Step 1: Please select one of the following scenarios for this assignment. Please highlight (by
using boldface type, underlining, using the yellow highlighting tool, changing the text color,
etc.) the scenario that you have chosen for this assignment.
Scenario #2:
It costs thousands of dollars to generate an application (app) for the Apple iPad. Just offering an
app is not guarantee of success. The most successful apps, sold as downloads, have to offer
true functional value. Apple takes weeks to review an app proposal; only with Apple’s approval
can an app be officially offered for the iPad.
If you were Apple, what research would you want to see within the proposal to approve a new
app for the iPad? (Make sure to address all questions listed in Step 2)
Step 2: Please design a Research Prospectus that outlines a research project that can
address the problem(s) listed in your selected scenario. You may type your answers
directly in this document.
Justification for why the research project is needed:
1. Problem Statement (20 points): Please provide a one-paragraph overview of the problem
and why it is an important problem in this business scenario.
A problem that can occur when trying to see if a certain app is appropriate for the Apple
iPad is making sure that the app has value to a customer. In the scenario, it mentions that
an app can only be an Apple app and offered on the iPad when it has true functional value.
The main problem to this business scenario is making sure an app has value and is desired
by the customer before going to the app store. A proposal must prove that a new app holds
customer desire and value.
2. Purpose of Research (20 points): Please provide a one-paragraph explanation of how
research can help solve this problem.
Research can help discover what apps interest the app user population the most. Research
can also help answer what customers want to see in their app and how they intend to use
the app. Customers are not going to purchase apps if the app does not benefit the individual
in a certain way. Since apps cost thousands of dollars, it would be wise to research out what
types of apps customers would want and be willing to buy from the app store. This research
will help the researcher gain a sense of what types of apps should be allowed throughout
the app store.
Descriiption of what will be studied:
3. List two or three research questions (see page 79) for this research project (20 points). This
is NOT a list of the questions you would ask in a survey or interview. You may use a bullet
point list for this question. (Example: If an HR director were studying employee retention
rates, one possible research question would be “What types of employee benefits increase
employee retention rates?”)
The three research questions I would have for this research project are:
1) Who are our target customers?
2) What types of apps are downloaded on the app store by the target customers the most?
3) What value or benefits do these certain apps bring to the customer?
4. List and define the variables of interest for this research project.
Independent/Predictor Variables – definition on page 55-56 (10 points)
• The different apps that are provided
• The benefits that come with these apps
Dependent/Criterion variables – definition on page 55-56 (10 points)
• What apps will customers download
• What apps are desired and hold value to the customer
5. Who (which group(s) of people) are you choosing to study? Please explain your choice. (20
points)
For this research project, I would want to research people who have iPhones, iPads, or iPods
and download apps from the app store frequently. I would want to research out this target
audience because these customers would have a good sense of which apps hold value to him
or her personally. Again, these customers would not purchase apps that did not meet
their personal desire, need, or value/standard.
6. What sampling method will be used (10 points)? Please (1) name a specific sampling
method described in the textbook on pages 349 – 361 and (2) explain why it is the best
choice for your study. (Hint – Do not simply say “probability” or “nonprobability” sampling.
Those are two broad categories of sampling; please select one of the specific methods
discussed in the pages listed above).
I think the appropriate sampling method to use for this research project is a stratified
sampling method. The reason the stratified sampling method works the best is because it
divides the population into different segments such as age, gender, class, school and so on.
I think this is important to take note of because there are a variety of app users. Each app
user may have something different that is valuable, desired, or needed for them personally
from an app. The stratified sampling method will be able to separate customers by age and
gender, and then see what apps each segment finds valuable and downloads the most.
This will help the research be more efficient and the results more adequate.
7. Describe how the sample participants will be recruited for this study. How will you convince
participants to take the time to participate in your study? (10 points)
The way I would recruit participants for this study is by setting up a table right outside the
Apple store and encourage people to take a short survey. I would also have a simple
flyer explaining what the research is about. It would make sense to go about recruitment
this way because a good majority of those going into the Apple store have an iPhone,
iPad, or iPod. I would let people know it would only take a few minutes of their time and I
would provide an incentive. A good incentive I would give out if permitted would be an
app store gift card.
8. Do you need informed consent? Why or why not? (10 points)
Informed consent will be must. Informed consent helps a participant be aware of any
consequences (good or bad) that could happen throughout the study. It can also provide a
comforting factor to the participant. The participant will know his or her rights are being
upheld and that the researchers are credible and practice ethical behavior.
How the study will be conducted:
9. Research Method – Please provide 3-4 detailed paragraphs describing the how you will
conduct your research study. Areas to consider addressing include: (50 points)
(a) A list specific research method you plan to use.
(b) Discussion of why you chose those specific research methods.
(c) Descriiption of how the variables are being researched/measured.
(d) An explanation of how this research project answers the research questions; and
(e) Other topics as appropriate.
The types of research methods I plan on using are self-administered questionnaires and focus
groups. The self-administered questionnaire will be given outside the Apple store for
participants to fill out. The questionnaire will have questions about what apps each participant
has on his or her phone and why they have these certain apps. I can also ask what types of
apps he or she tends to download the most. From here, I will call back people who filled out the
previous survey and see if he or she would like to be part take in focus group. I would make
sure the focus group is diverse, because there are a variety of app users that range from
different ages and backgrounds. This will allow for in depth research to be made face to face
and allow for a participant’s voice to be heard more adequately. Focus groups allow for more
flexibility as far as questions being asked and then more accuracy towards the answers
received. The participant can answer more honestly and more in depth about certain apps and
what benefits or value these apps provide for him or her. They can also answer questions
about what apps they would personally like to see more of on the app store.
The variables I want to measure is if different types apps are provided on the app store, which
apps will customers find most valuable out of these apps and will the customers have the desire
to download them. During the focus group discussion, I could have the researcher or facilitator
bring up some ideas of certain types of apps and the benefits that come along with these apps. I
can then have the facilitator ask which apps do the participants find the most valuable and
relatable to the apps they already have on their phones. I would then have the researcher ask
what makes them valuable and if the participants have any suggestions that can make an app
more desirable to them.
This research project answers the research questions because again, the researchers well gain
a sense of who the target market is and what this target market is looking for in an app. The
researcher project will help Apple to have a better understanding of what apps should be
allowed in the app store or provided for the iPad. Apple will know what apps hold value to a
customer and are wanted by the customer.
10. How will you ensure that participants come to no harm? (10 points)
I will make sure that all personal information obtained from the research is kept confidential.
Participants will have to sign consent forms, and these consent form will have the
participants personal information on them. However, I would make sure that this information
is kept private and only used for research purposes. As far as the survey goes, the surveys
will be kept anonymous. There is no need for anyone’s information to be put on the survey.
This will help the participant to feel comfortable in putting his or her honest opinions on the
survey. Again, this information will only be used for research purposes. And since the
surveys’ will not have any names, there is no way for anyone to link up who wrote down
what answers.
11. What kinds of difficulties and pitfalls might you expect when conducting this type of study?
What will you do to prevent of minimize these difficulties? (20 points)
A pitfall I can see with a questionnaire is that questionnaires can seem impersonal
sometimes. Yes, a researcher can get a little sense of how a participant may feel or what
a participant may want. But then again, a questionnaire can limit a participant’s response.
This is where a focus group can come in handy. A focus group is beneficial because it is
face to face, and a researcher can analyze a participant’s response easier. However, a
downfall of this can be a participant’s privacy. A participant may be shy to answer honestly
because a facilitator is sitting right in front of him or her. I would want to get a facilitator that
will make the participant comfortable and not afraid to answer honestly.
Summary of how the results of the research can be used to help make well-informed
business decisions.
12. What are the benefits from this research? (20 points)
The benefits from this research are knowing what apps are most likely to be downloaded by an
app customer. The research will show which apps customers believe hold value to them
personally and what apps customers need or desire to have. This in the end will save Apple
money, because Apple will be aware of what types of apps are worth producing or developing.
13. How can the results of this research project be applied to fix the problem? (20 points)
The results of knowing what types of apps customers hold valuable can be applied when
looking at the proposals for new apps. Apple will know exactly what to look for when a new app
idea comes their way. Apple will not have to worry about spending money on producing an app
for the iPad that customers would not want to buy. And whenever trends start to change in the
app market, Apple can use this research project again to see what popular apps are being
downloaded at that time. In the end, Apple saves money and time
directions for the project
Step 1: Please select one of the following scenarios for this assignment. Please highlight (by using
boldface type, underlining, using the yellow highlighting tool, etc.) the scenario that you have chosen
for this assignment.
Scenario #1:
NCR Country Club (NCRCC) started in 1954 as an employee benefit of the National Cash Register Co. but
is now an open-membership club. This country club located in Kettering, Ohio (near Dayton), hosts two
18-hole golf courses. The NCR South course, a par 71 championship course of 6,824 yards of heavily
wooded rolling countryside, the site of the 1996 PGA Championship, the 1986 U.S. Open, and the 1998
U.S. Mid-Amateur, is consistently ranked by Golf Digest as one of the top 100 courses in the United
States. The prairie-links style of the North course, a 6,358-yard par 70 course, is considered challenging.
In southwestern Ohio, the active golf season usually lasts from May through October. Within a 30-
minute radius of NCRCC, the avid golfer will find eight other private golf and country clubs as well as 29
public golf clubs and courses.
In 1997, after the purchase of NCR Corporation by AT
Poster Critique english essay help
Posters are derived with the purpose of making a communication to a defined audience. In the case of the poster by Michelle Young, the audience choice was isolated with relation to the interests of the topic. Key observations made with relation to the poster include items that allow ease of presentation as well as conceptualization by the targeted audience. Among such annotations include the white space, font descriptions, supportive background styles and layout designs among others. Elemental interests in the current critique to the poster include the evaluation of how it appreciates its role in the promotion of idea communication and as well as in the promotion of understanding among the audience of interest. This critique focuses on evaluating the poster with the hope of establishing its relevance in serving its purpose of communicating to the targeted audience quota. The current poster acknowledges the interests of the audience in its design despite the few that prompt the need for improvements.
Evaluation
White space and font descriptions are critical in the promotion of visibility through attributes such as separation of content, attention attraction and improvement of readability among others. In the poster, the usage of white space may be suggested to be well pronounced. The author has considered engaging the elemental content of the poster against a white space. Such acts promote improvement in visibility and readability prospects for the audience (Jagadish, 2016). Similar remarks may be suggested with relation to the font style and size. The posters manifest a visible font size that provides a sense of ease in reading the content. Also, the size is adequate for idea view from a distance of about three meters from the poster. Such observation suggests that the poster is prepared with the consideration of the interests of the audience.
The input of font size is further reflected in the approaches engaged in presenting the topics and subtopics. The author deploys the use of higher font sizes and techniques such as bolding as a measure for attracting the attention of the audience. It is further observed that the concept of emphasizing as achieved through usage of differing font sizes at various aspects of the poster is also manifested in the color preference. The title of the work is in a white font while the rest of the work is in black. It may be argued that the measure was harbored with the hope of presenting distinction as well as attracting the attention of the audience (How, 2016). However, the eventual outcome may be suggested to have escaped the harbored expectation since the measure promotes the seclusion of the title from the poster content. In most cases, the name of the presenter tends to be mistaken for the title of the work.
The poster has perfected in the deployment of illustrations to support the written content. Illustrations have been engaged to serve various functions including attracting the attention of the targeted audience as well as the summation of the opinions captured in the results section. It is eminent that the usage of illustrations in the results improves the appreciation prospects developed by the audience. Besides, posters are developed with the hope of self-conceptualization that rarely appreciates the input of the developer (Rowe & Ilic, 2015). In essence, posters are anticipated to be independent in message delivery. The current study engaged three graphs towards the promotion of the interests of its results section.
Poster layout allows the acknowledgment of the message through insightful disclosures. It allows the audience to be able to systematically engage the process of information development towards the eventual observation of the conclusion (Zarnetske & Zarnetske, 2015). In the current poster, the input of layout is captured in the planning of the work. The author ensures that the poster adheres to the expectations of the audience in relation to tenets of scientific research. It engages an introduction that is further expounded by objectives of the study that provokes the need to reflect on the engaged methods. It proceeds to further outline the collected results that are coupled with a brief observation that leads to the development of the study conclusion. Also, the poster makes an effort to acknowledge the supportive literature utilized in the development of the reflected work. It may be observed that the layout is further emphasized by efforts such as the usage of bullets in the promotion of ideas. Such measures allow the appreciation of the approach engaged in the delivery of the message aspired by the poster (How, 2016).
Reflections
The poster may be suggested to have met most of the requirements allowing the delivery of the desired message to the target audience. It appeals the attention of the audience through its descriptive tendencies such as font size, illustrations, and white space balance. Also, it embraces a flow structure that adheres the expectation of research. Such measures allow it to remain ideal in the promotion of the purpose desired by its author.
The poster may benefit from various improvements that focus on attributes that complement the understanding developed by the audience. Among them include the redesigning of the color the title, as well as the deployment of illustration in the methodology area. Such measures would allow the inclusion of clarity in the poster layout.
Conclusion
The current poster embraces a standard development that acknowledges the role of attributes such as audience perception and message meaning. It allows the audience to be to engage its content while allowing the fidelity of its message to remain intact. Also, it appreciates the input of visual properties as being central in promoting improvement in audience comprehension. Nonetheless, it stands to benefit from a number of improvements such as the inclusion of additional illustrations as well as the revision of the font color for the title with the hope of improving the associated sense of comprehension.
- How, J. P. (2016). Conference Presentations [From the Editor]. IEEE Control Systems, 36(1), 3-4.
- Jagadish, H. V. (2016). Paper presentation at conferences: time for a reset. Communications of the ACM, 59(3), 38-39.
- Rowe, N., & Ilic, D. (2015). Rethinking poster presentations at large‐scale scientific meetings–is it time for the format to evolve?. FEBS Journal, 282(19), 3661-3668.
- Zarnetske, J. P., & Zarnetske, P. L. (2015). Strategies for creating a conspicuous, effective, and memorable poster presentation. GSA Today, 25(5), 66-68.
Subject?Music Literature Survey ?West Side Story ?
One
CRITICAL THINKING ASSIGNMENT (85 Points) Important! Read First Choose one of the following two assignments to complete this week. Do not do both assignments. Identify your assignment choice in the title of your submission. When you are ready to submit, click the Module 3 Critical Thinking header on the Assignments page to upload the document. Assignment Choice #1: Entity-Relationship Modeling Let us consider the information that your school tracks for a class. In this instance, a class is a scheduled course. For example, your school may offer FINA 2100- Introduction to International Financial Markets as a course. If the school offers it in the fall, then it becomes a class. Below, we have provided some basic business rules and many pieces of information that your school probably tracks about the class: A course may (or may not) require one or more prerequisite courses, and a course may (or may not) serve as a prerequisite of other courses. Each course belongs to a specific department and a department can have many courses. One or more sections of a course will be scheduled each semester at different times of the day and on different days of the week. One instructor will teach a scheduled course section in a specific classroom. The same classroom can be used for many different course sections at different times. A department has many instructors and an instructor may teach for multiple departments. Submit all three parts of this assignment in one document called CT03 assignment. The document can be found on the course information page with the course documents. Part 1: Complete the table. Part 2: Write a detail document about the various business rules and define how the described scenario works with respect to entities and their relationships. Part 3: Create an E-R Diagram. INSTRUCTIONS: Part 1: Complete the table Fill out the table by following these instructions: 1) For each piece of information that the school wants to track, identify if it is an entity or an attribute (place an X in the appropriate column). 2) For each recognized attribute, identify if it is a primary key with an X in the Primary Key column. 3) Identify the entity to which the Primary Key belongs (write the name of the entity in the last column). The first three rows are filled in to provide an example of how the table should be completed. INFORMATION ENTITY ATTRIBUTE PRIMARY KEY ENTITY THAT ATTRIBUTES BELONG TO Department X Course Number X X Course Course X Course Name Course Description Number of Credit Hours Instructor Name Room Number Time of Day Day of Week Instructor ID Department ID Department Name Class Schedule Class Section Number Room Capacity Instructor Room Part 2: Write a detail document Using the provided information, write a detail document about the various scenarios described in Part 1 with respect to entities and their relationships. The E-R diagram will be created from your findings. Don’t worry about going through the normalization process at this point. Identify the appropriate relationships among the entities, and define the minimum and maximum cardinality of each relationship. Make some additional assumptions about the business rules, if necessary. Part 3: Create an E-R Diagram Draw the initial E-R diagram based on the given business rules and the scenarios you defined in your detail document. Include a screen shot or jpeg of the E-R diagram in the CT03 assignment document for submission. Your paper must be a minimum of two pages, double-spaced and comply with CSU-Global Guide to Writing and APA Requirements. You may want to review the assignment criteria found in the Rubric under “Course Information” in the left navigation pane. Assignment Choice #2: CRUD – Defining Information Ownership One easy way to determine information ownership is to think of CRUD-create, read, update, and delete. If you cannot only read but also create, update, and/or delete information, then in some way you own that information because you are responsible for its quality. Here again, let’s consider your school as an example and focus on your personal and transcript information. That information includes your student ID, name, address, phone number, GPA, declared major, declared minor (if you have one), and courses completed (your transcript). Part 1: Identify Create, Update, and Delete Privileges For each piece of information, first identify who has create, update, and delete privileges. Include any individuals or departments that have these sorts of information privileges. There may be several. If so, who is ultimately responsible for your personal and transcript information? Second, identify all the groups of people at your school who can only view (read) your information. Part 2: Develop a CRUD Matrix Develop a CRUD matrix that outlines the relationships among the pieces of information and user privileges (example: http://ocean.otr.usm.edu/~w300778/is-doctor/pubpdf/sc2008.pdf). Part 3: Write a Detail Document Write a detail document about the various business rules that define how the scenario described in Part 1 works with respect to information ownership and their relationships. Identify the appropriate relationships among the information, and define the minimum and maximum privileges associated with each relationship. Your paper must be a minimum of two pages, double-spaced and comply with CSU-Global Guide to Writing and APA Requirements. You may want to review the assignment criteria found in the Rubric under “Course Information” in the left navigation pane.
Hst Good
Based on Dennis Laumann’s Colonial Africa, 1884-1994, craft a reflective essay on European colonialism of Africa. Your essay should focus on reasons, tactics, colonial administration, African response, and legacy. You MUST use substantial historical evidence from the book to support your position. Your essay should be between 4-6 pages mla
Entrepreneurial team members can play different roles in order to foster innovation and new ideas wi
Entrepreneurial team members can play different roles in order to foster innovation and new ideas wi. Entrepreneurial team members can play different roles in order to foster innovation and new ideas within an organization. Which personas are associated with individuals who serve as new sources of information?
Entrepreneurial team members can play different roles in order to foster innovation and new ideas wi
POWER POINT SLIDES
Guidelines Please submit your PowerPoint slides for your research presentation here. Guidelines This final presentation will provide a summary of the student’s research topic for the final paper chosen at the beginning of the semester. The goal of this exercise is to concisely summarize the course project and provide the class with an overview of the research question, hypothesis, methodology and findings. Students will be graded on form, presentation style and content. Assignment: 3-minute presentation Use of 4 PowerPoint slides Slide 0 (template outline), DO NOT INCLUDE (see model) Slide 1: title slide with title, name, affiliation (introduce problem statement; why is it you picked this topic) Slide 2: research question followed by hypothesis [Lit review slide is optional] Slide 3: Methodology Slide 4: Findings
Nursing Homework
Details: This assignment focuses on the importance of self-assessment and reflection. Self-Assessment Self-awareness is essential for developing leadership skills. Recognizing your own strengths, weaknesses, and values, and understanding emotional intelligence and learning styles can help you to be a more effective nurse leader. For this assignment, you have the opportunity to take a variety of self-assessments to learn more about yourself and identify your assets and weaknesses as a leader. This will assist you in discovering how you can improve your own self-leadership skills. You will be asked to think critically about your results and submit a reflection as directed below. Complete each of the following self-assessments. Be sure to document the results of each assessment to assist you in completing the reflection portion of the assignment below. Emotional Intelligence Assessment: “Emotional Intelligence Test”: http://testyourself.psychtests.com/testid/3038 Personality Assessment: “Personality Traits Test”: http://testyourself.psychtests.com/bin/transfer?req=MnwyMjk2fDE5NTM1MTV8MXwxfDE=&refempt Learning Styles Assessment: “The VARK Questionnaire: How Do I Learn Best?”: http://vark-learn.com/the-vark-questionnaire/ Values Assessment: “Values Profile”: http://testyourself.psychtests.com/bin/transfer?req=MnwzMzE5fDE5NTM1MTV8MXwxfDE=&refempt Values Assessment: “Rokeach Values Survey”: http://faculty.wwu.edu/tyrank/RokeachValueSurvey.pdf Diversity Assessment: “Cultural Competence Self-Test”: http://www.healthystartpinellas.org/pdf/Self_Assess_5.pdf Self-Assessment Reflection Becoming self-aware is an ongoing process requiring introspection. The more often people practice self-reflection, the more opportunities they have to understand their own behaviors and adapt their approaches to working with other people, which can improve both your own and other’s abilities to meet their professional goals. In a 750-1,000 word reflective essay, address the following: Briefly summarize the results of each self-assessment. Identify the leadership style that closely aligns to your philosophy of care, and explain what appeals to you about that style. Reflect on how you might incorporate elements of that particular style as you exercise leadership in a practice or health care organization setting. Discuss any particular areas for improvement the assessments helped you identify and some steps for improving your leadership capabilities. You are required to cite three to five sources to complete this assignment. Sources must be published within the last 5 years and appropriate for the assignment criteria and nursing content.
3Q DYNAMICS
I WILL HAVE 3 DYNAMICS QUESTIONS ON 29TH AT 8:30 AM EST TIME ZONE . I WILL ONLY HAVE 60 MINS IN TOTAL . IF ANY OF YOU ARE WELL QUALIFIED TO DO 1 OR 2 OR ALL 3 IN 60 MINS , REPLY BACK . BE HERE AT 8:30 AM EST TIME 29TH JULY I AM ATTACHING INSTRCTION FILE OF HOW THE QUESTIONS SHALL BE + 3 SAMPLE QUESTIONS I WILL PAY $7 EACH QUESTION thank you I WILL POST THE QUESTIONS VERY SOON
Alternative Benefit Programs – 250 Words
Based upon your research what are your thoughts about how employee benefits, vacation, sick leave, and other compensation & benefits might differ around the world? What is the basis for your answers?
Week 1 Discussion 1 – Due Friday 11:00am CST – APA Format
Week 10 eActivities Go to the United States Department of Labor and read the section titled ?Employment Rights: Who has Them and Who Enforces Them, located at http://www.dol.gov/odep/pubs/fact/rights.htm. Be prepared to discuss. Use the Internet to research the role of unions in the United States compared to three other countries. Be prepared to discuss. Week 10 Discussion 1
Regulatory Compliance And Protection
PART ONE Research the following four federal agencies: U.S. Securities and Exchange Commission (SEC) U.S. Environmental Protection Agency (U.S. EPA) Occupational Safety and Health Administration (OSHA) U.S. Consumer Product Safety Commission (CPSC) Provide one real world example of an entity that each agency regulates. PART TWO Resources U.S. Securities and Exchange Commission (SEC) U.S. Environmental Protection Agency (U.S. EPA) Occupational Safety and Health Administration (OSHA) U.S. Consumer Product Safety Commission (CPSC) Scenario: Your solar panel manufacturing and installation company, Solar Co. Inc., is in the process of “going public,” has underwritten its Initial Public Offering (IPO), and filed its registration statement with the U.S. Securities and Exchange Commission. Your current executive team has asked you to create a plan ensuring compliance with a variety of regulations that will apply to Solar Co. as the company goes public and continues to expand. Write a discussion in no more than 175 words about each of the four federal agencies listed above in which you: Explain the role and function of the agency. Identify at least two significant regulations enforced by each agency relevant to Solar Co.’s business (totaling eight regulations). Provide recommendations for Solar Co. to ensure compliance with each of the regulations including specific action items to be taken by employees and management.
Week 2 Case Study 1: The Brazilian Federal Data Processing Service
Read the case study titled, Brazil to fortify government email system following NSA snooping revelations, located here and at http://www.networkworld.com/news/2013/101413-brazil-to-fortify-government-email-274802.html. Use the Internet to research the architectures that other government organizations and intelligence agencies use for email privacy, if any. Write a three to four (3-4) page paper in which you: Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil’s problem is an ethical one that should be corrected. Provide a rationale for your response. Assess the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture. Conclude whether or not Brazil could have previously considered its current problem and built an original architecture that would have prevented the problem in question. Provide a rationale for your response. Evaluate the quality of the Brazilian Federal Data Processing Service’s proposed architecture plan geared toward solving the security problem. Suggest two (2) other possible architecture solutions that the Brazilian Federal Data Processing Service should consider. Justify your response. Determine whether or not one (1) of the governments or intelligence agencies that you researched has taken precautions to avoid a security breach similar to the one that the Brazilian Federal Data Processing Service had experienced. If this government organization or intelligence agency has taken precautions to avoid a similar security breach, provide one (1) example of such a precaution. If this government organization or intelligence agency has not taken precautions to avoid a similar security breach, recommend one (1) action that it can take in order to avoid a similar security breach. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Points: 130 Case Study 1: The Brazilian Federal Data Processing Service Criteria Unacceptable Below 70% F Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil’s problem is an ethical one that should be corrected. Provide a rationale for your response. Weight: 20% Did not submit or incompletely examined the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Did not submit or incompletely determined whether you agree or disagree that Brazil’s problem is an ethical one that should be corrected. Did not submit or incompletely provided a rationale for your response. Partially examined the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Partially determined whether you agree or disagree that Brazil’s problem is an ethical one that should be corrected. Partially provided a rationale for your response. Satisfactorily examined the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Satisfactorily determined whether you agree or disagree that Brazil’s problem is an ethical one that should be corrected. Satisfactorily provided a rationale for your response. Thoroughly examined the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Thoroughly determined whether you agree or disagree that Brazil’s problem is an ethical one that should be corrected. Thoroughly provided a rationale for your response. 2. Assess the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture. Conclude whether or not Brazil could have previously considered its current problem and built an original architecture that would have prevented the problem in question. Provide a rationale for your response. Weight: 20% Did not submit or incompletely assessed the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture. Did not submit or incompletely concluded whether or not Brazil could have previously considered its current problem and built an original architecture that would have prevented the problem in question. Did not submit or incompletely provided a rationale for your response. Partially assessed the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture. Partially concluded whether or not Brazil could have previously considered its current problem and built an original architecture that would have prevented the problem in question. Partially provided a rationale for your response. Satisfactorily assessed the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture. Satisfactorily concluded whether or not Brazil could have previously considered its current problem and built an original architecture that would have prevented the problem in question. Satisfactorily provided a rationale for your response. Thoroughly assessed the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture. Thoroughly concluded whether or not Brazil could have previously considered its current problem and built an original architecture that would have prevented the problem in question. Thoroughly provided a rationale for your response. 3. Evaluate the quality of the Brazilian Federal Data Processing Service’s proposed architecture plan geared toward solving the security problem. Suggest two (2) other possible architecture solutions that the Brazilian Federal Data Processing Service should consider. Justify your response. Weight: 25% Did not submit or incompletely evaluated the quality of the Brazilian Federal Data Processing Service’s proposed architecture plan geared toward solving the security problem. Did not submit or incompletely suggested two (2) other possible architecture solutions that the Brazilian Federal Data Processing Service should consider. Did not submit or incompletely justified your response. Partially evaluated the quality of the Brazilian Federal Data Processing Service’s proposed architecture plan geared toward solving the security problem. Partially suggested two (2) other possible architecture solutions that the Brazilian Federal Data Processing Service should consider. Partially justified your response. Satisfactorily evaluated the quality of the Brazilian Federal Data Processing Service’s proposed architecture plan geared toward solving the security problem. Satisfactorily suggested two (2) other possible architecture solutions that the Brazilian Federal Data Processing Service should consider. Satisfactorily justified your response. Thoroughly evaluated the quality of the Brazilian Federal Data Processing Service’s proposed architecture plan geared toward solving the security problem. Thoroughly suggested two (2) other possible architecture solutions that the Brazilian Federal Data Processing Service should consider. Thoroughly justified your response. 4. Determine whether or not one (1) of the governments or intelligence agencies that you researched has taken precautions to avoid a security breach similar to the one that the Brazilian Federal Data Processing Service had experienced. If this government organization or intelligence agency has taken precautions to avoid a similar security breach, provide one (1) example of such a precaution. If this government organization or intelligence agency has not taken precautions to avoid a similar security breach, recommend one (1) action that it can take in order to avoid a similar security breach. Weight: 20% Did not submit or incompletely determined whether or not one (1) of the governments or intelligence agencies that you researched has taken precautions to avoid a security breach similar to the one that the Brazilian Federal Data Processing Service had experienced. Did not submit or incompletely provided one (1) example of a precaution, if this government organization or intelligence agency has taken precautions to avoid a similar security breach. Did not submit or incompletely recommended one (1) action that it can take in order to avoid a similar security breach, if this government organization or intelligence agency has not taken precautions to avoid a similar security breach. Partially determined whether or not one (1) of the governments or intelligence agencies that you researched has taken precautions to avoid a security breach similar to the one that the Brazilian Federal Data Processing Service had experienced. Partially provided one (1) example of a precaution, if this government organization or intelligence agency has taken precautions to avoid a similar security breach. Partially recommended one (1) action that it can take in order to avoid a similar security breach, if this government organization or intelligence agency has not taken precautions to avoid a similar security breach. Satisfactorily determined whether or not one (1) of the governments or intelligence agencies that you researched has taken precautions to avoid a security breach similar to the one that the Brazilian Federal Data Processing Service had experienced. Satisfactorily provided one (1) example of a precaution, if this government organization or intelligence agency has taken precautions to avoid a similar security breach. Satisfactorily recommended one (1) action that it can take in order to avoid a similar security breach, if this government organization or intelligence agency has not taken precautions to avoid a similar security breach. Thoroughly determined whether or not one (1) of the governments or intelligence agencies that you researched has taken precautions to avoid a security breach similar to the one that the Brazilian Federal Data Processing Service had experienced. Thoroughly provided one (1) example of a precaution, if this government organization or intelligence agency has taken precautions to avoid a similar security breach. Thoroughly recommended one (1) action that it can take in order to avoid a similar security breach, if this government organization or intelligence agency has not taken precautions to avoid a similar security breach. 5. 3 references Weight: 5% No references provided. Does not meet the required number of references; some or all references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 6. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 6 errors present 5-6 errors present 3-4 errors present 0-2 errors present
Final Paper
Final Paper Select one of the following issues affecting the workplace and working environment. You may narrow the range of the topic by choosing a subtopic. Develop a paper that discusses the issue you have chosen, your subtopic if applicable, and how your topic has or is affecting the work environment that you have been in or are currently a part of. Also analyze how the problem(s) could be solved using various social controls (i.e., laws, organizational policies/practices, training/education, government or corporate involvement) and determine what potential social or economic benefits may result if your recommended changes were implemented. Retirement issues Balancing family and work life Workplace violence Ethical behavior in the workplace Substance abuse in the workplace Sexual harassment The paper must be eight to ten pages in length (excluding title and reference pages) and formatted according to APA style. You must use at least five scholarly resources (three of which must be found in the Ashford Online Library) other than the textbook to support your claims and subclaims. Cite your resources in text and on the reference page. For information regarding APA samples and tutorials, visit the Ashford Writing Center, within the Learning Resources tab on you’re the left navigation toolbar. Writing the Final Paper The Final Paper: Must be eight to ten double-spaced pages in length, and formatted according to APA style as outlined in the Ashford Writing Center. Must include a title page with the following: Title of paper Student’s name Course name and number Instructor’s name Date submitted Must begin with an introductory paragraph that has a succinct thesis statement. Must address the topic of the paper with critical thought. Must end with a conclusion that reaffirms your thesis. Must use at least five scholarly resources, including a minimum of three from the Ashford Online Library. Must document all sources in APA style, as outlined in the Ashford Writing Center. Must include a separate reference page, formatted according to APA style as outlined in the Ashford Writing Center.
LUO PACO 504-D02 DB5
From Hays & Erford (2014, p. 312): Given the cultural values embedded within the Asian community (e.g., collectivism, hesitance to share information with outsiders, the focus on saving face), how might you introduce the idea of talk therapy to individuals in the Asian American community who may question the validity of this approach? 500 Words Book Seveloping Multicultural Counseling Competence
Subject?Music Literature Survey ?West Side Story ?
https://www.youtube.com/watch?v=Fl32I2CTzKs https://www.youtube.com/watch?v=_e2igZexpMs https://www.youtube.com/watch?v=FPCGR9_GdhA https://www.youtube.com/watch?v=_SQ4ogstDVE