HMGT Intro to marketing Discussion post 2

I’m stuck on a Marketing question and need an explanation.

The pharmaceutical and medical device markets are extremely competitive. You can’t watch TV without seeing an AD for a new drug or therapy. Select one pharmaceutical drug that is currently marketed to consumers.

Also, attached a video/ad/commercial regarding your pharmaceutical drug. Describe the therapy (Company, Brand Name, Generic Name, Drug Class/Disease Category). Then identify and research the competitors, list all the competitors and complete a SWOT analysis for the drug that you’ve selected. If you can’t find any competitors indicate that this drug is “first to market” and within the SWOT discuss the potential impact. (Present the SWOT analysis within your posting).

  • Keep in mind — Specific Discussion Directions
  • Also — Keep in mind — I am looking for a specific consumer ad — not a screencast-o-matic video for this discussion
Read more

Global suppl chain 3 questions, 3 paragraphs on each question 4 sentences for each paragraph

I need help with a Business question. All explanations and answers will be used to help me learn.

1. Select a type of product in any industry. Identify the industry and competitors for that product. What are the order winners and order qualifiers for that industry product?

2. What were some of the key structural and infrastructural elements that defined Netflix’s supply chain strategy before 2011? After 2011?

3. How have the customers’ order winners for Netflix’s customers changed over time? Would today’s customer be satisfied by the delivery performance or selection of Netflix’s “old” supply chain?

Read more

this 10 page essay is partially considered plagiarism, following the instruction to look over it and change every possible plagiarism you found.

I need help with a Film question. All explanations and answers will be used to help me learn.

This essay should follow those requirements:

–Be sure to double-check MLA formatting, spacing, citation, italics, Works Cited page, etc. These are all things you have now had time to work through and therefore will be graded more seriously on the final. While I’ve mentioned it several times, the Purdue Owl site is a phenomenal resource and is eminently searchable. This is a good page to start on, and remember to check the formatting guidelines for the whole work as well as the Works Cited page (https://owl.purdue.edu/owl/research_and_citation/mla_style/mla_formatting_and_style_guide/mla_works_cited_page_basic_format.html)

–Quotations are another element that you have had ample time and opportunity to work with. They will need to add something to your argument, be properly formatted, cited, quoted, etc. Additionally, parenthetical citations need to have clear referents in your argument. This will usually mean a direct quote or a specifically attributed summary, unless you are citing the entirety of an article.

–Per the literature provided to help with writing development and revising, the thesis for your paper should be identifiable, focused, and not too broad. It should be an arguable position which can be analyzed and is not simply personal feeling or response. Be particularly cautious of theses which simply produce a list, as these are often a particularly tempting risk.

It is evaluated as 33 percent plagiarism by plagiarism checker on studypool, make sure to look over every detail and change every possible plagiarism you find. By the end, the plagiarism rate on this paper should be LESS than 5 percent from studypool. And also change unproper grammar or mistake you found on this essay.

Read more

disussion need to be 200 words minumum

I’m studying and need help with a Sociology question to help me learn.

1- Have you or anyone you know ever done a job where you experienced alienation? How would you use Marx’s model to explain how it felt? In particular, focus on the four stages of alienation in the video and show how you or someone else you know may have experienced each of the four stages, with examples. Compare experiences and observations on this topic with at least two classmates… http://uregina.ca/~gingrich/o26f99.htm /

2-What are your most fundamental values and how does they shape your norms? Include definitions of the terms in your answer http://www.yourarticlelibrary.com/society/differen…

3-At the beginning of the week, create a post discussing whether you believe the US government takes child labor in agriculture seriously as a public concern? How would you explain the government’s attitude? How should the problem of child labor be addressed?

Read more

Applied Managerial Economics Unit 1 IP

Can you help me understand this Economics question?

“Your list provided the basis for a good conversation about the manufacturing operations,” he says. “We want to know more about the economy of both countries to further inform our decision-making process.”

“That makes sense,” you say. “The United States and South Korea hold many distinct economic factors that may affect AutoEdge’s long-term financial performance.”

“Right,” he says. “Your research on the two economies will give the board enough information so we can advise the new, incoming CEO.”

“What should my research include?” you ask.

“In your research, you must take into consideration several macroeconomic factors,” he says. “We want to see information about the gross domestic product (GDP), unemployment, interest rates, and inflation for both the United States and South Korea. Make sure your research is current; that is, no more than 6 months old.”

1,000-1,200 words, including research in essay format.

Reference attached for scenario information.

Read more

Lab 2: Integrating Digital Forensics With Incident Response

I need an explanation for this Science question to help me study.

Integrating Digital Forensics With Incident Response

Please navigate to the Lab Callout Box within the Content section (see Activities) for this week which also includes detailed instructions for this assignment. All links to open the appropriate documents and to launch the Citrix virtual environment will be found at this location.



Current View

/ 4

Examiner Name

CMIT 424

**Remove / replace all red writing prior to submission**

To:

Requestor Information

Date:

Report Date

Case #:

XXXXXX

Title:

Case T

itle, I.E. Suspect Name & Type of Case

Date item(s) received:

Date received by examiner

Item(s) Submitted for Exam:

Item#

Description Make Model S/N#

Case Summary

:

A summary of the request, i.e. by whom, why, what is being ask to search for and recover,

etc. Why is this examination being conducted?

Legal Authority:

Search warrant, consent, government/organizational property, etc.

Software Tools Used:

Tool Name Version Used For

Ex. Windows 10

10.0.17763

Operating system of forensic

laptop.

Hardware Tools Used:

(simulate write blocker(s) and system information)

Tool Name S/N# Used For

Ex. Tableau TD2u

#12345

Hard drive imaging.

1

Preliminary Findings:

This is a synopsis of what you found of forensic value i.e. Out of analyzing “x” number of

files, “x” were of forensic value; briefly describe the types of files discovered (you’ll get into

the details in the next section).

Also briefly describe the partition and file structure of the media examined i.e. partitions,

volume names, sizes, files systems.

Details of Examination:

(

This will typically be the longest part of this document.

It is more than

just answering the case questions!

Please be sure to read the

assignment deliverables carefully at the end of each lab).

Describe your examination procedures performed, i.e. signed for items for examination,

photographed evidence, conducted pre/post hash (describe why you perform hash analysis –

show both acquisition and verification hash sums)

, describe tools validation procedures

(your forensic hardware and software), anti-virus scans conducted.

Documentation of results to include answering questions detailed in the request, etc. This is

where the

files of forensic interest

are reported on and linked to the case questions /

scenario. Findings should be described just not with words but snippets, screen shots, and

addendums when practical.

If you feel that some detailed findings would be better placed in an addendum that is fine.

Including triage tables, snippets of your findings, and other visual aids will better visually

guide the reader so consider using those in the labs and definitely the FR1 and FR2

assignments. Remember that readers of these reports are often not technical by trade.

Including an evidence photo(s) is also best practice (see Addendum A).

Conclusion / Recommendations:

State the facts only and avoid opinion / emotional explanations. Detail any further

examinations that maybe required, interview questions of subject(s) if applicable, what

could further be done in the investigation from the outcome of your examination, etc.

Disposition

of Evidence

:

Document here the disposition of the items submitted for exam, i.e. stored in evidence

control, returned to requestor etc.

Report End

2

Addendum A: Photos

Simulate with pictures of similar devices you can find on the Internet. It is best practices to

include a picture(s) of the evidence you examined. For example:

The following is a photograph of Lenovo Laptop, Model 7834, Serial #765432.

PICTURE(s) SHOWN HERE (find an example using “Google Images”)

You may want to include the hash values in this area and just refer the reader to Addendum A

in the main document.

Example:

The following details the forensic image processing.

Example: Seagate Hard Drive, 250GB, Serial #12345:

Digital Forensics Examiner (DFE) created forensic evidence files of XXXX drive #XXXX.

The pre-processing hash results are presented below:

MD5 checksum: XXXX

SHA1 checksum: XXXX

The forensic processing subsequently created XXXX (X) files (simulated).

Forensic Evidence Files Created: XXX.E01 – XXXX.E04 (example with four files)

The forensic imaging process involved a post processing hash verification of the contents of the

evidence file compared with the pre-processing hash. The hash analysis is presented below.

MD5 checksum: XXXX: verified

SHA1 checksum: XXXX: verified

The forensic imaging process successfully created a forensically sound and verifiable bit stream

copy of the hard drive in the form of forensic evidence files.

3

Addendum B: Steps Taken

These are your notes on the steps you took while conducting the examination. Often, the

examiner must submit their notes along with the forensic report if a case goes to court.

I recommend just numbering your steps i.e. 1, 2, 3 in chronological order.

Start with how you received the media and describe how you sterilized.

For example:

1. Original USB drives and CD-Rs received from R. Jones. Items labeled and chain of custody

(COC) documentation initiated.

2. Forensically sterilized target media prepared using Paladin vX.XX.XXX. After launching the

Paladin tool, the target media was physically connected to the workstation running Paladin.

Target media was wiped and verified using command “sudo dcfldd pattern=00 vf=/dev/sdc.”

Results were a match, verifying the target media was forensically sterile.

3. Describe your analysis steps.

4. cont’d

Include as many addendums as necessary to fully describe your findings. Ensure that all

addendums are referenced from the summary report.

Consider inserting “Bookmarks” (information that you have determined is of evidentiary value)

from your EnCase examination either into the “Detailed Findings” section in the summary

report template or as a separate addendum to fully describe your findings and answer the case

questions (each week’s Lab Lecture document will describe the scenario and case questions to

be answered).

Remember to spell check your work before submitting.

4

Enter the password to open this PDF file.

File name:

File size:

Title:

Author:

Subject:

Keywords:

Creation Date:

Modification Date:

Creator:

PDF Producer:

PDF Version:

Page Count:

Preparing document for printing… 0%

Read more

1-1 Discussion: Evolution of Operating Systems

Need help with my Computer Science question – I’m studying for my class.

As research and business requirements change, operating systems evolve to solve problems unique to those environments. Linus Torvalds developed Linux because he was not satisfied with Tanenbaum’s MINIX. David Cutler developed Windows NT to function much like VMS while Bill Gates had aspirations for NT to replace Unix. These business, personal, and academic influences have all impacted the current operating system landscape.

Using your textbook, credible sources, and your own professional or student experiences, respond to the following:

  • Outline the major influences that led to the development of the modern operating system of your choice. You may select any desktop or mobile operating system you like such as Windows, Linux, Mac OS X, Android, or iOS.
  • Identify a trend that could influence the development of future operating systems. Be sure to clarify if the trend impacts desktop, servers, or mobile operating systems. Examples of trends that could conceivably impact future operating systems include wearable devices, such as the Apple Watch, or credit-card-sized computers, such as the Raspberry Pi. Use research and your imagination to identify other trends like these.

After your initial post, respond constructively to two of your peers’ posts by evaluating the new business requirement(s) they cited. Justify your reasoning for your comments.

To complete this assignment, review the Discussion Rubric document.

Read more

Professionalism and Social Media

I’m stuck on a Nursing question and need an explanation.

Social media plays a significant role in the lives of nurses in both their professional and personal lives. Additionally, social media is now considered a mainstream part of the process for recruiting and hiring candidates. Inappropriate or unethical conduct on social media can create legal problems for nurses as well as the field of nursing.

Login to all social media sites in which you engage. Review your profile, pictures and posts. Based on the professional standards of nursing, identify items that would be considered unprofessional and potentially detrimental to your career and that negatively impact the reputation of the nursing field.

In 500-750 words, summarize the findings of your review. Include the following:

  1. Describe the posts or conversations in which you have engaged that might be considered inappropriate based on the professional standards of nursing.
  2. Discuss why nurses have a responsibility to uphold a standard of conduct consistent with the standards governing the profession of nursing at work and in their personal lives. Include discussion of how personal conduct can violate HIPAA or be considered unethical or unprofessional. Provide an example of each to support your answer.
  3. Based on the analysis of your social media, discuss what areas of your social media activity reflect Christian values as they relate to respecting human value and dignity for all individuals. Describe areas of your social media activity that could be improved.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.

Read more

Discussion Question-Create a new thread with 700 words, be clear and concise!

I don’t understand this Programming question and need help to study.

Create a new thread with 700 words, be clear and concise!

APA format is required for both in-line references and endnote references.

Full-text PDFs of all references are required. Lack of full-text PDFs will lose half of the credit for this post.

After reading Chapter 3 in your textbook, please provide a brief response to the following assessment question.

Q1: Chapter 3 starts with the identification and the introduction of the Principles, and the characteristics of a successful IG program. Identify these Principles, and provide a brief explanation of their importance?

Text book : https://b-ok.org/book/2363786/2f8186

Textbook Link: Information Governance: Concepts, Strategies and Best Practices; 1st Edition; Robert F. Smallwood; Copyright © 2014 by John Wiley & Sons, Inc., Hoboken, New Jersey (ISBN 978-1-118-21830-3)

Read more

Landscape Architecture Essay

I’m working on a Art & Design exercise and need support.

2000 words.

Base on the project I have worked on before. Discuss this, extending to cases study and literature review.

Identify an area of study that is of academic interest and relevant to landscape architecture and an area that you want to investigate to a deeper level. The objectives of this assignment require you carry out extensive research and using the presentation format provide succinct statements to summarise a critical evaluation of the subject matter. The summary of your findings will provide evidence that you have extensive appreciation of the issues AND explain how this research relates to a design scenario (practice) or theory used to explain the deeper thinking that underpins landscape architect led solutions.

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information