ISOL 536 40 week 2

I’m trying to learn for my Computer Science class and I’m stuck. Can you help?

1) write minimum of 600 words in APA format with two references

there are three key attributes of human attackers, as follows:

• Intelligence

• Adaptivity

• Creativity

What are your thoughts on this topic? Also, please explain the three key attributes related to this subject.

2) write minimum of 400 words in APA format with two references]

How active is each threat agent? How might a successful attack serve a particular threat agent’s goals?

Read more

Activity/Reflection paper

I need an explanation for this Sociology question to help me study.

Introduction

In this paper complete all the required activities and answer the reflection questions. This assignment will help extend your understanding of the unit topics and concepts to applications in everyday life. Please respond to all of the questions in paragraph form with the question numbers labeled. You should incorporate concepts from the readings into your answers and cite the readings as needed. The paper should be 2-3 pages

Directions

Question 1

Claims making is the process of convincing the public and important public officials that a particular issue or situation should be defined as a social problem. Claims are often made by ordinary people via activism and with support of mass media through slogans, hashtags, and logos/images (see image below as an example).

Select a social problem and identify the slogans, hashtags, and logos/images that help frame the problem.

  • How do these slogans, hashtags, and logos/images define the problem?
  • How do the slogans, hashtags, or logos/images attempt to raise concern for the problem?
  • Do you think the slogans, hashtags, or logos/images are effective?
  • Is the image or definition limited in any way?
  • Would you make any changes, additions, or subtractions to the slogans, hashtags, and logos/images?

Example image:

Vehicle covered in bumper stickers with various slogans.

Question 2

After reading the blog post about the sociological imagination and social justice, answer the following questions. How does the article connect the sociological imagination to social problems? Identify examples of the intersection of biography and history. Describe the difference between a personal trouble and a public issue with examples from the reading. How is this analytic approach different than normative US cultural ways of understanding behaviors as driven by personal responsibility?

Read more

Maternity / obstretics

Need help with my Nursing question – I’m studying for my class.

M.L .is a 20-year-old female nursing student who is being seen in the OB-GYN clinic for a yearly physical.
Subjective Data
Patient asking about birth control options
States she physically feels fine, no complaints at this time
Enrolled in college for nursing
Has steady boyfriend, 1-year relationship
Sexually active
Lives on campus
Nonsmoker
Exercises 3 times a week

Objective Data
Vital signs: T = 37 P = 64, R = 12, B/P = 104/64
Weight: 135
HT: 5 ft 3 in
Last menstrual cycle = 10 days ago
Current birth control method = condoms

Questions:
1) What patient care equipment does the nurse need for this visit?
2) What personal protective equipment does the nurse or provider need to prepare for this visit?
3) Describe proper hand hygiene.
4) What other information needs to be gathered for this patient?
5) What techniques of physical assessment might be used in this visit?

6) What teaching should the nurse consider from the information gathered?

Read more

Chapter 3 presented the approach Mars, Incorporated used to implement ERM. Do you agree with the approach implemented and why? If you could change anything about the implementation of ERM in this case study what would that be and why? Would you implement

Help me study for my Computer Science class. I’m stuck and don’t understand.

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, describe in what ways the two organization’s approaches to ERM are similar. Also, explain how they differ. Choose one aspect of each ERM implementation from which the other organization would benefit and explain why.

B) Select AT LEAST 3 other students’ threads and post substantive comments on those threads, evaluating the pros and cons of that student’s recommendations. Your comments should extend the conversation started with the thread.

Your thread should be posted by Thursday and replies by Sunday. ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

NOTE: These discussions should be informal discussions, NOT research papers. If you MUST directly quote a resource, then cite it properly. However, I would much rather simply read your words.

Read more

NU 459 Health Promotion Model and Hans Selye’s Stress Theory Paper

I’m working on a Nursing exercise and need support.

Write a formal paper on the Health Promotion Model and Hans Selye’s Stress Theory. Use essay format for your paper including: a running head, title page, and reference(s) according to APA format. The body of the paper should be 2-3 pages. The paper will address the following: i. State each theory in your own words. ii. How does each theorist address nursing, person, environment, health, and illness? iii. How is the theory applicable to your practice today?

Read more

Research the various change models used by organizations today.

Need help with my Nursing question – I’m studying for my class.

Research the various change models used by organizations today. After assessing these models, create a change model conducive to your field, and that will work within your organization’s culture. This model should serve to implement a strategic process that can help your organization integrate a change and respond to the internal or external driving forces that affect organizational success.

Create a visual representation of your model using a graphic organizer of your choice (flow chart, concept map, etc.). The design of your model will be unique and relevant to your organization, based on a critical analysis of its culture and behavior. However, your model must demonstrate the necessary steps for realistic implementation. Your model will be assessed on the quality of strategic implementation you design, the support you present for your model, and inclusion of the following concepts:

  1. Methods to evaluate the need for change
  2. Approach and criteria for choosing individuals or teams necessary for a change initiative
  3. Communication strategies
  4. Strategies to gather stakeholder support and overcome resistance
  5. Implementation strategies
  6. Sustainability strategies

Once you have created your model, prepare a 15-20 slide PowerPoint presentation to present your model and demonstrate how this model is relevant to your organization and why it will work well within your organization’s culture. In conclusion, discuss why this model will lead to sustainable change when most change initiatives fail. You will utilize this change model for your final paper.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Please refer to the directions in the Student Success Center.

Read more

Consumer Behavior Blog Post-If I like you, will I like your product?

I’m trying to study for my Business course and I need some help to understand this question.

  • Select a famous celebrity who is a spokesperson, or who you believe would make a good spokesperson. Go to Twitter and review that celebrity’s most recent tweets. If you don’t have a Twitter account, sign up for a free one using the instructions in “Twitter 101.” In your blog post, explain how this celebrity influences comprehension based upon the following characteristics (Hint: See Chapter 4 in the textbook for more details):
    • Likeability
    • Attractiveness
    • Expertise
    • Trustworthiness
  • Your blog entry should be approximately two to three (2-3) paragraphs in length.
Read more

Instructions Select a newer scholarly journal article (no older than 2016 and none that have been used already in the course) relevant to the course regarding Budgetary Politics. You will conduct an article review of that scholarly journal article

I need support with this Management question so I can learn better.

Turnitin® enabledThis assignment will be submitted to Turnitin®.

Select a newer scholarly journal article (no older than 2016 and none that have been used already in the course) relevant to the course regarding Budgetary Politics. You will conduct an article review of that scholarly journal article. It must be related to the course or course materials but should not be one of the provided course readings. The intent is for students to do some external research away from the provided references and find an Article in the UIU Library. Students should search the library’s online databases, such as ProQuest, EbscoHost, and others, to find scholarly or peer-reviewed articles. Web address, blogs, news sites are not scholarly. Stick to what you find in one of the journal search engines in the library.

Additionally, the review of the journal article is an evaluation of the article’s strengths, weaknesses, and validity. It is used to inform of the article’s value through your explanation, interpretation, and analysis. As you do this, ask the major questions that are central to the review process:

1. What is the purpose of this article?

2. Why is it important to investigate or examine the subject of the article?

3. How are the authors carrying out the task? Are their methods and comments appropriate and adequate to the task?

4. What do they claim to have found out? Are the findings clearly stated?

5. How does this advance knowledge in the field?

Hint: These would make really good section titles for your paper.

Your work should consist of:

  • Introduction (this will have a well-defined purpose statement in your intro paragraph that provides guidance to the reader about what you are going to cover in your paper)
  • Body (feel free to use sub-headings if necessary)
  • Conclusion (this wraps up the key points of your work and brings your paper to a logical conclusion)

Technical Requirements:

Length: 5 pages (not including Abstract, title page and reference list), double spaced, 1″ margins, 12 pitch type in Times New Roman font left-justified format.

Citations/References: You must use APA style for this assignment.

Read more

Deliverable 5 – Threats, Risks, and Controls

I’m trying to learn for my Accounting class and I’m stuck. Can you help?

Competency

Evaluate the threats and risks associated with accounting information systems.

Scenario Information

BeGood Baking Supply is a small bakery supply company formed as a closely held corporation. The company supplies raw baking materials, paper goods, and equipment to restaurants and bakeries in three states in the upper mid-west. Most of its business, however, is located in a large metropolitan area. BeGood wants to increase its presence in the region and serve five states. In fact, the owners of BeGood would like 75% of their business to come from throughout the region rather than the current metropolitan area. In order to do this, the owners understand they must diversify offerings and lines of business.

Currently, BeGood has a phone center where customer orders are taken; these orders are then sent to shipping where the order is filled in its large warehouse and shipped within four days. BeGood outsources its shipping to a local trucking company. Once the order ships, all paperwork goes to the accounting department where it is entered into the accounting system. BeGood still uses the same accounting system it has used since the inception of the company. All aging of receivables and other analysis is done using Excel spreadsheets. Purchasing and tracking of inventory are done solely by the warehouse manager. Invoices for inventory purchasing are sent to the accounting department when goods are received.

The owners at BeGood are wondering how they can utilize an online presence and further automate its systems in order to facilitate its growth and diversify its business. The owners may also like to expand into the retail business.

You have been hired as a full-time staff accountant at BeGood Baking Supply, and have been given the task of evaluating and recommending a viable accounting information system for the accounting and financial data of BeGood in order to facilitate expansion and diversification. As you begin your research, you realize that many departments are involved in the information system, and communication is key.

Instructions

As part of the BeGood AIS assessment, you must address risks, threats, and controls in compliance with the COSO framework. You know the external auditor will also want this information, so you decide to document it now. In preparation for the company external audit, you prepare the following documentation to assist the audit team in starting their work:

  1. Document a new AIS with a flowchart that will address the size and scope of BeGood in its current form.
  2. List at least three vulnerabilities and appropriate control measures to manage the vulnerabilities for each function (department) within the flowchart.
  3. Devise controls based on threats in a general ledger reporting system.
  4. Evaluate at least one security policy or procedure that would minimize threats and risks.
Read more

Lab1 Login to Workspace

I need help with a Science question. All explanations and answers will be used to help me learn.

Reminder: The link to the VDA (Virtual Desktop Environment) is here

https://vdi.umuc.edu

The Username and Password for the Windows 7 machine (for all students)

Username: StudentFirst
Password: Cyb3rl@b

Your VM will be destroyed after 1 week.

You can create another one, put your previous work will be lost

Post questions about your AWS WorkSpace as well as forensic tool issues here.

Please navigate to the Lab Callout Box within the Content section (see Activities) for this week which also includes detailed instructions for this assignment. All links to open the appropriate documents and to launch the Citrix virtual environment will be found at this location.

Attached,find Lab Callout Box

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information