WEEK 1 DISCUSSION 1 AND 2

 

ANSWER THE QUESTIONS ATTACHED AND PROVIDE A PEER REVIEWED ARTICLE AS A REFERENCE

USE ONLY THE ARTICLES FOR REFERENCE AS THEY ARE THE FOCUS OF THE QUESTION

ANY ADDITIONAL REFERNCE CANT BE NO OLDER THAN 2017

NO LESS THAN 200 WORDS NO MORE THAN 300

SEPERATE THE TWO QUESTIONS AND THEIR REFERENCES THEY ARE SEPERATE QUESTIONS

ORG 807 WEEK 1 DISCUSSION 1 AND 2

 

ANSWER THE QUESTIONS ATTACHED AND PROVIDE A PEER REVIEWED ARTICLE AS A REFERENCE

ARTICLE CANT BE NO OLDER THAN 2017

NO LESS THAN 200 WORDS NO MORE THAN 300

SEPERATE THE TWO QUESTIONS AND THEIR REFERENCES THEY ARE SEPERATE QUESTIONS

Viruses, Trojan Horses, and Worms

 Viruses, Trojan Horses, and Worms

Prior to beginning work on this discussion, read Chapter 4 in the text, watch the video, and review the Cisco article.

Computer viruses are considered to be the oldest form of malware that can infect a system. These types of viruses have been around since the inception of the personal computer. The modern landscape of computing has given rise to a number of newer and more sophisticated viruses, Trojan horses, and worms that can infiltrate a computer system, opening the user to heightened risks of being victimized by cyber criminals. Individual computer users are not the only targets of these malware programs; computer criminals and hackers now target governmental and corporate computer systems on a regular basis.

 

Required Resources

Text

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018).  (2nd ed.).  Retrieved from https://www.vitalsource.com/

  • Chapter 4: Malware and Automated Computer Attacks
  • Chapter 5: Digital Piracy and Intellectual Property Theft

Article

CISCO. (n.d.).  Retrieved from http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html

  • This online resource, by Cisco Systems, contains detailed explanations of computer viruses, worms, Trojan horses, and bots. It will assist you in the development of this weeks discussion posts.
    Accessibility Statement is not available

Multimedia

Larkin, D. [Dom Larkin]. (2014, June 8). [Video file]. Retrieved from https://www.youtube.com/watch?v=RMaXj1Kjis8

  • This video is a screencast presentation of the many aspects of digital piracy. The video will assist you in the development of this weeks written assignment.

IgnorantPCFanboys. (2011, September 22).

[Video file]. Retrieved from https://www.youtube.com/watch?v=jJRSjFqu-8Q

  • This video is an interview with Steve Wozniak on the early culture surrounding digital piracy. The video will assist you in the development of this weeks written assignment.

Mr. Fords Class. (2014, January 21).

[Video file]. Retrieved from https://www.youtube.com/watch?v=29LOaxPwPPU

  • This video is a lecture style analysis of malware, viruses, and worms. It will assist you in the development of this weeks discussion post.

Recommended Resources

Dissertation

Lough, D. L. (2001). (Doctoral dissertation, Virginia Polytechnic Institute and State University). Retrieved from https://theses.lib.vt.edu/theses/available/etd-04252001-234145/unrestricted/lough.dissertation.pdf

  • This dissertation examines in detail the variety of attacks that can be levied at computers and provides a taxonomy of such criminal activity. Special attention is given to attacks vie wireless networks.

Article

Hinduja, S. (2003). . Ethics and Information Technology, 5(1), 49-61. Retrieved from http://www.springer.com/computer/swe/journal/10676

  • The full-text version of this article is available through the ProQuest database in the University of Arizona Global Campus Library. This article provides information on the trends and patterns of software pirates working on a university campus. It may assist you in the development of this weeks activities.

Multimedia

arXter. (2009, January 8). [Video file]. Retrieved from https://www.youtube.com/watch?v=rnpntZLnF7w

  • This video is a British news style discussion of global digital piracy and the variety of methods governments can utilized to help combat digital piracy.

Imperva. (2014, January 30).

[Video file]. Retrieved from https://www.youtube.com/watch?v=TE21JrVWlHU

  • This video is a webinar discussing automated computer hacking, firewall applications, and various methods that can be utilized to protect data.

Websites

. (http://ashford-mscj.weebly.com)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.

In your initial post define the terms computer virus, Trojan horse, and worm. Explain how each malware type functions once installed on a computer or computer system. Identify at least one computer virus, Trojan horse, or worm in operation today and describe its specific effects on systems once installed. In addition, you must evaluate the legal issues that arise as officials strive to prevent and detect each of these types of malicious programs. Examine the methods of analyzing malware attacks with regard to determining their source.

Module 2 – MEMO

 

Scenario

As the HR consultant contracted to resolve issues related to miscommunication and workforce discontent at the U.S. branch of the Singaporean software solutions provider, you are expected to present a change readiness report and then submit a change management plan.

You have read that stakeholder analysis is an important requirement for change management. You know that you will soon need critical information from the VP of the U.S. unit to complete this activity. To convince the VP and the leadership team at both locations to share this critical information with you, you decide to send out a memo on the significance of stakeholder analysis in change management.

Prompt

Write a short memo explaining the significance of stakeholder analysis. Specifically, you must address the following criteria:

  1. Describe the use of stakeholder analysis in organizational change management.
    • How will the identities of different stakeholders influence their views on change initiatives?
    • How can stakeholders encourage or inhibit change in an organization?
  2. Identify and explain at least three benefits of conducting a stakeholder analysis.
  3. Identify the key people in the organization:
    • Reference the to document your analysis.
    • Who are the critical stakeholders in the organization? Refer to the to identify the critical stakeholders.
    • Who could be interested in enabling change in the organization?
    • Why do you think these stakeholders will be interested in enabling change?
  4. Include any questions or additional information you will need from the company leadership to complete your stakeholder analysis.
    • Reference the Leaders Self-Evaluations and to document your analysis.

Guidelines for Submission

Submit a 1- to 2-page Word document, using double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited in APA format. Consult the for more information on citations.

Discussion 7 – 200 words

The Ohio Connection

Janey worked as an executive assistant to a product manager at her company: Ohio Connection. Overall, she loved her job; she was happy to work with a company that provided great benefits, and she and found enjoyment in her day-to-day work. She had the same product manager boss for years, but last year, her manager left Ohio Connection and retired. Recently her new manager has been treating her unfairly and showcasing bullying behavior.Yesterday, Janey came into work, and her boss decided to use their power as her manager and her superior to demand that she stay late to cover for him, correct reports that he had made mistakes on, and would not pay her overtime. She was going to be late to pick up her son from soccer practice if she stayed late; she told him this, and he was not happy.Over subsequent days, her boss consistently would make comments about her performance, even though she had always had good remarks on reviews, and created a very negative work environment. The next time she was asked to stay late, she complied for fear of losing her job or having other negative impacts on her job. Janeys situation was not ideal, but she didnt feel she had a choice.Questions:

  1. What type of power did Janeys boss employ to get her to do the things that he wanted her to do?
  2. What negative consequences are apparent in this situation and other situations where power is not balanced in the workplace?
  3. What steps should Janey take do to counteract the power struggle that is occurring with her new manager?

Sources: A. Morin, How to Prevent a Workplace Bully from taking Your Power, Inc., June 25, 2018, https://www.inc.com/amy-morin/how-to-prevent-a-workplace-bully-from-taking-your-power.html; V. Giang, The 7 Types Of Power That Shape The Workplace, Business Insider, July 31, 2013, https://www.businessinsider.com/the-7-types-of-power-that-shape-the-workplace-2013-7; B. Weinstein, 10 Tips for Dealing with a Bully Boss, CIO, accessed October 13, 2018, https://www.cio.com.au/article/198499/10_tips_dealing_bully_boss/.

error: Content is protected !!