Power point assignment

You will be working to conduct research pertaining to a specific conspiracy theory within United States OR World History. You will do fact-based research to find the true historical event, the conspiracy theories surrounding that event, the debunking of at least one conspiracy theory, and what you believe really happened. The overall project will be graded according to your job performance. You need to use PowerPoint.

You will need to choose a conspiracy theory within US History OR World History.

  • •Your project should have the following basic information:
    • oHistorical account of what took place
    • oDifferent conspiracy theories behind/about what happened
    • oDebunking of at least one conspiracy (one you believe did NOT happen)
    • oConspiracy Theory student agrees with and believes (prove it!)
  • •Little things to remember:
    • oEach slide of information will need to include words and pictures; remember, do not write a book about each theory on the presentation – quick and to the point!
    • oRemember this is a presentation, not a report!!!!!!
  • •You will be responsible for finding at least 3 different sources for their works cited page
    • oMake sure that each source is from a valid and trustworthy website
    • oOn the works cited slide, please break down each source based on the person who wrote it
  • •Below is a sample of what a PowerPoint could look like:
    • oSlide 1- Introduction page with conspiracy theory.
    • oSlides 2-5– Accurate history of what took place for that particular situation (how is it relevant)
    • oSlides 68– Different conspiracy theories that go with the particular situation (what are they, why/how did they begin)
    • oSlides 911– Reasons why conspiracy theories are probably not true, and an overall summary of what the group believes on the situation (debunk at least one theory)
    • oSlides 12-13 – A conspiracy theory you believe is actually true (evidence that leads you to this conclusion)
    • oSlide 14 – Impact of Conspiracy Theory on History
    • oSlide 15– Works Cited Page

Leadership Theory Paper

 

Write a 2-3 page short paper that addresses the following:

(1) Why are Transformational and Transactional leadership considered to be contrasting forms of leadership?

(2) In what types of situation or organization might these different styles of leadership be used?

(3) Which of these two do you think is the most effective style of leadership for the modern workplace? 

Remember that there are 3 parts to the question, so be sure to allocate sufficient attention to each part.   Try and show how you have related your analysis to the module reading, so define your terms, and then show an understanding of the concepts by demonstrating how and where each of the different styles of leadership might be used.  The final part of the question needs you to think about how the modern workplace is evolving and then to make a reasoned judgment as to which style of leadership is the most appropriate.  Most importantly, you need to show why.

Your paper should include the following:

  • 2 to 3 double-spaced pages in length (not including the title page or reference page) and formatted according to APA style, as outlined in your approved style guide. 
  • A minimum of 2 references that are used and cited in the paper 

New Works 04/19

Work #1:

Explain in 500 words or more what NIST Is and how it should be used by a dba.  

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format.    

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. 

Work #2:

Your Research Project is due this week. It must consist of:

1. 5 source annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

Note: Please find the attachment for Work #2 which prepared by you previously select that topic for this work

Work #3:

Complete the final case study PowerPoint Presentation on “Nike company”. 

Final Case Study PowerPoint Presentation

Guidelines:

  1. Must include (Company Name, New England College, Course Title and Semester, Date, and Your Name)
  2. Introduction on the company (overview), what does the company do, what product or service does it offer, and where is it located (headquarters)
  3. Who are its main competitors (list all competitors)?
  4. What is the market structure (e.g. pure competition, monopoly, oligopoly, etc.)?
  5. How is it regulated?
  6. What they got wrong analysis detailing a strategy mistake using the course concepts
  7. What they got right analysis detailing a strategy win using the course concepts

 The Presentation must be organized in the following way:

  • Title Slide
  • Concise with sections clearly defined
  • 10-12 slide minimum (title, conclusion, reference, and question/answer)
  • At minimum 10 minutes in length
  • All slides must have speaker notes
  • No grammar, spelling, punctuation, or typing errors
  • Please review the sample PowerPoint presentation that’s attached. The sample presentation is a guide and should help with understanding expectations.

Note: Please find the attachment for Work #3 which is a sample PPT.

Supply and Demand in a Global Market

 

Assignment 1: LASA 2: Supply and Demand in a Global Market

Answer the following questions using examples and applications from the readings.  Justify your answers using economic concepts and ideas as they apply. Each response should be between 100-200 words.

Questions:

  1. The demand for labor is said to be a “derived” demand.  What is the meaning of a derived demand? How does this concept help to determine the demand for labor?
  2. What are some of the factors that determine the supply of labor in a market? What significant factors have changed the supply of labor over the last twenty years?
  3.  How does a firm determine its prices and the quantity of labor required in the resource market during a specific period? 
  4.  Why do income inequalities exist?  How are income inequalities measured? How have income inequalities changed from 1980 to the present?
  5. What is the role of the U.S. government, in terms of dealing with the problem of income inequalities?  What are the arguments, for and against, government involvement in this area?
  6. Why do nations trade?  What is meant by the concept of “Comparative Advantage”?  Could a nation be better off economically, if it practiced an isolation policy?
  7. The United States has had a significant trade imbalance for several years.  What are the problems associated with having a negative trade balance?  What can be done to correct the imbalance?
  8. How are exchange rates determined?  What is the significance of currency devaluations to the home country?  To other countries?

Collate your answers in an MS Word document and save it using the filename LastnameFirstInitial_M53A1. Submit it to the Submissions Area by the due date assigned.

Remember, quotations, paraphrases, and ideas you get from books, articles, or other sources of information should be cited using APA style

Design a Strategy for Securing the Operation of a Web Application Overview

 

  1. Design a Strategy for Securing the Operation of a Web Application
    Overview
    Your team received an assignment to develop and deliver a new company Web application for outsourced suppliers to use as they help support your company’s production resources. The IT director recently returned from an OWASP conference in India and insists that the app will have strong security. As he walked out the door from your initial project briefing the IT director said, “I do not want to wait 200 days after an exploit to hear about it. If something happens, I want to know yesterday.”
    Instructions
    The project specs require a multi-page design. The app will need to provide an interface to your company’s supply database for reading and entering data remotely as well the ability to contact, via the e-mail server, your company supply managers. In an effort to save money, management decided that the team will use some open source software library modules.
    Fully discuss, in 3–5 pages, the process that your team would follow to create and deliver that Web application.

    1. Provide at least six steps in the SDLC during which security strengthening behaviors will be applied.
    2. Explain the specific security relevant actions taken during each step to include the people involved, the considerations taken and security assurance methods used.
    3. Identify and briefly explain at least three different security testing methods and indicate which methods analyze the app’s front end, source code, or vulnerabilities while the app is running. Justify when you would use each method.
    4. Explain at least six different vulnerabilities that could potentially affect your app and actions that your team could take to prevent each.
    5. Go to Basic Search: Strayer University Online Library to locate and use at least four quality sources in this assignment.
    6. This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
    7. The specific course learning outcome associated with this assignment is:
    • Propose a strategy for securing the operation of a Web application.
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
  3. Institution Release Statement

What is the Doctrine of Discovery and why is it important?

  

Guidelines
• For this discussion, post a minimum of 300 words
• Post must have a minimum of five (5) sources, including a minimum of 2 legal sources Use in-text citations and include a reference list in your discussion response. Be sure to cite all legal sources (such as cases and statutes) and add each case to the reference list in the legal format. All references should be included as at least one citation in the body of your post.

• Use in-text citations and include a reference list in your discussion response. Be sure to cite all legal sources (such as cases and statutes) and add each case to the reference list in the legal format. All references should be included as at least one citation in the body of your post. https://weassistessays.com/essayquestions/
• All posts need to be substantive and refer to the required reading in Uneven Grounds, Professor Smith’s lecture videos, and legal sources (cases and statutes listed in the unit).

• Add each question as a heading before the response to the question.
• Do not use outside sources.
• Do not use quotations in your discussion posts. Use your own words
Question/Assignment:
What is the Doctrine of Discovery and why is it important? Finally, consider why it is important for as a student of legal studies to understand https://convenienthomeworkhelpers.com/blog/ the Discovery Doctrine and its importance.

Hello! I need a paper for my philosophy class. It should be 1.300 words or more. heres all the indications that the professor gave us.

  BOOK for the info: Doing Philosophy: An Introduction Through Thought Experiments 5th/6th Ed., (DOPH). Schick, T and Lewis Vaughn eds. McGraw Hill Press, (2012/2019)

The basic requirements of the paper 

  The paper must be 1200-1500 words long minimum (but can be longer).  

You must CITE your sources!  (You choose the style/format. There are paper writing resources at the end of the instructions that can help with this among other aspects of writing a paper). 

  You will be uploading your finished paper to Turnitin (via canvas).  

NO OUTSIDE SOURCES!!! Only material from our textbook and canvas. 

  If you were to ask 10 people, “How do I write a paper?” you’d probably get 10 different responses. No one seems to know exactly how to do one,  yet almost everyone is assigned one at some point in his or her academic career. Here is a guide to what faculty are usually “looking for” in a well-written paper. So, I will outline what your paper should look like below.  

  Remember, however, that every faculty member is different: some will want you to spend more time “analyzing” or “evaluating” the piece,  others on giving your personal reactions to it. The best rule of thumb is to ask your professor for clarification. Here is mine:  

  I repeat: There is a word minimum of 1200 words but a decent paper should be closer to 1400-1500. There is no word maximum.  

I. Thesis, Argument, and Conclusion. 700 words or so. 

Goal: Produce a short argumentative piece including an expository section.  

  This should be your introduction (to the question/issue at hand), an explanation of the fundamental traits of a philosopher, and then your argument section for Socrates.  

Note: Your introduction should include an inclusive thesis for the whole paper. That means, it must lay-out what you are trying to accomplish over the whole of the paper (ie, both sections I and II).  

You must first explain what it means to be a philosopher. You need to identify and explain three traits that embody what it means to be a philosopher. You can use all and only the class material on canvas or in the textbook.    You need to explain each trait without reference to Socrates. You should use examples of the traits as well as explain the traits themselves.  

The next section of the first part of your paper should be your argumentative case for Socrates.  Remember, you will be using all the applicable material from Unit 1 to make your case for whether Socrates should be considered a paradigmatic philosopher. How does Socrates meet these standards (or criteria)? Make arguments and give evidence/support!   

II. Final addendum/Your Epilogue: What about you? 500 words or so.  

Goal: Answer these questions: Reflecting on the three traits above (from section I), am I a  philosopher? Why or Why not? Give examples/evidence. What do you, or could you, gain from being a philosopher?  

  ————-  

  FOR MORE HELP on HOW TO WRITE a paper– These are helpful guides and should not be followed if they contradict the above structure/instructions. Please ASK ME or check the links below for further help or clarification.  

LINKS:

  Here is a link to the reading:   http://classics.mit.edu/Plato/euthyfro.html (Links to an external site.)   Some links about Socrates:   Who Was Socrates? – 8-Bit Philosophy (Links to an external site.)    (Links to an external site.)   Being Philosophical/Being Socrates/Questioning Our Ways of Life, Traditions, etc…:   PLATO: The Allegory of the Cave (Links to an external site.)  

Reflecting on how we live our lives (Death, Kierkegaard, and the Lex Fridman podcast with Soloman) 

Most people tranquilize themselves with the trivial (Links to an external site.)

Being Socratic with Philosophy Tube and Adam Ruins everything (on Expertise)   Who’s Afraid of the Experts? | Philosophy Tube ft. Adam Conover (Links to an external site.)   Gurus, more like No-rus!   The Truth About “Trading Gurus” From a Hedge Fund Manager (Links to an external site.)   Right to Repair Socrates   https://youtu.be/kd3Qa9tlA3o (Links to an external site.)   Being an expert and being able to explain yourself   Astrophysicist Explains Gravity in 5 Levels of Difficulty | WIRED (Links to an external site.)   Other/Funny   Bill and Ted and Socrates  (“that’s us, dude!”)   Bill and Ted and Socrates  (“that’s us, dude!”) (Links to an external site.)   

post 10

(Please respond to this post)

Public Health Professional to Understand the Immune System

   Understanding the immune system is important because it will help public health professionals take the appropriate approaches or steps in implementing and motivating community educators to create programs (e.g., nutritional strategies) that will influence and encourage individuals to take charge of their health and embrace healthier eating lifestyle or nutritious foods. The idea is that nutrient-rich foods contain vitamins, minerals and not too many calories. vitamins and minerals are micronutrients which maintain the human’s body and help keep it healthy (AAFP, 2021). Calder et al (2020) talked about how various mechanisms and clinical data have shown that vitamins such as A, B6, B12, C, D, E, zinc, ion, folate, omega-3 fatty acids and others play a significant role in supporting the immune system. That is, adequate intake of these vitamins are essential  for a strong immune system (Calder et al., 2020). As Calder et al (2020) explained, inadequate intake of these important nutrients can lead to a decrease in resistance to infections; and as a result, can cause  an increase in the burden and progression of disease (Calder et al., 2020). For example, in a study that focuses on “comprehensive understanding of the gut mucosal immune system in allergic inflammation” showed how nutritional approaches have been analyzed to treat allergic diarrhea (Tokuhara et al., 2019). The study demonstrated that vitamins A and B can induce and maintain certain cells (e.g., Tregs cells or T cells), which involves the utility of vitamin supplementation in children against food allergy (Tokuhara et al., 2019). In addition, Vitamin A and metabolites partake in the process of gut mucosal homeostatic network (Tokuhara et al., 2019). Other examples of how this knowledge may be used in public health practice are the use of vaccines because of the ability to stimulate the immune system by resembling a natural infections and also the reinforcement of handwashing as this will help decrease the spread and impact of infections (Calder et al., 2020; Battle, 2009).

Public Health Professional to Understand the pathophysiology of Inflammation

   It is important for a public health professional to understand the pathophysiology  of inflammation as Battle (2009) indicated that understanding inflammation is being able to recognize the body’s response to injury (e.g., pain, redness and swelling). Moreover, Inflammation is a frequent constituent of many injuries that are due to a great number of different environmental hazards. Another reason is because to a certain extent, nearly every chronic illnesses in the body involve chronic inflammation such as osteoarthritis, chronic hepatitis, atherosclerosis, cardiovascular disease and rheumatoid arthritis (Battle, 2009). Therefore, being knowledgeable or aware of the diseases that lead to inflammation can encourage or motivate a public health professional to establish or engage in prevention measures (Battle, 2009). Other examples of how this knowledge may be used in public health practice are that, once a public health professional has a thorough understanding of the role of chronic and acute inflammation of a disease, this knowledge would help in the regulations of health policy that are in place to control exposure to numerous environmental hazards. In addition, understanding the pathophysiology of inflammation would help guide the day-to-day use of medications ( e.g., aspirin, anti-histamines, steroids, and non-steroidal anti-inflammatory agents) for the relief of signs and symptoms of inflammation (Battle, 2009). For example, Elliot et al (2019) demonstrated how inflammation can contribute to two or more chronic conditions in one patient. In other words, inflammation can play a significant part to what is called multimorbidity as well as adverse outcomes associated to multimorbidity, specifically individuals experience functional limitations that lead to disability. So understanding inflammation is key for future work in examining multimorbidity formulations and the differences in severity between conditions (Elliot et al., 2019).

Public Health Professional to Understand Carcinogenesis

   It is important for a public health professional to understand carcinogenesis as this knowledge will help in cancer prevention research, which emphasis is about reducing the rate of occurrence or mortality from cancer. One example is that, understanding carcinogenesis or the development of cancer can help in prevention approaches of delaying or blocking steps in the process of cancer development (Battle, 2009). Moreover, Battle (2009) talked about a recent and widely public health challenge about overweight and obesity in both children and adults and concluded that individuals who are overweight and obese are likely or at an increased risk of developing tumors in various organs of their body. As a public health professional, understanding this health challenge or the “highly complex process” of cancer can guide and provide knowledge to a public health professional in the implementation of educational programs and the development of policies that focus on diet and obesity such as promoting healthy eating habits, for instance, reduced calorie intake (Battle, 2009). According to Battle (2009), studies have shown that many dietary compounds (e.g., high-fat-diet, heavy meat) are known to be carcinogens whereas others have been shown to decrease the risk of cancer; therefore, another example of how this knowledge may be used in public health practice would be for public health professional to continue to put emphasis toward cancer research and prevention that would lead to the reduction or exposure of certain dietary compounds in other to prevent carcinogenesis (Battle, 2009; Hoare et al, 2019).

socw6070-wk4Dis-Discussion 1: Looking Through Different Lenses

 

As a social worker, you bring your own lens—that is, your own set of assumptions, biases, beliefs, and interpretations—into your interactions with clients and the human services professionals with whom you collaborate. Human services organizations have their own cultures that influence their organizational lenses. An organizational lens reflects key assumptions about the individuals to whom the organization provides services. These assumptions influence the organization’s policies and procedures which, in turn, impact service delivery. For example, an organization that focuses on understanding the perspectives of the clients it serves may allow clients to provide feedback about their client experience through membership on advisory boards or boards of directors. The clients may have the power to make recommendations and decisions about the organization’s policies and procedures.

Understanding cultural lenses—your personal lens, as well as those of the organizations and other individuals with whom you work and interact—will enable you to better serve your clients.

Focus on the Paula Cortez case study for this Discussion. In this case study, four professionals present their perspectives on the Paula Cortez case. These workers could view Paula’s case through a variety of cultural lenses, including socioeconomic, gender, ethnicity, and mental health. For this Discussion, you take the role of the social worker on the case and interpret Paula’s case using two of these lenses.

By Day 3

Post how you, as a social worker, might interpret the needs of Paula Cortez, the client, through the two cultural lenses you selected. Then, explain how, in general, you would incorporate multiple perspectives of a variety of stakeholders and/or human services professionals as you treat clients.

Support your post with specific references to the resources. Be sure to provide full APA citations for your references.

 

Required Readings

Northouse, P. G. (2013). Leadership: Theory and practice (6th ed.). Los Angeles: Sage Publications
Reprinted by permission of Sage Publications via the Copyright Clearance Center.
Chapter 15, “Culture and Leadership” (pp. 383–421)

Chun-Chung Chow, J., & Austin, M. J. (2008). The culturally responsive social service agency: The application of an evolving definition to a case study. Administration in Social Work, 32(4), 39–64.

Required Media

Laureate Education (Producer). (2014a). Cortez case study [Multimedia]. Retrieved from https://class.waldenu.edu

Optional Resources

Walden University. (2014). Master of Social Work home page. Retrieved from https://class.waldenu.edu
Visit the Master of Social Work interactive home page to explore resources available to 

Operation security

 

The following scenario is based on an actual attack deconstructed at a seminar I attended earlier this year. The names and locations have been removed to preserve the privacy of the organization in question.

Background:

No-Internal-Controls, LLC is a mid-sized pharmaceutical company in the Midwest of the US employing around 150 employees. It has grown over the past decade by merging with other pharmaceutical companies and purchasing smaller firms.

Recently No-Internal-Controls, LLC suffered a ransomware attack. The company was able to recover from the attack with the assistance of a third party IT Services Company.

Attack Analysis:

After collecting evidence and analyzing the attack, the third party was able to recreate the attack.

No-Internal-Controls, LLC has a number of PCs configured for employee training

These training computers use generic logins such as “training1”, “training2”, etc. with passwords of “training1”, “training2”, etc.

The generic logins were not subject to lock out due to incorrect logins

One of the firms purchased by No-Internal-Controls, LLC allowed Remote Desktop connections from the Internet through the firewall to the internal network for remote employees

Due to high employee turnover and lack of documentation none all of the IT staff were aware of the legacy remote access 

The main office has only a single firewall and no DMZ or bastion host exists to mediate incoming remote desktop connections

The internal network utilized a flat architecture

An attacker discovered the access by use of a port scan and used a dictionary attack to gain access to one of the training computers

The attacker ran a script on the compromised machine to elevate his access privileges and gain administrator access

The attacker installed tools on the compromised host to scan the network and identify network shares

The attacker copied ransomware into the network shares for the accounting department allowing it spread through the network and encrypt accounting files

Critical accounting files were backed up and were recovered, but some incidental department and personal files were lost

Instructions:

You have been hired by No-Internal-Controls, LLC in the newly created role of CISO and have been asked to place priority on mitigating further attacks of this type.

  • Suggest one or more policies that would help mitigate against attacks similar to this attack
  • Suggest one or more controls to support each policy
  • Identify each of the controls as physical, administrative, or technical and preventative, detective, or corrective.
  • Keep in mind that No-Internal-Controls, LLC is a mid-sized company with a small IT staff and limited budget
  • Do not attempt to write full policies, simply summarize each policy you suggest in one or two sentences.  
  • Clearly indicate how each policy you suggest will help mitigate similar attacks and how each control will support the associated policy
  • 3-5 pages in length.
  • APA format.. citations, references etc…