Discuss the differences in strategy related to business growth, finance, and Treasury Stock purchases.
This is a group project. The excel file is done. Please find attach the entire instruction and the excel file completed. Answer step five discussion question and step 6, which the template is attached.Step 5: Discuss StrategyDiscussion with ColleaguesEarlier, Frank mentioned you would need to attend a meeting with other finance and accounting analysts at MCS to discuss the differences in strategy between Choice Hotels and Marriott. Both companies have a BBB debt rating from Standard Poors. This is the lowest investment grade rating and indicates that both companies have been aggressive with growth, finance, and Treasury Stock purchases.· Discuss the differences in strategy related to business growth, finance, and Treasury Stock purchases.· Discuss the similarities in strategy.· Discuss any strategy recommendations for Choice Hotels management.During Week 6, submit one original posting of at least 250 words in the Comparing Choice and MarriottDiscussion by Saturday and post two responses of at least 50 words each to other discussion participants by Tuesday. This discussion is an individual activity. Satisfactory and timely participation in the discussion is a requirement for meeting performance in this project. See MBA discussion guidelines.When you have finished Step 5, proceed to Step 6, where you will summarize your teams project findings in a report to management
Create a research report based on your application of action research to research a specific business problem present in the given case study
Create a research report based on your application of action research to research a specific business problem present in the given case study Maruti Suzuki India: Defending Market Leadership in the A-Segment.Refer to attachments for further information
Would you propose an audit adjustment to the management estimate?
EP 5-3Auditing an Accounting Estimate. LO5 Suppose management estimated the lower-of-cost- and net realizable value of some obsolete inventory at $99,000, and wrote it down from $120,000, recognizing a loss of $21,000. The auditors obtained the following information: the inventory in question could be sold for an amount between $78,000 and $92,000. The costs of advertising and shipping could range from $5,000 to $7,000.Required:1.Would you propose an audit adjustment to the management estimate? Write the appropriate accounting entry.2.If managements estimate of inventory market (lower than cost) had been $80,000, would you propose an audit adjustment? Write the appropriate accounting entry.
Explain your method of attack and operation within the reasonable parameters of the law, citing specific, credible sources that support the method of attack and operation.
In this assignment, you will assume the role of an ethical hacker tasked by law enforcement to infiltrate the network of a business known to engage in illegal activities. The specific course learning outcome associated with this assignment is:Conduct activities to protect IT assets and infrastructure from threats and improve incident response strategies.ScenarioImagine for a moment that you are a hacker, an ethical one. You are called upon by law enforcement to hack into the network of a business known to be engaged in criminal activity for financial gain as its primary activity. Assume you are not to be concerned with any political aspects of the job and that your actions are legal and ethically justified. This nefarious business takes its own security seriously and, therefore, has implemented several forms of network security, including firewalls, web proxies for its web gateways, and VPNs for remote users. You also know that this business, much like any normal corporation, rents several floors of office space to accommodate between 100 and 200 employees. Also, imagine that the businesss entire network topology is located on-site. Your goal is to infiltrate their security to find evidence of illegal activities in the local MSQL database. You must remain anonymous and operate within the parameters of the law.InstructionsWrite a 610 page paper in which you:Explain your method of attack and operation within the reasonable parameters of the law, citing specific, credible sources that support the method of attack and operation.Describe a specific malware, social engineering, or other type of attack you would deploy to achieve your desired goals, citing specific, credible sources that support deployment of the attack. Identify effective techniques for concealing executables and specific tools used for each stage of the attack.Develop a plan to overcome expected hurdles your attack must overcome to be successful, citing specific, credible sources that support the plan.Develop an anonymizing strategy, supported by specific, credible sources, that creates a false trail and minimizes the risk of detection.Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence. Cite each source listed on your source page at least one time within your assignment
Explain which data collection method you would use and what procedures you would follow to apply this method to this situation.
A maker of energy drinks is considering abandoning can containers and going exclusively to bottles because the sales manager believes customers prefer drinking from bottles. However, the vice president in charge of marketing is not convinced the sales manager is correct. Investigate this issue using statistical analysis.Explain which data collection method you would use and what procedures you would follow to apply this method to this situation.Propose which level of data measurement applies to the data collected. Justify your answer.Determine whether the data is qualitative or quantitative.
explain the state public assistance policies that might help Eboni manage the responsibilities of parenthood.
What is welfare? When you hear the word welfare, do you picture images of individuals who are facing hard times? While there is more than one type of social program available in the United States to those who need it, social welfare programs like TANF provide assistance to families in need through government tax revenues. Programs like these are often referred to as public assistance or means-tested programs. These programs have eligibility criteria that are based on the individuals or the familys household income and assets. Do these types of programs exist in your state or region? If so, what are the criteria? If you encountered a client like Eboni Logan, from the Logan Family video, who soon will become a mother, how might you best assist her in obtaining benefits from these types of programs?For this Discussion, review this weeks resources, including the Logan Family video case. Consider the means-tested programs that might be available to her in your state or region. Then, think about the likely long-term outcomes for Eboni and her child, if she chooses to parent. Finally, reflect on the state welfare policies that might help her manage the responsibilities of parenthood.By Day 3Post a brief explanation of the means-tested programs that might be available to Eboni. Be sure your answer is specific to the means-tested programs available in your state or region. Then, explain the potential long-term outcomes for Eboni and her child, if she chooses to parent. Finally, explain the state public assistance policies that might help Eboni manage the responsibilities of parenthood.
What questions would you ask to better understand the situation?
A customer that you were recently introduced to is considering beginning an RFP process to replace the solution theyve had for 8 years and that we acquired 2 years ago. What questions would you ask to better understand the situation? How could you turn this into an upsell opportunity? Please provide at least five examples of exploratory topics you would want to gather more data around, and how you would use that gathered information to craft a business storyline around the value that can be gained from your solution.
At this point, what is your view on the quest to discover a singular essence of a religious tradition, or religion in general?
1. Identify some terms from Chapters 3 and 4 of Herling that seemingly reflect a European, American, and/or Christian-centric bias. How do they do so, and why?2. At this point, what is your view on the quest to discover a singular essence of a religious tradition, or religion in general? Make sure to explain your answer in light of course materials.3. Identify and discuss specific examples of patriarchal values and structures in the religious traditions you have studied. How do these contribute to defined social and religious roles based on gender?4. Identify, describe, and discuss specific examples of the regulation (or celebration) of the body and sexuality in religious scriptures, beliefs, or practices.5. Identify, describe, and discuss examples of religions role in constructing our ideas about race and ethnicityinstances where it promotes hierarchy and differences, or aims to overcome and transcend difference.6. According to Herling, what is the relationship between religion and globalization? How has globalizations affected religious communities, and vice versa?7. Discuss several new religious movements. Who belongs to these movements, and why?8. What are some of the most commonly cited instances of the link between religion and violence? How direct is this link? What other factors might be at work in these cases?9. What are some examples of the interplay between science and religion, ranging from opposition to synthesis?Booksa beginners guide to the Study of Religion second edition by Bradley L. HerlingReligion the basics second edition by Malory NyeA Critical Introduction to The Study Of Religion second edition by Craig Maring
What are the benefits and risks associated with a companys use of social networking?
Social media and its use have major implications in the business ethics arena.Read the case study: Social Networking and Social Responsibility (pp. 410-417) and address the questions found on pp.416-417Questions for Discussion1. What are the benefits and risks associated with a companys use of social networking?2. Are there any significant differences between a companys use of social networking technologies and an individual use?3. As a social media user, are you concerned that your information is tracked for advertising purposes? Why or why not?4. Compare IBMs private social network Blue Pages with a public social- networking site like Twitter or Facebook. Do you think user information is any safer on Blue Pages? Why or why not?5. What responsibilities do companies have regarding private company social- networking sites? 6. Do you think its right for companies to collect and analyze user data from social- networking sites in order to influence consumers? Why or why not?Case Study Assignment guidelines:The answers to the case study questions should be included in double-spaced Word document and contain in-text APA citations and a References page.Make sure you refer to the grading rubric for this assignmentThe assignment is due by 11:59 pm on Sunday.Our Writing Center team is always ready to help. Click on the link to get started or you can contact them by sending an email to [emailprotected]Grading Criteria Unit 6 Social Networking and Social ResponsibilityPointsThoroughly addresses case study questions. No more than 15% of the submission is direct quote. Student relies on summary and paraphrase to demonstrate understanding of material.0-50Contains no grammatical or mechanical errors0-25Submission is no fewer than 500 words INCLUSIVE of questions and references.0-15Includes APA-formatted in-text citations and References page. REQUIRED.0-10TOTAL0-100
Why is quality important in a project? Who should be in charge of quality on any given project?
Instructions: According to A Guide to the Project Management Body of Knowledge (PMBOK® Guide), Fifth Edition, quality is a subset of management actions required to ensure that the project will satisfy the needs for which it was undertaken. Quality Planning typically achieves the least attention and yet is the most critical element of Project Quality Management. This lack of attention primarily occurs due to insufficient understanding about quality and how it is an integral part of a project. Project Quality Management is divided into three parts. Quality Planning is done first, while Quality Assurance and Quality Control are done concurrently. As the project progresses, the Quality Planning process may be repeated, prompted by changes in the project circumstances An iterative process that is influenced by scope, schedule, budget, procurement changes. The lack of an adequate Quality Plan inhibits the success of Quality Assurance and Quality Control efforts. (2013)Alternately, a project manager wears many hats. Every one of these roles involves dealing with people. If a project manager has these roles (leader, communicator, negotiator, problem solver, influencer, integrator), it obviously means they must develop the skills in these areas. That is why soft skills for project managers are absolutely critical. A project manager spends 90% or more of his or her time communicating. According to the PMBOK® Guide, human resources management is the processes required to make the most effective use of the people involved with the project (2013). Why is quality important in a project? Who should be in charge of quality on any given project? Discuss how you would go about developing a quality management plan for the course project you have been working on. What quality assurance tools would you use? Why? How would you measure and monitor quality control? For your given course project, discuss how you would go about obtaining the human resources needed to complete the project (both material and people)?Please see attached document for references.No introduction necessary, just two pages of material.Include at least 1 reference.Number of Pages: 2 Pages