Archive for June 19th, 2022

Wk 5 – Apply: Signature Assignment: Contingency Plan and Executive Presentation

Air BnB

Project plans outline the intended course of events; however, things dont always happen as intended. Organizations need to consider risks and develop a contingency plan. This plan is typically presented to management.

Based on your prior research, determine potential risk factors for not meeting each of the project objectives.Develop a contingency plan for each of the potential risks. Add the potential risks and contingency plan to your Wk4 Apply: Project Plan assignment.

Create a 12- to 14-slide presentation with detailed speaker notes and visuals on every slide in which you:

  • Identify the organizations information presented in Wk1. What is Air BnB?
  • Synthesize the SWOT analysis and market trend research.
  • Explain how the project objectives will advance the organizational goals.
  • Assess how success will be measured.
  • Evaluate the value this project will bring to the organization.
  • Identify project metrics, timelines, and responsible parties.
  • Develop a contingency plan for each of the potential risk factors for not meeting each of the project objectives.

home work help

 For the Unit III homework , imagine you are the lead trainer for a global organization. Through data analytics and observations, you have noticed that employees across the organization do not share their knowledge with one another, whether that be from skills trainings they recently completed to general knowledge that could enhance the capabilities of the organization. This is a big issue for the chief executive officer (CEO), and the head of human resources (HR) has asked you to come up with solutions to address the issue. Within your homwork, provide the information below.

  • Give three reasons as to why employees do not share knowledge.
  • Give three solutions that your organization can incorporate to encourage knowledge sharing among employees.
  • Discuss the benefits that each solution offers and how each solution promotes knowledge sharing.

For this homework, create a fictitious company name and location, and make your suggestions specific to that company. In the introduction, give the company name and location and some brief background information about the company and industry. Feel free to choose any industry (e.g., technology, manufacturing, or advertising) that interests you, and add any details that you think are necessary for your home work . Your homework  must be at least two pages in length, not counting the title and reference pages. 

You are required to use at least one outside source to support your explanation. All sources used, including required unit resources, must be cited and referenced according to APA guidelines. 

Evolution of Piracy and Corresponding Legislation

 

Evolution of Piracy and Corresponding Legislation

Prior to beginning work on this assignment, read Chapter 5 in the textbook and view the and videos. You must include at least one additional scholarly and/or professional source for your paper. You may wish to review the recommended resources for this week for assistance with this research. You may also access the guide for assistance with finding appropriate resources.

Theft of intellectual property, such as music and video recordings, has been commonplace for many years. During the 1970s and 1980s portable inexpensive recording devices made piracy of video and music relatively easy to accomplish. With the advent of the MP3 and MP4 formats utilized to compress large files for data storage and portability, piracy has flourished. Motion pictures, music, and data can now be easily accessed via small personal computerized devices such as cellular phones, tablets, and MP3 players. In addition, large files can be easily stored on digital flash drives often no bigger than a coin. This has enabled digital pirates to safely store movies, music, and data for transport to locations on a global scale.

In this paper, you must

  • Analyze the technical evolution of digital piracy including the impact of new digital formats such as CD, DVD, MP3, and MP4 to intellectual property piracy.
  • Explain the growth of innovative file sharing such as peer-to-peer (P2P) and Internet Relay Chat (IRC) and their impact on the methods for detecting and preventing intellectual property piracy.
  • Trace the evolution of legislation and organizations such as the World Intellectual Property Organization (WIPO), the Copyright Act of 1976, No Electronic Theft (NET) Act, and Directive 91/250/EEC/2009/24/EC designed to curtail and prevent digital piracy.

The Evolution of Piracy and Corresponding Legislation paper:

  • Must be three to five double-spaced pages (750-1,250 words) in length (not including title and references pages) and formatted according to APA style as outlined in the .
  • Must include a separate title page with the following:
    • Title of paper
    • Students name
    • Course name and number
    • Instructors name
    • Date submitted
  • Must use at least three scholarly sources in addition to the course text.
    • The table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.
  • Must document all sources in APA style as outlined in the Writing Center.
  • Must include a separate references page that is formatted according to APA style as outlined in the Writing Center.

 

Required Resources

Text

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018).  (2nd ed.).  Retrieved from https://www.vitalsource.com/

  • Chapter 4: Malware and Automated Computer Attacks
  • Chapter 5: Digital Piracy and Intellectual Property Theft

Article

CISCO. (n.d.).  Retrieved from http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html

  • This online resource, by Cisco Systems, contains detailed explanations of computer viruses, worms, Trojan horses, and bots. It will assist you in the development of this weeks discussion posts.
    Accessibility Statement is not available

Multimedia

Larkin, D. [Dom Larkin]. (2014, June 8). [Video file]. Retrieved from https://www.youtube.com/watch?v=RMaXj1Kjis8

  • This video is a screencast presentation of the many aspects of digital piracy. The video will assist you in the development of this weeks written assignment.

IgnorantPCFanboys. (2011, September 22).

[Video file]. Retrieved from https://www.youtube.com/watch?v=jJRSjFqu-8Q

  • This video is an interview with Steve Wozniak on the early culture surrounding digital piracy. The video will assist you in the development of this weeks written assignment.

Mr. Fords Class. (2014, January 21).

[Video file]. Retrieved from https://www.youtube.com/watch?v=29LOaxPwPPU

  • This video is a lecture style analysis of malware, viruses, and worms. It will assist you in the development of this weeks discussion post.

Recommended Resources

Dissertation

Lough, D. L. (2001). (Doctoral dissertation, Virginia Polytechnic Institute and State University). Retrieved from https://theses.lib.vt.edu/theses/available/etd-04252001-234145/unrestricted/lough.dissertation.pdf

  • This dissertation examines in detail the variety of attacks that can be levied at computers and provides a taxonomy of such criminal activity. Special attention is given to attacks vie wireless networks.

Article

Hinduja, S. (2003). . Ethics and Information Technology, 5(1), 49-61. Retrieved from http://www.springer.com/computer/swe/journal/10676

  • The full-text version of this article is available through the ProQuest database in the University of Arizona Global Campus Library. This article provides information on the trends and patterns of software pirates working on a university campus. It may assist you in the development of this weeks activities.

Multimedia

arXter. (2009, January 8). [Video file]. Retrieved from https://www.youtube.com/watch?v=rnpntZLnF7w

  • This video is a British news style discussion of global digital piracy and the variety of methods governments can utilized to help combat digital piracy.

Imperva. (2014, January 30).

[Video file]. Retrieved from https://www.youtube.com/watch?v=TE21JrVWlHU

  • This video is a webinar discussing automated computer hacking, firewall applications, and various methods that can be utilized to protect data.

Websites

. (http://ashford-mscj.weebly.com)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.

ibm

Research about the interviewees business. Before you go to interview your chosen marketing professional, you need to do your homework first.  Study the background of the business and the general competitive market it is in can help you prepare meaningful and stimulating questions for the interview. THE INTERVIEW PLAN DUE ON JUNE 21 WILL BE ONE TO TWO TYPEWRITTEN PAGES CONSISTING OF INFORMATION ABOUT THE INTERVIEWEE.

urgent very urgent answer in 30 min STATISTICS

A researcher wanted to know if there was a difference between male doctoral studentswho did there undergraduate work ata specificuniversity and wether or not these students were accepted into the same univs doctoral program. The research Q is – is there a difference between male and female doctoral students in regard to wether they are accepted or not into the doctoral program of the same univ where they did there undergraduate work?The researcher ran a chi square test and the results are listed as below,

Observed values

   Male         Female       Sum

Accepted          110            115          225

Not accepted    80               95         175

                           190             210           400

X2 (square) – 0.39782

P value 0.528217

What can researcher determinefrom the data analysis?

Summarize the statistical scenario and provide an analysis and critique of the scenario

Your response shud be in detail and paragraph format

Report whether the results are significant . discuss the statistical significance and practical significance in ur analysis and interpretation of the results. What are the implications for leaders in the organization based on these results

What shud be the researchers next steps in research, and what other factors can the researcher consider?

Evaluate CPU, RAM, input, output, and peripheral devices as components used in system architecture.

 

IT332-3: Evaluate CPU, RAM, input, output, and peripheral devices as components used in system architecture.

Purpose

Nearly everyone knows how to use a computer, but only a handful of users know or even show interest in what happens inside the computer. Throughout the past decades, the architecture has changed little; however, it is still far more advanced and more productive, which means also faster. In this assignment, you will have the opportunity to learn about computer architecture and explain how it processes information and operates.

Assignment Instructions

Write a 3-page paper (2 pages of written content and 1 diagram) explaining the inner workings of a computer. Include a discussion of the CPU and the concept of single, dual, and multi-core technologies. Also, explain the relation between CPU, memory, and bus. Discuss registers, data moving through the bus, memory allocation, and L cache.

The minimum concepts to cover and explain in the paper are the CPU, memory, bus, cache, address registers, data movement instructions, and multiprocessing. The items listed should be tied together and their interworking with each other described and explained.

Assignment Requirements

Your paper should be 2 pages of written content and 1 diagram. Be sure to use appropriate APA format and cite your textbook or other sources that you used in your paper.

The paper should contain sufficient information to adequately answer the questions and contain no spelling, grammar, or APA errors. Points deducted from grade for each writing, spelling, or grammar error are at your instructors discretion. 

For assistance with APA requirements, please go to Academic Writer. You will find the link in the Academic Tools section of the course.

Also review the university policy on plagiarism. If you have any questions, please contact your professor.

Replies to two classmates.

 You must post two answers to your peer peers of 150 words. Turnitin is less than 15%. 

Look these are two different replies. 

 

Classmate #1 post: 

 Immigration Policy Reform

The comprehensive immigration reform is a policy that first gained momentum in the year 2001 in the United States of America, which was meant to increase the legalization of the unauthorized in I might run in the United States as one of the mechanisms of bringing in future work is required by the United States labor market. They might question whether reform would touch almost all the facets of the United States immigration system but would come with the different economic, social, and ethical implications (Brooks, 2020). There was, therefore, a need to address the immigration policy reform to overcome such challenges, as demonstrated below.

The economic impacts of illegal immigration into the United States declared that the revenue and the Taxes that the unauthorized immigrants generate do not offset the total cost of the services provided to them by the government. The center for immigration studies estimates that the cost associated with illegal immigration into the United States is at least 10.4 billion dollars annually. In addition, the willingness of the illegal immigrants to operate or work at the subpar wages would have to deflate influence the salary, which is difficult to estimate (Wolff, 2021). Most illegal immigrants often work in the jobs that Americans who are authorized to work or are unwilling to do. In most cases, the illegal immigrants will compete with the legal immigrants and the Citizens in securing job opportunities.

The presence of illegal immigrants in the United States and the legalization of the same group would lead to different social challenges, including a rise in the crime rate. This is since most of these groups are jobless and undereducated; therefore, their chances of securing well-paying jobs are low, and most of them end up in illegal activities such as drug trafficking and others (“undefined,” 2013). The ever-increasing number of illegal immigrants into the United States of America has the insinuation of an increased level of unemployment which motivate most of the individuals engage in illegal practices such as stealing, shoplifting, carjacking, and other criminal activities. Failure to reconsider the stipulations of the immigration policy reform that was meant to allow the legalization of such individuals would lead to different vices, including moral decay in the society (“undefined,” 2013). The immigrants often are concentrated in the outskirts of major cities or in the slum regions, which have higher activities and contribute to unethical practices, including racism and discrimination as the legal citizens and immigrants would react against such groups, which may result to violence (Brooks, 2020). Legalizing such individuals would only increase the burden of the government in funding and catering for the basic needs of such individuals, yet their economic productivity is diminished.

References

Brooks, T. (2020). undefined. SSRN Electronic Journal. doi:10.2139/ssrn.3751588

undefined. (2013). Immigration and Public Opinion in Liberal Democracies, 355-378. doi:10.4324/9780203095133-23

Wolff, S. (2021). The security sector governancemigration nexus: Rethinking how security sector governance matters for migrants rights. Ubiquity Press.

Classmate # 2 post: 

 The high rate of immigration is a significant issue in the United States. The immigration policy reform was introduced to control the rate of immigration in the US. The main aim of the reform was to reduce the number of people entering the US from foreign countries. It increased the border controls and security to reduce the number of foreigners entering the country through the borders. The immigration policy reform also made it illegal for employers to deliberately recruit or hire employees unauthorized to work in the US. In addition, the immigration policy reform made the use of fraudulent work or entry documents illegal. In addition, the immigration policy reform made the use of fraudulent work or entry documents illegal. The following are the social, economic, and ethical reasons for addressing the reform in immigration policy.

Economic reasons involve the factors related to immigration that affect the country’s economic condition. One of the economic reasons for addressing immigration policy reform is increased pressure on employment. Most people migrate from their home countries to the US in search of employment opportunities (Chishti et al., 2021). Immigration increases the number of people in the US who are willing to work. This increases competition to the limited number of job opportunities available for Americans. Most employers prefer to hire immigrants since they are cheaper than skilled Americans. The immigration policy reform was introduced to reduce the number of people in the labor market and ensure more job opportunities for Americans (Chang, 2018). The other economic reason is income. Most immigrants are seen as a source of cheap labor since they are given a low salary. Low income reduces the purchasing power of the people, which affects economic growth. The immigration policy reform helped maintain proper income levels by ensuring that employers hire documented immigrants.

The social reasons entail the factors that affect the social life and well-being of the people. A significant social reason for addressing the immigration policy reform is the high crime rate. A high rate of immigration is associated with an increased crime rate in the US. The immigration policy reform was introduced to control illegal immigration, thus reducing the crime rate (Gubernskaya & Dreby, 2017). The other social reason is pressure on the available public services. The high immigration rate increased pressure on the public services available in the US, such as public hospitals and schools. The reform aimed at reducing this pressure to enhance the accessibility of public services among Americans (Chishti et al., 2021). Ethical reasons entail the factors that aim to enhance morality in society. Honesty is a significant ethical value in society. The immigration policy reform enhances honesty by ensuring that the immigrants are truthful in entering the US.

References

Chishti, M., Gelatt, J., Meissner, D., & Initiative, R. U. I. P. (2021). Rethinking the US Legal

            Immigration System. 

Chang, H. (2018). The Economics of Immigration Reform The Economics of Immigration Reform Repository Citation Repository Citation. https://scholarship.law.upenn.edu/cgi/viewcontent.cgi?article=2991&context=faculty_scholarship

Gubernskaya, Z., & Dreby, J. (2017). US immigration policy and the case for family

            unity. Journal on Migration and Human Security5(2), 417-430.

Digital divide as a social justice issue

View the video at the following link to learn more about the Digital Divide: https://www.youtube.com/watch?v=X537MiN6COI

Next, read the following article about the global digital divide, paying careful attention to the introduction, discussion and conclusion while skimming over the methodology and analysis sections.

Ayanso, A., Cho, D. I., & Lertwachara, K. (2014). Information and Communications Technology Development and the Digital Divide: A Global and Regional Assessment. Information Technology For Development, 20(1), 60-77. doi:10.1080/02681102.2013.797378

After reviewing these resources, respond to the following questions:

1) What are some of the important issues that need to be considered when discussing the Digital Divide? Generate a list of items and when you have submitted your response, look and see what your classmates have identified as issues in their responses.

2) How might social scientists from different disciplines talk about these issues? For example, what questions would a psychologist ask compared to an anthropologist? What issues would be the focus of a sociologist? How might a gerontologist frame this problem? What other social scientists might be interested in this issue?

3) What are some potential controversies inherent in this issue? Think about why this social problem might be difficult to solve. Are there gaps in our knowledge? Lack of resources? Opposing political views regarding funding? Think broadly and from an interdisciplinary perspective in order to respond to this question.

4) Where does the solution lie? Are there policies that need to be changed or enacted to resolve the issue? Are there programs or services that might help to close the digital divide? What agencies or industries are best equipped to help?

745 REPl

2 different peer review papers 250 words each

carefully read and provide educative peer reviewed reply for each paper that I will put in the chat

I need it back in 6 hours

At least 2 scholarly sources on each and 2 bible verses on each of the papers

Wk 2, MHA 506: Financial and Ethical Impact Analysis Summary

Assignment Content

Throughout this course, you will analyze the Case Study: East Chestnut Regional Health System (ECRHS).

Review the document.

Assume East Chestnut Regional Health upper management has asked you to analyze its current marketing strategies from both ethical and financial perspectives.

Use the as a tool to help you complete your analysis.

Create a 1,050-word Financial and Ethical Impact Analysis for ECRHSs current health care marketing strategy for upper management, based on the above factors.

Include a summary of each section in your analysis: 

  • Mission and objectives 
  • Organizational structure and culture 
  • Current marketing strategies 
  • Current financial analysis 
  • Competitive advantage 
  • Current value chain 
  • Current target market 
  • External environmental factors 

Citeat least 3 reputable references to support your assignment (e.g., tradeor industry publications, government or agency sites, scholarly works, or other sources of similar quality).

error: Content is protected !!