Compute gross profit using three inventory valuation methods.

Complete two accounting exercises in which you prepare adjusting journal entries and income statements and compute financial ratios, inventory costs, and gross profit using a provided worksheet.IntroductionThis assessment extends your analysis of merchandising activities by focusing on the valuation of the organization’s inventory that is available for sale to wholesalers and point-of-sale consumers. An understanding of inventory accounting helps in the analysis and interpretation of financial statements prepared by large retailers and small owner-operated specialty retailers.Merchandise Business AccountingThe first assessment dealt with accounting and reporting activities for businesses that provide services to their customers. In contrast to this business type, merchandisers earn their revenues through the purchase and resale of goods. The two most common types of merchandisers are wholesalers and retailers. A wholesaler generally purchases goods from a manufacturer and sells them to retailers or other intermediaries. A retailer buys direct from either the manufacturer or a wholesaler and resells these goods to consumers. There are some fundamental differences between accounting for merchandise and service operations.Merchandise InventoryAccounting for inventory affects both the balance sheet and the income statement. The major goal in accounting for inventory is to properly match costs with sales and, as such, use the matching principle to decide how much of the cost of goods available for sale is deducted from sales and how much is carried forward as inventory and matched against future sales.OverviewThis assessment consists of two accounting exercises. The exercises are provided in the Adjusting Entries, Inventory, and Cost of Goods Sold Worksheet. Use this worksheet to record and submit your solutions for Exercises 2-1 and 2-2.PreparationIn addition, practice problems for each exercise are provided in the Assessment 2 Practice Problems Worksheet. The worksheet and answer key can be foundin the Capella Resources activity of this assessment and are optional.The following resourceisrequired to complete the assessment.CAPELLA RESOURCESClick the link provided to view the following resource:Submission GuidelinesSubmit your completed Adjusting Entries, Inventory, and Cost of Goods Sold Worksheet for faculty evaluation. Please do not submit completed practice problems with your assessment.Competencies MeasuredBy successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:Competency 2: Apply accounting principles as the language of business.Prepare adjusting journal entries for merchandising operations.Competency 3: Communicate the effects of business events on an organization’s financial structure.Prepare a multiple- or single-step income statement for merchandizing operations.Compute current and acid test financial ratios.Compute inventory costs using three inventory valuation methods.Compute gross profit using three inventory valuation methods.

Identify archiving procedures

Plagiarism is not allowedInstructions: See this Web Site: http://www.faulkner.com.ezproxy2.apus.edu/products/securitymgt and read the Geoff Keston article titled “Developing A Security Communications Plan”.According to Keston (2013), “A mark of a mature security communications program is the shift away from one-time messages, such as ad hoc emails. Such messages are easily forgotten and are often hard to find after a few weeks. A good security communications plan will include sending updates and alerts as well as maintaining a repository of documentation. Creating such a repository (or a consolidated document) makes information easier to find, and it helps to link together disparate elements into a unified plan.”For the purpose of this assignment, you are tasked as the Cybersecurity Director to prepare a Security Communications Plan for execution at the program level. You are to develop a security communications plan for your organization that addresses the handling of all communications related to security. Follow the requirements below:Develop a comprehensive security plan that does the following:1. Identify archiving procedures2. Establish approval processes for sending communications3. Describe legal and regulatory requirements4. Define key terms5. Define severity levels and message types6. Using the definitions of severity levels and message types, diagram who receives messages and through what means they receive them (e.g., text messages)7. The plan will address the concerns of many constituents, including executives, IT staff members, and end users, as well as customers and partners. Each group has somewhat different needs, so it is helpful to structure a plan to protect sensitive information from the entire group and to make targeted information easy for its audience to find.Number of Pages: 4 PagesAcademic Level: CollegePaper Format: APA

Formulate, validate and document business requirements for a medium-scale information system development project and effectively communicate these requirements to the stakeholders.

MIS605_Assessment_2_Brief_Design Specification Page 1 of 8 Task Summary Based on your responses to Assessment 1 – Written assessment, perform process and data modelling and develop and document a number of design diagrams using UML (including Context Diagram, Level 0 and Level 1 Data Flow Diagram, Entity Relationship Diagram). Context In Assessment 1, you performed a comprehensive requirement analysis for the online student enrolment system at the ABC University. With an in-depth understanding of the functional requirements of the System, you are now required to perform further analysis through process and data modelling. In doing so, you also need to provide a preliminary data storage design for the System. Both process modelling and data modelling can be used to provide deeper understanding of a new System. Thus, they are an integral part of System Analysis. Process modelling describe business processes – i.e. the sequence of activities that people do; while data modelling seeks to describe the ASSESSMENT 2 BRIEF Subject Code and Title MIS605 Systems Analysis and Design Assessment Design specification Individual/Group Individual Length 2500 words Learning Outcomes The Subject Learning Outcomes demonstrated by successful completion of the task below include: a) Identify, critically evaluate and recommend information systems solutions for inefficiencies in business processes, procedures and work practices using data and process modelling techniques. b) Formulate, validate and document business requirements for a medium-scale information system development project and effectively communicate these requirements to the stakeholders. c) Demonstrate the ability to effectively analyse, design and develop information systems using Unified Modelling Language (UML) models. Submission Due by 11:55pm AEST Sunday end of Module 4.2. Weighting 40% Total Marks 100 marks MIS605_Assessment_2_Brief_Design Specification Page 2 of 8 data flows through those processes. Data flow diagrams (including context diagrams) and entity relationship diagrams are the most common process and data modelling techniques used in industry. Instructions 1. Please read MIS605_Assessment 1_Case Study. Please note that every piece of information provided in this case study serves a purpose. 2. Once you have completed reading the case study, please read the attached MIS605_Assessment 2_Additional case information document. 3. Please complete the following tasks: Task 1. Create and document a Context Diagram for the System. (15 marks) Task 2. Create and document a Level 0 Data Flow Diagram (DFD). The Level 0 DFD should contain all the major high-level processes of the System and how these processes are interrelated. (20 marks) Task 3. Select three major and non-trivial processes from Level 0 DFD, decompose each of the processes into a more explicit Level 1 DFD. (24 marks) Task 4. Using your own experience with similar online student enrolment systems and the information provided in the case study: (i) Identify all the entities and their relationships in the System (ii) Create and document an Entity Relationship Diagram (ERD) for the System. Note: the case study has not and does not intend to provide a comprehensive description of entities in the System. You are expected to use your own experience with information systems in general and online student enrolment systems in particular to develop this ERD. For MIS605_Assessment_2_Brief_Design Specification Page 3 of 8 example, would Subject Name be an attribute for a Subject? Would Date of Birth be an attribute for Students? (20 marks) Task 5. Should data be stored in files in a file system or in a database for the System? Justify your answer. (5 marks) Task 6. Translate the ERD you developed in Task 4 into a physical relational database design. Document database tables and their relationship in MSWord file. Normalise your database design to the Third Normal Form (3NF). (16 marks) 4. Please note that your responses to the tasks above must relate to the case study provided. Word Count and Layout ? The total word count for the written assessment should be no more than 2500 words. ? Please provide all your answers in a MS word document. ? All diagrams must be drawn using Lucidchart and copied into the MSWord document. ? Please note that you are NOT required to copy the task description over to the MS Word document. Use the task number to indicate which task your response relates to. ? The recommended font size is 12 with 1.5 spacing. Referencing It is essential that you use appropriate APA style for citing and referencing research. Please see more information on referencing here http://library.laureate.net.au/research_skills/referencing Submission Instructions ? Please submit the written assessment via the Assessment link within Assessment 2. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades. MIS605_Assessment_2_Brief_DesignSpecification Page 4 of 8 Marking Criteria F P C D HD Subject Learning Outcome: a) Identify, critically evaluate and recommend information systems solutions for inefficiencies in business processes, procedures and work practices using data and process modelling techniques. Create and document a Context Diagram for the System. ? Use of correct notions. ? Include all major entities. ? Label arrows with data. ? Use verbs for data label. ? Appropriate use of arrows. ? The diagram clearly shows the interaction of the system with its external entities. 15% Subject Learning Outcome: a) Identify, critically evaluate and recommend information systems solutions for inefficiencies in business processes, procedures and work practices using data and process modelling techniques. b) Formulate, validate and document business requirements for a medium-scale information system development project and effectively communicate these requirements to the stakeholders. Create and document a Level 0 Data Flow Diagram (DFD). ? Level 0 DFD contain all the major high-level processes of the System and clearly outlines how these processes are interrelated. ? Level 0 DFD is balanced with the context diagram. ? Label arrows with data. MIS605_Assessment_2_Brief_DesignSpecification Page 5 of 8 ? Use verbs for the data label. ? Appropriate use of arrows. ? Clearly outlines all major processes and data storage critical to the System. 20% Subject Learning Outcome: a) Identify, critically evaluate and recommend information systems solutions for inefficiencies in business processes, procedures and work practices using data and process modelling techniques. b) Formulate, validate and document business requirements for a medium-scale information system development project and effectively communicate these requirements to the stakeholders. Select three major and non-trivial processes from Level 0 DFD, decompose each of the processes into a more explicit Level 1 DFD. ? Level 1 DFD is balanced with the corresponding processes in level 0 DFD. ? Label arrows with data. ? Use of appropriate verbs for the data label. ? Appropriate use of arrows. ? Identified all the major processes and data storage critical to the System. 24% Subject Learning Outcome: a) Identify, critically evaluate and recommend information systems solutions for inefficiencies in business processes, procedures and work practices using data and process modelling techniques. b) Formulate, validate and document business requirements for a medium-scale information system development project and effectively communicate these requirements to the stakeholders. MIS605_Assessment_2_Brief_DesignSpecification Page 6 of 8 c) Demonstrate the ability to effectively analyse, design and develop information systems using Unified Modelling Language (UML) models. ? Identify all the entities and their relationships in the System. ? Create and documents an Entity Relationship Diagram which demonstrate the following qualities: – Use of correct notions. – Incorporates all major entities. – Includes all critical attributes. 20% Subject Learning Outcome: a) Identify, critically evaluate and recommend information systems solutions for inefficiencies in business processes, procedures and work practices using data and process modelling techniques. b) Formulate, validate and document business requirements for a medium-scale information system development project and effectively communicate these requirements to the stakeholders. c) Demonstrate the ability to effectively analyse, design and develop information systems using Unified Modelling Language (UML) models. Storage of data ? Identify the most appropriate data storage for the System. ? Provided a convincing justification for the chosen answer. 5% MIS605_Assessment_2_Brief_DesignSpecification Page 7 of 8 Subject Learning Outcome: a) Identify, critically evaluate and recommend information systems solutions for inefficiencies in business processes, procedures and work practices using data and process modelling techniques. b) Formulate, validate and document business requirements for a medium-scale information system development project and effectively communicate these requirements to the stakeholders. c) Demonstrate the ability to effectively analyse, design and develop information systems using Unified Modelling Language (UML) models. Database design ? The tables are in 3NF. ? The design correctly reflects the relationship of the logical design. 16% MIS605_Assessment_2_Brief_DesignSpecification Page 8 of 8 Fail (Unacceptable) 0-49% Fail grade will be awarded if a student is unable to demonstrate satisfactory academic performance in the subject or has failed to complete required assessment points in accordance with the subject’s required assessment points. Pass (Functional) 50-64% Pass is awarded for work showing a satisfactory achievement of all learning outcomes and an adequate understanding of theory and application of skills. A consistent academic referencing system is used and sources are appropriately acknowledged. Credit (Proficient) 65-74% Credit is awarded for work showing a more than satisfactory achievement of all learning outcomes and a more than adequate understanding of theory and application of skills. A consistent academic referencing system is used and sources are appropriately acknowledged. Distinction (Advanced) 75 -84% Distinction is awarded for work of superior quality in achieving all learning outcomes and a superior integration and understanding of theory and application of skills. Evidence of in-depth research, reading, analysis and evaluation is demonstrated. A consistent academic referencing system is used and sources are appropriately acknowledged. High Distinction (Exceptional) 85-100% High Distinction is awarded for work of outstanding quality in achieving all learning outcomes together with outstanding integration and understanding of theory and application of skills. Evidence of in?depth research, reading, analysis, original and creative thought is demonstrated. A consistent academic referencing system is used and sources are appropriately acknowledged.

organize human, physical, and financial resources for the effective and efficient attainment of organizational goals

Hello,I need help with the project below. I need A+! Unless you are 100% sure you can handle the project with all requirements, do not make an attempt to contact me.MartinPurposeIn this project, you will view a video and discuss the organizational culture and organizational structure of the assigned organization. Outcome Met by Completing This Assignmentorganize human, physical, and financial resources for the effective and efficient attainment of organizational goalsHow to Set Up the PaperCreate a Word or Rich Text Format (RTF) document that is double-spaced using 12-point font.The final product will be 3-4 pages in length excluding the title page and reference page. Write clearly and concisely.Provide a title page with a title, your name, course and section number and the instructor’s name.Instructions: You have been hired as an associate for a software company that offers support solutions and customer service to more than 500 businesses in the United States. The company has recently started to experience significant growth and will need to hire many new associate positions. Your manager, Jack Nyugen, has asked you to help create a recruiting video for the company that emphasizes the company as having a positive corporate culture in which employees live the company’s core values and like coming to work. Jack provides you with a recruiting video for Zendesk, a favorite company of his, and has asked you to view the video to gain an understanding of the concepts, organizational culture and organizational structure. Jack knows the value of seeing is believing but also knows the value in a person who is able to articulate what is seen.Jack has asked you to view the video on Zendesk: https://youtu.be/l0uaSU6IVN4. (You may need to right click on the link and open in a new window.)You will write a report addressed to Jack and will use only the Zendesk video and course materials. If external sources are used, the information will not be included in the grading.Use the following headings and instructions to complete the project:IntroductionWrite an Introduction paragraph. The Introduction paragraph is the first paragraph of the paper and describes to the reader the intent of the paper explaining the main points covered in the paper using a thesis statement. This intent should be understood prior to reading the remainder of the paper so the reader knows exactly what is being covered in the paper.Organizational CultureDiscuss the seven dimensions of organizational cultureDescribe what ZenDesk’s organizational culture look like by presenting examples for each dimension descriptor. Use the specific facts from the video and use the course material to support your description of ZenDesk’s organizational culture. This means you will use the video facts and make connections to organizational culture as it relates to each dimension descriptor.Competitive AdvantageDiscuss how ZenDesk uses its corporate culture to create a competitive advantage. Make sure to correctly make connections between the video information and the course materials.Organizational StructureIdentify and discuss ZenDesk’s organizational structure from what you see in the video and use the course material to support your description of the structure. Make sure to use examples from the video.ConclusionCreate a concluding paragraph. The Conclusion summarizes the main topics discussed in the paper.

What is the epidemiological triad? Describe.

Many infectious diseases are multifactorial, meaning they are caused by the interaction of several factors inside and outside the person. For an infection to occur, three key conditions, known as the epidemiological triad of disease must be met.Using approximately 600-800 words, and use APA 7th edition citations and referencing as appropriate:What is the epidemiological triad? Describe.What are pathogens and how do pathogens gain entry?Explain how your immune system protects you, what factors diminish its effectiveness and what can you do to boost its effectiveness.What can you do to reduce your risk of infectious disease?

Calculate the timing of password-guessing attacks

1. Calculate the timing of password-guessing attacks:(a) If passwords are three uppercase alphabetic characters long, how much time would it take to determine a particular password, assuming that testing an individual password requires 5 seconds? How much time if testing requires 0.001 seconds?(b) Argue for a particular amount of time as the starting point for “secure.” That is, suppose an attacker plans to use a brute-force attack to determine a password. For what value of x (the total amount of time to try as many passwords as necessary) would the attacker find this attack prohibitively long?(c) If the cutoff between “insecure” and “secure” were x amount of time, how long would a secure password have to be? State and justify your assumptions regarding the character set from which the password is selected and the amount of time required to test a single password. 2. Describe each of the following four kinds of access control mechanisms in terms of (a) ease of determining authorized access during execution, (b) ease of adding access for a new subject, (c) ease of deleting access by a subject, and (d) ease of creating a new object to which all subjects by default have access.• per-subject access control list (that is, one list for each subject tells all the objects to which that subject has access)• per-object access control list (that is, one list for each object tells all the subjects who have access to that object)• access control matrix• capability3. Design a protocol by which two mutually suspicious parties can authenticate each other. Your protocol should be usable the first time these parties try to authenticate each other.4. List three reasons people might be reluctant to use biometrics for authentication. Can you think of ways to counter those objections? 5. If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by email but sometimes it sends you your old password by email. Compare these two cases in terms of vulnerability of the website owner. 6. Defeating authentication follows the method–opportunity–motive paradigm described in Chapter 1. Discuss how these three factors apply to an attack on authentication. 7. Suggest a source of some very long unpredictable numbers. Your source must be something that both the sender and receiver can readily access but that is not obvious to outsiders and not transmitted directly from sender to receiver. 8. Humans are said to be the weakest link in any security system. Give an example for each of the following:(a) a situation in which human failure could lead to a compromise of encrypted data(b) a situation in which human failure could lead to a compromise of identification and authentication(c) a situation in which human failure could lead to a compromise of access control.9. Explain why hash collisions occur. That is, why must there always be two different plaintexts that have the same hash value?10. What property of a hash function means that collisions are not a security problem? That is, why can an attacker not capitalize on collisions and change the underlying plaintext to another form whose value collides with the hash value of the original plaintext?

Develop research questions that address contemporary issu es in criminal justice by applying a ppropriate criminological theories

GuidelinesandRubricOverviewYour final project in this course is the development of aresearch report.The fundamental responsibility of criminal justice personnel is based on sound decision making. Using the scientific method within the criminal justiceinvestigations process allows investigators the opportunity to base their findings on factual data and ethical reasoning. This is especially important within thefield of criminal justice because the decisions made undergo rigorous scrutiny from entities such as the media, judiciary system, and the general public. Creatingliterature reviews isa common practice when explaining trends within the criminal justice field. For example, as a criminal justice representative, you may betasked with explaining why calls of domestic violence have increased in a specific area in your jurisdiction over a certain periodof time. It is your responsibility togather and interpret data, analyze criminological theories, and make use of the scientific method to offer an explanation forthe increase, as well as an effectiveavenue of resolution. In thefinal projectyou will practically apply research methods to come to informed conclusions.For this assessment, you will play the part of an individual currently employed at a criminal justice agencysuch as a police force, a correctional institution, or acourt system. Your administrative staff holds monthly meetings to discuss trends, departmental issues, and community concerns. Your supervisor hasapproachedyou and told you that there has been a trend of increased incidents related to a specific issue, and furthermore, the community has taken notice. Your supervisormust provide an answer to the administrative staff and the community, and would like your assistance. You have been tasked with conducting initial research onthe issue to inform the direction of your supervisor’sfurther research and statement to the administrative staff and community.To begin, you will be presented with a predetermined list of issues impacting the field of criminal justice. You are to choose an issue, or select an issue outside ofthe list withinstructor approval. You will then seek out five peer–reviewed scholarly articles, two of which must use qualitative methodology, andsynthesize andcritically analyze theliteraturetodevelop a research question and createdata–informed conclusionsabout your selected issue. Additionally, you must identify themethodologyused in each article, and explain the importance of using the scientific method to practice ethical research.The project is divided intothreemilestones, which will be submittedat various points throughout the course to scaffold learning and ensure quality finalsubmissions. These milestones will be submitted inModulesTwo,Four,andFive.The finalproductwillbe submittedinModuleSeven.Additionally, throughoutthe course you will work on a series of worksheets that directly relate to elements of your final research report.These worksheets will be submittedinModulesOne, Three,andSix.In this assignment,you will demonstrateyour mastery of the following course outcomes:?Developresearch questionsthat address contemporary issues in criminal justice by applying appropriate criminological theories?Interpret criminal justiceresearchto identify patterns for drawing evidence–based conclusions

How does the Queen provide payment for the service by the fig wasps?

The Queen of TreesThis video shows the intimate relationships within a community of organisms in an African savannah ecosystem. Your task is to complete the questions and map out the connections among the various organisms within the community. You should indicate the trophic level to which the organism belongs, its relationship to the Queen and any other direct relationships to other organisms in the community. The connections within the community should be illustrated. The figure on page 3 of this handout gives an example of how to illustrate those connections. The arrow tips point in the directions of where the energy is flowing. For example, the fruit bats feed on the fruit of the fig tree so the arrow is a one-way directions towards the bats.To submit this quiz: download the template, as you watch the video complete the table below, complete the questions on page 3, and complete the construction of your food web illustrating the connections listed in the table and then upload your document.If you do not know how to construct the food web electronically, you may draw your food web, scan a digital image (or take a photo) of the food web and submit it.Trophic levels: The position that an organisms occupies in a food chain. It shows the flow of energy through an ecosystem. Energy is always lost from one trophic level to the next.· Producers – autotrophic organisms using solar or chemical energy to produce all the organic nutrients for an ecosystem.· Consumers – heterotrophic organisms that cannot make their own food. They get energy from the chemical bonds in the nutrients they eat.· Primary consumers (herbivores) – eat primary producers (plants).o Conversion efficiency: only 10 to 20 percent of the available energy passes from producers to primary consumers.· Secondary consumers (carnivores) – eat primary consumers (herbivores).o Conversion efficiency: only 5 to 10 percent of the available energy passes from primary consumers to secondary consumers.· Tertiary consumers (carnivores) – eat secondary consumers (carnivores).o The conversion efficiency for tertiary consumers may be as low as 1%.· Omnivores – eat both plants and animals.· Decomposers – break down dead tissues and wastes.Table 1 – Relationships and trophic levelsOrganismTrophic LevelConnections with the Queen/communitySycamore Fig TreePrimary producerFig waspGrey Horn BillSecondary consumerUses the Queen as a nesting site, consumes insects that prey on queenCaterpillarsGiraffesFig CadididPink MantisVinegar FliesParasitic NematodesAntsHilda bug nymphsBeesFig CicadasMonkeysGeckoSpiderCrocodileElephantsTiger beetlesButterfliesSeed bugsFruit batsPrimary consumersSeed dispersal for the QueenQuestionsHow does the Queen protect herself from predation?What do the ants provide for the Queen?What do the ants get in return for their service to the Queen?What interesting behavior did the Fig cicadas display? What is the ultimate causation of this behavior?What service do the fig wasps provide for the Queen?How does the Queen provide payment for the service by the fig wasps?What happened to the second horn bill chick?How does the gecko protect itself from being consumed by the snake?How did the humans gather honey?The behavior the bees displayed as the humans gathered the honey is an example of proximate or ultimate causation?Fruit batsExample food web

Create a cyber-security policy describing the principle, the objective, and policy statement for the law firm’s company network.

Project Deliverable 5: Cybersecurity Policy CatalogProject Deliverable 5 is a two-part deliverable using MS Word and MS Project, or their open source equivalents. This assignment focuses on information as an asset and logical security techniques for a hypothetical law firm. The goal of this deliverable is to secure an information security policy, suggesting the fundamental guidelines should an untoward event occur. It can be seen that information assets security management can be reduced down to three (3) basic principles: integrity, confidentiality, and availability. Structure a policy around and within computers and associated equipment, as well as the people using it. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.Submission RequirementsInfrastructure Document (MS Word)Security Project Plan (MS Project)Section 1Write a three to five (3-5) page paper in which you:Create a cyber-security policy describing the principle, the objective, and policy statement for the law firm’s company network.Describe the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities.Suggest the cyber-security policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial.Determine the security testing methodology you would use to facilitate the assessment of technical controls.Section 2Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include:Tasks, subtasks, resources, and predecessors.An outline of the planning, analysis, design, and implementation phases.The use of cyber-security in the information systems development life cycle.Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:Determine the strategy for cybersecurity and public policy development in the U.S.Use technology and information resources to research issues in information assurance.Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions.

Explain how the firm could use event sponsorships as a part of its promotional efforts

Promotion and Social Responsibility (Turbo Tax) ( Kotler & Keller: Ch. 19–23 )Q4. Explain how the firm could use event sponsorships as a part of its promotional efforts (Ch. 20) (Turbo Tax)Q5. Discuss the Internet marketing possibilities for the product/service. (Ch. 21) (Turbo Tax)Q6. Discuss the use of social media in the marketing of the product/service. (Ch. 21) (Turbo Tax)Modern marketing calls for more than developing a good product, pricing it attractively, and making it accessible. Companies must also communicate with present and potential stakeholders and the general public. For most, therefore, the question is not whether to communicate but rather what to say, how and when to say it, to whom, and how often. But communications get harder as more and more companies clamor to grab an increasingly empowered consumer’s divided attention. Consumers themselves are taking a more active role in the communication process and deciding what communications they want to receive and how they want to communicate to others about the products and services they use. To effectively reach and influence target markets, holistic marketers are creatively employing multiple forms of communications.Instructions:Each individual assignment must include a title page that has the name of the project topic and the specific questions being addressed, be 5-5.5 full pages (12-point Times New Roman font, double spaced), and include a separate references page. All content must show direct application to the topic and exclude definitions of terms and general explanations of generic marketing topics.When completing an assignment for a given module/week, you must view the entire course textbook (all chapters) as a resource for the assignment, meaning it may be necessary to locate assignment-related material in chapters other than those corresponding with the module/week in which the assignment is located. While the effort has been made to ensure that all material necessary for assignment completion is found in the textbook, contact the instructor immediately if information needed to complete the assignment cannot be located in the textbook. The instructor will then provide instructions on locating the required material.Each of the parts of the Market Management Group Project (MMGP) must follow this format:Discussion of the researchInclusion of corroborating research about the theory and/or your productAnalysis and discussionQuotes must be minimized and long quotes (40 words or more) avoided. Outside sources to be cited include scholarly marketing journals, practitioner publications, and the course textbook. Assignments must be submitted directly to the Group Discussion Board Forum and contain a Microsoft Word document with the exact same content.Once the papers are graded and instructor comments are provided, each member will edit his or her paper accordingly.Required ResourcesAmerican Psychological Association. Publication manual of the American Psychological Association (Current ed.). Washington, DC: Author.Kotler, P. T., & Keller, K. L. (2016). Marketing management (Custom 15th ed.). Upper Saddle River, NJ: Pearson, Inc. ISBN: 9780133856460

× How can I help you?