Week 7 Assignment: Analytical Essay

  

Week 7 Assignment: Analytical Essay

Required Resources
Read/review the following resources for this activity:

· Textbook: Chapter 10 (Review Chapter 8, 9)

· Lesson

· Minimum of 6 scholarly sources – at least 2 for Judaism, 2 for Christianity, & 2 for Islam (in addition to textbook/lesson)

Instructions
In a well-composed essay, complete the following:

a. Introduction: Clarify briefly what this essay will accomplish.

b. Develop a timeline showing the historical relationship among Judaism, Christianity and Islam’s beginnings. Indicate their geographical connections, founders, and any divisions within each religion.

c. Choose one element from the following list: the nature of god, the nature of Jesus, holy books, or salvation. Analyze your chosen element by demonstrating the similarities or differences among the three religions regarding your chosen element, using specific examples.

d. Examine at least two challenges that affect how all three religions currently relate to each other. Give an example of each challenge to support your observation. Further, define globalization and discuss how globalization helps or hinders this current relationship. (You can find a very good video on globalization in Week 8).

e. Conclusion: Bring your essay together by reflecting on what you learned and how it might help you in your profession going forward.

Your paper should include headings for each segment, including the introduction and conclusion, and thoughtful examples and analysis in your body paragraphs.

In addition to outside sources, make sure to reference your textbook and/or lesson.

Writing Requirements (APA format)

· Length: 1000-1200 words (not including title page or reference page)

· 1-inch margins

· Double spaced

· 12-point Times New Roman font

· Title page

· References page (Cite textbook/lesson and a minimum of 6 outside scholarly sources.)

· Page or paragraph for in-text citations

BUS550 CLA2

 

This is complete write up of your portfolio formation in a Word file, with calculations 

copied and pasted in it from your Excel file.

1.      Select the stocks of three publicly traded companies from different industries. 

State the criteria for selecting those securities.

2.      Retrieve monthly data on adjusted closing prices of your securities from Yahoo 

Finance for the past 10 years.

  1. Calculate the mean, variance, and the standard deviation of each security’s annual rate of return.
  2. Calculate the correlation coefficient between every possible pair of securities’ annual rates of return.
  3. Choose percentages of your initial investment that you want to allocate amongst the five (5) securities (weights in the portfolio). Create embedded formulae which generate statistical properties of the portfolio upon insertion of the weights. Observe the mean, the standard deviation, and the CV of the annual rate of return of the portfolio.
  4. Find the combination of the weights that minimizes CV of the portfolio. How the CV of the optimal portfolio compares with the CV’s of its constituents. What is the expected rate of return and standard deviation of the rate of return of the portfolio?
  5. Choose different values within the range of the standard deviation of the portfolio, and for each chosen value locate the corresponding point on the efficient frontier by finding the weights that maximize the expected rate of return of the portfolio. Subsequently, construct the efficient frontier of your portfolio.  
  6. Assume that you initially invested $1,000,000 in the portfolio and that the distribution of the annual rate of return of the portfolio is normal. What is the distribution of the return of the portfolio 20 years after its formation? Provide the graph of the distribution of the return of portfolio. 

Provide your explanations and definitions in detail and be precise. Comment on your findings. Provide references for content when necessary. Provide your work in detail and explain in your own words. Support your statements with six (6) peer-reviewed in-text citation(s) and reference(s).

Principles of Management Week 3 Essay

Review  the motivational ideas or theories addressed in the readings for Unit   III. Using  yourself as an example, do you feel that one or more of the ideas   or  theories  are particularly effective in motivating you, or is there a  better  way  you can be motivated?

  • Engage   the reader in the topic with some form     of creative “hook”          (such as a   story, quote, or example).
  • Provide   an example of a situation in which a     leader used one of        these theories to   successfully motivate you.
  • Next,   provide an example of a situation where     an attempted        motivational tool did   not     work.
  • What   was it about the second example that did     not work? Explain your          answer.

Your essay submission must be at least four pages in  length. You are   required to use at least one outside source to support your  explanation. Your   essay should be formatted in accordance with APA style.

Referaces for homework: 

NISTORESCU, A.-M. (2012). The Importance of Communication Skills for Business Professionals. Annals of Eftimie Murgu University Resita, Fascicle II,  Economic Studies, 516–523. Retrieved from https://libraryresources.columbiasouthern.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=92535248&site=ehost-live&scope=site

  

Pignatelli, A. (2015). 4 Ways to Boost Employee Performance and Job Satisfaction. Government Executive, 1. Retrieved from https://libraryresources.columbiasouthern.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=108835565&site=ehost-live&scope=site

Benson, D. (2015, September-October). The five fundamental tasks of a transformational leader. Physician Leadership Journal, 2(5), 58+. Retrieved from http://link.galegroup.com.libraryresources.columbiasouthern.edu/apps/doc/A431445071/AONE?u=oran95108&sid=AONE&xid=5201719c

Quick, T. L. (1988). Expectancy Theory in Five Simple Steps. Training & Development Journal, 42(7), 30. Retrieved from https://libraryresources.columbiasouthern.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=9083413&site=ehost-live&scope=site

Module 2 Discussion Post 2

Directly respond to at least one classmate in a way that extends meaningful discussions, adds new information, and/or offers alternative perspectives.

Joe: What are ancillary services? 

Ancillary services are services provided to patients of certain populations that support the work of the primary care providers. There are a wide range of ancillary services that fall into three categories; diagnostic, therapeutic, and custodial. Examples of ancillary services are laboratory for lab studies for patients with high cholesterol, infection, or diabetes; physical therapy for orthopedic and stroke patients; and long term nursing facilities for patients that are unable to care for themselves due to their medical / health condition or do not have a caregiver. Approximately 30% of healthcare spending is used on ancillary services.

How do ancillary services offered in rural and urban areas differ?

Ancillary services in rural areas are a scarce resource compared to urban areas. There are not as many facilities that provide ancillary services and may require longer travel time in rural areas. The healthcare workforce in general are more densely concentrated in urban areas than rural areas. According to the Rural Health Information Hub(n.d.), 20% of the population lives in rural areas however only 11% of providers work in rural areas.

Regarding ancillary services, what are some disadvantages to consumers (patients) living in rural populated areas? 

Lack of access, long travel time and distance to facilities that provide ancillary services are some of the disadvantages of the rural population. There may also be inability to pay for services even with insurance coverage but according to Rural Information Hub(n.d.), 9% of those who live in rural areas do not have insurance.  According to Douthit, N., et al (2015), “Reluctance to seek health care in rural areas was based on cultural and financial constraints, often compounded by a scarcity of services, a lack of trained physicians, insufficient public transport, and poor availability of broadband internet services.” 

What recommendations would you provide as a health care leader to lessen these disadvantages? 

As a health care leader, I would increase resource availability and access in my facility by becoming affiliated with a large healthcare network to improve or add ancillary services. According to Oyeka, O., et al. (2018), “System affiliations may provide rural hospitals access to technology, staff recruitment and retention, expanded health care and operational services, group purchasing, and reduced cost of capital.” The larger network will introduce resources that are sufficient enough to provide ancillary services. The rural medical facility would then be able to provide face to face and telehealth services that might not have available in the past. By becoming affiliated with a large health care network, there will be changes in some of the control within the rural facility but that will also improve delivery, quality, and availability of services.  The affiliation will eliminate some of the barriers to receive needed ancillary services but not all. Some of these barriers such as transportation might be more challenging to overcome, there are resources available to set up some sort of transportation system through the healthcare network, such as a shuttle or car service.

References

Douthit N, Kiv S, Dwolatzky T, Biswas S. Exposing some important barriers to health care access in the rural USA. Public Health. 2015 Jun;129(6):611-20. Retrieved from: doi: 10.1016/j.puhe.2015.04.001

Cyr, M.E., Etchin, A.G., Guthrie, B.J. et al. Access to specialty healthcare in urban versus rural US populations: a systematic literature review. BMC Health Serv Res 19, 974 (2019). Retrieved from https://doi.org/10.1186/s12913-019-4815-5

Oyeka, O., Fred Ullrich, F., MacKinney, A., Lupica, J., & Mueller, K. (2018) The Rural Hospital and Health System Affiliation Landscape – A Brief Review. Retrieved from https://rupri.public-health.uiowa.edu/publications/policypapers/Rural%20Hospital%20and%20Health%20System%20Affiliation.pdf

Healthcare Access in Rural Communities. Retrieved from https://www.ruralhealthinfo.org/topics/healthcare-access#services

Rural Health Disparities Retrieved from https://www.ruralhealthinfo.org/topics/rural-health-disparities

QUICKBOOKS ASSIGNMENT 1

Import your chart of accounts.
If you have previously used this QuickBooks company to complete your ACC-250 assignments, you will already have your chart of accounts imported and may skip this step.
Go to QuickBooks and login to your company. From the menu on the left side of the screen, choose “Accounting” and select “Chart of Accounts.” Click on the green “New” at the upper right-hand side of the screen and choose “Import.” Using the “Browse” function, select the “ACC-260 QuickBooks Import File” provided in topic materials. Click “Next.” Click “Next” again, and then click “Import.”

Step 2:
Update your chart of accounts to include accounts related to a manufacturer.
To convert your QuickBooks service company’s accounting system to that used by a manufacturing company, you will need to create eight new General Ledger accounts.
Those accounts are:
1. Raw Materials Inventory
2. Work in Process Inventory
3. Finished Goods Inventory
4. Wages Payable
5. Factory Overhead
6. Sales Revenue
7. Cost of Goods Sold
8. Selling and Administrative Expenses
Go to QuickBooks and login to your company. Choose the “Accounting” menu from the left hand side of the screen, and select “Chart of Accounts.” Click “New” (green button on the upper right side of the screen).
Enter the “Account Type,” “Detail Type,” and “Name” for each of the accounts listed above. You must determine the Account Type and Detail Type based upon your understanding of these accounts as learned in class. Enter “Save and New” to enter another account. “Save and Close” when you have entered all accounts.

Step 3:
Record the owner’s investment in the company inventory.
On July 1, 2021, you, the company owner, have invested $15,000 of your own money into the business in order to purchase the inventory owned by a small manufacturer. The manufacturer that you bought out had $800 in Raw Materials Inventory, $1,200 in Work in Process and $500 in Finished Goods Inventory. The remainder of the cash that was not spent was put into the company’s cash account.
Go to QuickBooks and login to your company. Click the “+ New” button at the upper left hand corner of the screen. Choose “Journal Entry” under the “Other” column. Enter the “Journal Date” of “7/1/2021” and notice that the journal entry number will auto-populate. Journalize the transaction described above.

Step 4:
Enter the following entries for the month of July 2021.

A. Cash sales of inventory: $800. The cost of inventory sold was $350.
B. Selling and Administrative expenses incurred and paid: $1,200.
C. Raw Materials purchased on account: $2,560.
D. Materials requisitioned and used in production: $980.
E. Direct Labor wages incurred during July: $2,875. Direct Labor wages actually paid in July were $2,000.
F. Factory Overhead was allocated to Work in Process Inventory at a predetermined overhead allocation rate of 60% of Direct Labor costs incurred during July.
G. The cost of product completed and moved to the Finished Goods Inventory: $4,675.
H. Sales on account: $2,000. The cost of the units sold was $975.
I. Actual Factory Overhead costs for the month of July totaled $2,600. (All paid in cash.)

These journal entries should be input into QuickBooks using the directions provided in Step 3. All entries should be dated “July 31, 2021,” and should be auto-numbered through QuickBooks. For the “Description,” enter “Journal Entry” and the letter of the adjustment from above. (For example, the description of the first Journal Entry would be “Journal Entry A.”)

Step 5:
Adjust for over or underallocated overhead to Cost of Goods Sold.
Once you have completed Step Five above, prepare and enter the necessary adjusting entry to correct for the overallocated or underallocated Factory Overhead. This entry should be input as an entry dated “July 31, 2021” using the directions provided in Step 3. For the “Description,” enter “Journal Entry J.”

Step 6:
Prepare the financial statements.
Once you have entered the required journal entries from Steps 2-5, choose the “Reports” menu from the left hand side of the screen. Scroll down to the “Business Overview” menu and choose “Profit and Loss.” This is the company’s income statement. Choose “Custom” for the date description and enter the dates “7/1/2021” to “7/31/2021.” Click “Run Report.” Save the Profit and Loss statement as a PDF file named “LastnameFirstinitial.ACC260.QB.PL.”
Choose the “Reports” menu from the left hand side of the screen. Scroll down to the “Business Overview” menu and choose “Balance Sheet.” Choose “Custom” for the date description and enter the dates “7/1/2021″ to “7/31/2021.” Click “Run Report.” Save the Balance Sheet as a PDF file named “LastnameFirstinitial.ACC260.QB.BS.”

Login details will be provided. 

APA paper assignment

 Topic:  Are electric vehicles better for the environment? Start your research by reading this article from Forbes magazine: https://www.forbes.com/sites/jamesellsmoor/2019/05/20/are-electric-vehiclesreally-better-for-the-environment/#5609f23876d2. 

 Essay Assignment 2: 

Documented Argument in APA Your argumentative essay will be on an environmental topic from the list of options below. Consider your audience for this paper to be your peers. 

The essay should be between 3 ½ and 4 pages (850 to 1,000 words) in length, not including the cover page, abstract, or reference page. It should be double spaced in Times New Roman 12 point font and must include: 

• An introduction, a minimum of 3 body paragraphs, and a conclusion

 • a clearly articulated thesis that states the claim, position, or stance that your essay will prove in the introduction to your paper

 • 4 cited sources 

• At least 4 quotes from your sources 

• Topic sentences that focus the discussion in the body paragraphs • Examples, details, and explanations, and other researched evidence in the body paragraphs that clearly support the claim of your thesis

 • Counterarguments and refutations that show you understand the complexity of your argument and can accurately acknowledge the views of the opposition and refute them

 • Clear connections between ideas from paragraph to paragraph and within paragraphs 

• Proper APA style format in the cover page, in the abstract, in the in-text citations, and in the Reference page (see the template and instructional video for creating the APA format) 

• Reference page listing a minimum of four sources

 • Standard usage, grammar, and mechanics IMPORTANT INFORMATION: ➢ You will submit your final draft through the Turn-it-in drop box designated for this purpose in the course. Please be aware, that although Turn-it-in does allow for similarities for quotations up to 24% of your paper, any similarity above 24% is considered too high for an original paper and will be flagged as plagiarism. ➢ You can get help with your paper at any of the campus writing centers (see the link in the course with this information), and you can also receive online help via SmartThinking, the online tutoring service provided by the College. This service is available by clicking on SmartThinking in the left-hand menu bar of the course under Tools & Resources.  

Your APA paper assignment in this module will consist of the following sections:

  1. First two pages: Title page and abstract
  2. The introduction, body paragraphs, and conclusion of your essay, formatted as you would an argument. You may include subheadings for the major points in your argument, but it is not strictly necessary for this assignment.
  3. The list of references formatted in APA style at the end of the paper

DUE 6/10/2021…PLEASE READ AND FOLLOW ALL INTRUCTIONS LISTED BELOW…NO PLAGARISM

 

Assignment Directions

  1. Read over each of the following directions, the required Reading Research Literature worksheet, and grading rubric.
  2. Review the video below these directions, which contains a tutorial for your Week 6 Assignment. Tutorial may look slightly different session to session. Grading criteria and rubric will be the same. 
  3. Download and complete the required Reading Research Literature (RRL) worksheet (Links to an external site.). This must be used. 
  4. Your required article is available to you in an announcement: IMPORTANT: Assigned Article for Week 6 Assignment. Please go to your announcement to locate the required article assigned for this session.
  5. This assignment contains:
    • Purpose of the Study:  Using information from the required article and your own words, summarize the purpose of the study.  Describe what the study is about. 
    • Research & Design:  Using information from the required article and your own words, summarize the description of the type of research and the design of the study.  Include how it supports the purpose (aim or intent) of the study.
    • Sample:  Using information from the required article and your own words, summarize the population (sample) for the study; include key characteristics, sample size, sampling technique.
    • Data Collection:  Using information from the required article and your own words, summarize one data that was collected and how the data was collected from the study.
    • Data Analysis:  Using information from the required article and your own words, summarize one of the data analysis/ tests performed or one method of data analysis from the study; include what you know/learned about the descriptive or statistical test or data analysis method.
    • Limitations:  Using information from the required article and your own words, summarize one limitation reported in the study.
    • Findings/Discussion:  Using information from the required article and your own words, summarize one of the authors’ findings/discussion reported in the study. Include one interesting detail you learned from reading the study.
    • Reading Research Literature:  Summarize why it is important for you to read and understand research literature.  Summarize what you learned from completing the reading research literature activity worksheet.
  6. You are required to complete the worksheet using the productivity tools required by Chamberlain University, which is Microsoft Office Word 2013 (or later version), or Windows and Office 2011 (or later version) for MAC. You must save the file in the “.docx” format. Do NOT save as Word Pad. A later version of the productivity tool includes Office 365, which is available to Chamberlain students for FREE by downloading from the student portal at http://my.chamberlain.edu (Links to an external site.). Click on the envelope at the top of the page.
  7. Submit the completed Reading Research Literature Worksheet to the Week 6 Assignment.

Best Practices

  • For questions about this assignment, please contact your instructor.
  • Spell check for spelling and grammar errors prior to final submission. 
  • Please see the grading criteria and rubrics on this page.
  • Please use your browser’s File setting to save or print this page.

Scholarly Sources and Citations 

  • Use APA format in citations and references.

Counseling Latino Children in Education

 

Assignment Instructions

A) The group you’ve selected      (Latino children in education)                                                                        Answer these questions within the paper   Research on perceived biases people may have in the United States about  Latino children being able to be successful in education.  Also, what preconceived biases or prejudices could be altered by this research.  The tree biases to focus on are as follows: (1.  Latino children are unable to learn in school due to having another language as their first language, 2.) What is the level of involvement with Latino parents in the education process such as activities, parent-teacher conferences or other school requirements.  3.) How would counseling Latino children assist them in being successful in the education process.                                                                                                             Assignment 6 are as follows: Your task is to connect with and conduct in-depth research on Latino children 

  • Step 1: Conduct in-depth research on the chosen (Latino children) culture/group. Search for historical documents, texts, videos, documentaries, musical heritage, world cinema and TV shows, Ted Talks, online worship services, local food establishments, etc. that will provide a well-rounded view of the culture or group.

  • Step 3: Construct a comprehensive and cohesive paper outlining all that you have learned about the culture/group.  Note: (8 to 10 page paper discussing the 3 biases or prejudices mentioned above, APA format with at least 4 references.)

Using R ONLY

 

eview the attached file. Suzie has an issue. She can either move to NY or FL and needs to review some data that her agent gave her. The agent reviewed house prices and crime ratings for houses that Suzie would be interested in based on her selection criteria. She wants to live in an area with lower crime but wants to know a few things:

  1. Is it more expensive or less expensive to live in FL or NY?
  2. Is the crime rate higher in FL or NY (Note a low score in crime means lower crime)?
  3. Is the crime rate higher in lower or higher house price areas?

Using the R tool, show the data in the tool to answer each of the questions. Also, show the data visualization to go along with the summary.

  1. If you were Suzie, where would you move based on the questions above?
  2. After you gave Suzie the answer above (to #4), she gave you some additional information that you need to consider:
    1. She has $100,000 to put down for the house.
    2. If she moves to NY she will have a job earning $120,000 per year.
    3. If she moves to FL she will have a job earning $75,000 per year.
    4. She wants to know the following:
      1. On average what location will she be able to pay off her house first based on average housing prices and income she will receive?
      2. Where should she move and why? Please show graphics and thoroughly explain your answer here based on the new information provided above.

Note: The screenshots should be copied and pasted and must be legible. Only upload the word document. Be sure to answer all of the questions above and number the answers. Be sure to also explain the rational for each answer and also ensure that there are visuals for each question above. Use at least two peer reviewed sources to support your work.

Network Security & Managing Information Security

  

                                                Network Security

1) In no less than 250 words, describe the various type os encryption defined by the National Security Agency (NSA). In many cases military applications need type 1 encryption to secure its communications. What does this mean and how does it differ from the other types of encryption.

2) In no less than 250 words, describe what an OCSP server is and what is its purpose in securing a network. Even though the textbook doesn’t mention it, this is a scheme used often when doing certificate-based authentication.

3) In no less than 250 words, explain why a network engineer would enable IEEE802.1X on a Cisco switch port. Give a scenario where this would be relevant. Also write down the IOS configuration to enable it on a switchport.

4) In no less than 250 words, describe why it is advisable to use SSH instead of Telnet to connect remotely to a Cisco router to manage it. Explain the reason why that is and write down the Cisco IOS configuration to enable SSH for remote connectivity. 

5) In no less than 250 words, describe the difference between a fat AP and a thin AP. What is needed to deploy a thin AP? Are there any security considerations to think about between the 2 different APs?

6) In no less than 250 words, describe a type of email threat and how a hacker can use it to get sensitive information. How can a network administrator prevent this type of attach from happening?

7) In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network. How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution? 

8) In no less than 250 words, describe a hacking tool that is used to gain access to a network. Explain how the tool is used, how it works and how a network administrator can prevent this tool from access the network.

9) In no less than 250 words, explain what is meant by an IDS and an IPS. How are they different? How are they connected to a network? List a few examples of IDS/IPS tools that are currently on the market.

10) In no less than 250 words, explain the difference between an access control list (ACL) that is used in routers to block traffic and firewalls. What similarities do they share?

11) In no less than 250 words, explain the different security measures that each version of SNMP uses. What is the different between SNMPv1, v2c and v3?

  

                          Managing Information Security

1) If you were asked by your employer to develop a new Information Security Policy, where would you turn to find resources to build this policy? List the two most important items you would include in this new policy and explain why you felt these were most important.

2) What do you believe to be the most compelling reason to migrate information to the cloud? What is your biggest security concern about doing so?

3) Many believe that cloud computing can reduce the total cost of computing and enhance “green computing” (environmentally friendly). Why do you believe this to be correct? If you disagree, please explain why?

4) Explain in your own words why you believe planning is important. Select one of the following businesses: a large bank, a government agency, or a hospital, and explain which systems you feel are mission critical. Then explain how the loss of these systems would affect the organization.

5) Have you or someone you know ever received a chain letter, phishing message, or some other fraudulent message via email? If so, please share this experience. Explain what type of message it was and what you did to get rid of it.

6) What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Something else? Discuss this question and provide support for your answer.

7) In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability.

8) Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?

9) Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted).

10) What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices?

11) A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all these skills are necessary?

12) If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security?