organize human, physical, and financial resources for the effective and efficient attainment of organizational goals
Hello,I need help with the project below. I need A+! Unless you are 100% sure you can handle the project with all requirements, do not make an attempt to contact me.MartinPurposeIn this project, you will view a video and discuss the organizational culture and organizational structure of the assigned organization. Outcome Met by Completing This Assignmentorganize human, physical, and financial resources for the effective and efficient attainment of organizational goalsHow to Set Up the PaperCreate a Word or Rich Text Format (RTF) document that is double-spaced using 12-point font.The final product will be 3-4 pages in length excluding the title page and reference page. Write clearly and concisely.Provide a title page with a title, your name, course and section number and the instructors name.Instructions: You have been hired as an associate for a software company that offers support solutions and customer service to more than 500 businesses in the United States. The company has recently started to experience significant growth and will need to hire many new associate positions. Your manager, Jack Nyugen, has asked you to help create a recruiting video for the company that emphasizes the company as having a positive corporate culture in which employees live the companys core values and like coming to work. Jack provides you with a recruiting video for Zendesk, a favorite company of his, and has asked you to view the video to gain an understanding of the concepts, organizational culture and organizational structure. Jack knows the value of seeing is believing but also knows the value in a person who is able to articulate what is seen.Jack has asked you to view the video on Zendesk: https://youtu.be/l0uaSU6IVN4. (You may need to right click on the link and open in a new window.)You will write a report addressed to Jack and will use only the Zendesk video and course materials. If external sources are used, the information will not be included in the grading.Use the following headings and instructions to complete the project:IntroductionWrite an Introduction paragraph. The Introduction paragraph is the first paragraph of the paper and describes to the reader the intent of the paper explaining the main points covered in the paper using a thesis statement. This intent should be understood prior to reading the remainder of the paper so the reader knows exactly what is being covered in the paper.Organizational CultureDiscuss the seven dimensions of organizational cultureDescribe what ZenDesks organizational culture look like by presenting examples for each dimension descriptor. Use the specific facts from the video and use the course material to support your description of ZenDesks organizational culture. This means you will use the video facts and make connections to organizational culture as it relates to each dimension descriptor.Competitive AdvantageDiscuss how ZenDesk uses its corporate culture to create a competitive advantage. Make sure to correctly make connections between the video information and the course materials.Organizational StructureIdentify and discuss ZenDesks organizational structure from what you see in the video and use the course material to support your description of the structure. Make sure to use examples from the video.ConclusionCreate a concluding paragraph. The Conclusion summarizes the main topics discussed in the paper.
What is the epidemiological triad? Describe.
Many infectious diseases are multifactorial, meaning they are caused by the interaction of several factors inside and outside the person. For an infection to occur, three key conditions, known as the epidemiological triad of disease must be met.Using approximately 600-800 words, and use APA 7th edition citations and referencing as appropriate:What is the epidemiological triad? Describe.What are pathogens and how do pathogens gain entry?Explain how your immune system protects you, what factors diminish its effectiveness and what can you do to boost its effectiveness.What can you do to reduce your risk of infectious disease?
Calculate the timing of password-guessing attacks
1. Calculate the timing of password-guessing attacks:(a) If passwords are three uppercase alphabetic characters long, how much time would it take to determine a particular password, assuming that testing an individual password requires 5 seconds? How much time if testing requires 0.001 seconds?(b) Argue for a particular amount of time as the starting point for secure. That is, suppose an attacker plans to use a brute-force attack to determine a password. For what value of x (the total amount of time to try as many passwords as necessary) would the attacker find this attack prohibitively long?(c) If the cutoff between insecure and secure were x amount of time, how long would a secure password have to be? State and justify your assumptions regarding the character set from which the password is selected and the amount of time required to test a single password. 2. Describe each of the following four kinds of access control mechanisms in terms of (a) ease of determining authorized access during execution, (b) ease of adding access for a new subject, (c) ease of deleting access by a subject, and (d) ease of creating a new object to which all subjects by default have access. per-subject access control list (that is, one list for each subject tells all the objects to which that subject has access) per-object access control list (that is, one list for each object tells all the subjects who have access to that object) access control matrix capability3. Design a protocol by which two mutually suspicious parties can authenticate each other. Your protocol should be usable the first time these parties try to authenticate each other.4. List three reasons people might be reluctant to use biometrics for authentication. Can you think of ways to counter those objections? 5. If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by email but sometimes it sends you your old password by email. Compare these two cases in terms of vulnerability of the website owner. 6. Defeating authentication follows the methodopportunitymotive paradigm described in Chapter 1. Discuss how these three factors apply to an attack on authentication. 7. Suggest a source of some very long unpredictable numbers. Your source must be something that both the sender and receiver can readily access but that is not obvious to outsiders and not transmitted directly from sender to receiver. 8. Humans are said to be the weakest link in any security system. Give an example for each of the following:(a) a situation in which human failure could lead to a compromise of encrypted data(b) a situation in which human failure could lead to a compromise of identification and authentication(c) a situation in which human failure could lead to a compromise of access control.9. Explain why hash collisions occur. That is, why must there always be two different plaintexts that have the same hash value?10. What property of a hash function means that collisions are not a security problem? That is, why can an attacker not capitalize on collisions and change the underlying plaintext to another form whose value collides with the hash value of the original plaintext?
Develop research questions that address contemporary issu es in criminal justice by applying a ppropriate criminological theories
GuidelinesandRubricOverviewYour final project in this course is the development of aresearch report.The fundamental responsibility of criminal justice personnel is based on sound decision making. Using the scientific method within the criminal justiceinvestigations process allows investigators the opportunity to base their findings on factual data and ethical reasoning. This is especially important within thefield of criminal justice because the decisions made undergo rigorous scrutiny from entities such as the media, judiciary system, and the general public. Creatingliterature reviews isa common practice when explaining trends within the criminal justice field. For example, as a criminal justice representative, you may betasked with explaining why calls of domestic violence have increased in a specific area in your jurisdiction over a certain periodof time. It is your responsibility togather and interpret data, analyze criminological theories, and make use of the scientific method to offer an explanation forthe increase, as well as an effectiveavenue of resolution. In thefinal projectyou will practically apply research methods to come to informed conclusions.For this assessment, you will play the part of an individual currently employed at a criminal justice agencysuch as a police force, a correctional institution, or acourt system. Your administrative staff holds monthly meetings to discuss trends, departmental issues, and community concerns. Your supervisor hasapproachedyou and told you that there has been a trend of increased incidents related to a specific issue, and furthermore, the community has taken notice. Your supervisormust provide an answer to the administrative staff and the community, and would like your assistance. You have been tasked with conducting initial research onthe issue to inform the direction of your supervisorsfurther research and statement to the administrative staff and community.To begin, you will be presented with a predetermined list of issues impacting the field of criminal justice. You are to choose an issue, or select an issue outside ofthe list withinstructor approval. You will then seek out five peerreviewed scholarly articles, two of which must use qualitative methodology, andsynthesize andcritically analyze theliteraturetodevelop a research question and createdatainformed conclusionsabout your selected issue. Additionally, you must identify themethodologyused in each article, and explain the importance of using the scientific method to practice ethical research.The project is divided intothreemilestones, which will be submittedat various points throughout the course to scaffold learning and ensure quality finalsubmissions. These milestones will be submitted inModulesTwo,Four,andFive.The finalproductwillbe submittedinModuleSeven.Additionally, throughoutthe course you will work on a series of worksheets that directly relate to elements of your final research report.These worksheets will be submittedinModulesOne, Three,andSix.In this assignment,you will demonstrateyour mastery of the following course outcomes:?Developresearch questionsthat address contemporary issues in criminal justice by applying appropriate criminological theories?Interpret criminal justiceresearchto identify patterns for drawing evidencebased conclusions
How does the Queen provide payment for the service by the fig wasps?
The Queen of TreesThis video shows the intimate relationships within a community of organisms in an African savannah ecosystem. Your task is to complete the questions and map out the connections among the various organisms within the community. You should indicate the trophic level to which the organism belongs, its relationship to the Queen and any other direct relationships to other organisms in the community. The connections within the community should be illustrated. The figure on page 3 of this handout gives an example of how to illustrate those connections. The arrow tips point in the directions of where the energy is flowing. For example, the fruit bats feed on the fruit of the fig tree so the arrow is a one-way directions towards the bats.To submit this quiz: download the template, as you watch the video complete the table below, complete the questions on page 3, and complete the construction of your food web illustrating the connections listed in the table and then upload your document.If you do not know how to construct the food web electronically, you may draw your food web, scan a digital image (or take a photo) of the food web and submit it.Trophic levels: The position that an organisms occupies in a food chain. It shows the flow of energy through an ecosystem. Energy is always lost from one trophic level to the next.· Producers autotrophic organisms using solar or chemical energy to produce all the organic nutrients for an ecosystem.· Consumers heterotrophic organisms that cannot make their own food. They get energy from the chemical bonds in the nutrients they eat.· Primary consumers (herbivores) eat primary producers (plants).o Conversion efficiency: only 10 to 20 percent of the available energy passes from producers to primary consumers.· Secondary consumers (carnivores) eat primary consumers (herbivores).o Conversion efficiency: only 5 to 10 percent of the available energy passes from primary consumers to secondary consumers.· Tertiary consumers (carnivores) eat secondary consumers (carnivores).o The conversion efficiency for tertiary consumers may be as low as 1%.· Omnivores eat both plants and animals.· Decomposers break down dead tissues and wastes.Table 1 Relationships and trophic levelsOrganismTrophic LevelConnections with the Queen/communitySycamore Fig TreePrimary producerFig waspGrey Horn BillSecondary consumerUses the Queen as a nesting site, consumes insects that prey on queenCaterpillarsGiraffesFig CadididPink MantisVinegar FliesParasitic NematodesAntsHilda bug nymphsBeesFig CicadasMonkeysGeckoSpiderCrocodileElephantsTiger beetlesButterfliesSeed bugsFruit batsPrimary consumersSeed dispersal for the QueenQuestionsHow does the Queen protect herself from predation?What do the ants provide for the Queen?What do the ants get in return for their service to the Queen?What interesting behavior did the Fig cicadas display? What is the ultimate causation of this behavior?What service do the fig wasps provide for the Queen?How does the Queen provide payment for the service by the fig wasps?What happened to the second horn bill chick?How does the gecko protect itself from being consumed by the snake?How did the humans gather honey?The behavior the bees displayed as the humans gathered the honey is an example of proximate or ultimate causation?Fruit batsExample food web
Create a cyber-security policy describing the principle, the objective, and policy statement for the law firms company network.
Project Deliverable 5: Cybersecurity Policy CatalogProject Deliverable 5 is a two-part deliverable using MS Word and MS Project, or their open source equivalents. This assignment focuses on information as an asset and logical security techniques for a hypothetical law firm. The goal of this deliverable is to secure an information security policy, suggesting the fundamental guidelines should an untoward event occur. It can be seen that information assets security management can be reduced down to three (3) basic principles: integrity, confidentiality, and availability. Structure a policy around and within computers and associated equipment, as well as the people using it. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.Submission RequirementsInfrastructure Document (MS Word)Security Project Plan (MS Project)Section 1Write a three to five (3-5) page paper in which you:Create a cyber-security policy describing the principle, the objective, and policy statement for the law firms company network.Describe the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities.Suggest the cyber-security policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial.Determine the security testing methodology you would use to facilitate the assessment of technical controls.Section 2Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include:Tasks, subtasks, resources, and predecessors.An outline of the planning, analysis, design, and implementation phases.The use of cyber-security in the information systems development life cycle.Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:Determine the strategy for cybersecurity and public policy development in the U.S.Use technology and information resources to research issues in information assurance.Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions.
offer what metrics should be used to determine if the reorganized floor plan is effective.
Please discuss the case study,Improving Production at Beothic Fish, focusing the following elements of the case:Identify the problemDiagnose the cause(s)The case study indicates that the general manager plans on reorganizing the floor plan of the plant. Offer your recommendations on how to reorganize the floor plan. Please also offer what metrics should be used to determine if the reorganized floor plan is effective.
Discuss the application of Hersey and Blanchards situational theory of leader style to the level of follower development.
Discuss the application of Hersey and Blanchards situational theory of leader style to the level of follower development. Choose a leader who leveraged this style and discuss what, if anything, made it effective. Please support your response with scholarly sources.
Can you believe what the author tells you? Why or why not?
Question 1: An Application of Probability Decision TreesActions for An Application of Probability Decision Treesdecision treeThe readings are rather theoretical so I am including an application where knowing a probability value can be very helpful. There is a field in Management Science known as Decision Theory. We use probability to decide what the best course of action is given what we know. I attached some information showing a decision tree. It is a bit more complicated than the ice cream/soft drink problem but shows the structure of the tree with its paths or branches.Try the first ice cream/soft drink problem. We must decide what is the best course of action knowing possible payoffs and probabilities. Here we need the probability that the day will be warm or cold. This is a simple probability. We can find it empirically by counting warm and cold days in the past and dividing by the total number of days observed. In this problem we arrive at the probability of a warm day to be 0.6. Since we only consider two outcomes, the probability of a cold day is 0.4.Question 2:Hang Up and DriveActions for Hang Up and DriveCheck out this snippet from Family Circle magazine (January, 2009, Liz Plosser):Motorists who talk on a cell phone while driving are 9% slower to hit the brakes, 19% slower to resume normal speed after braking and four times more likely to crash.Interesting, eh? Need more information? Sorry, thats all the information this article provided. So, what can we conclude? How reliable are these results? Can you believe what the author tells you? Why or why not?Pretend youre a manager for one of the major cell phone service providers in the U.S. Youve been asked by a major news magazine to speak to these accusations. What would you say? Use your knowledge of statistics for managers to level some well-founded criticisms of the conclusions above.Careful! We cannot use personal opinions to battle statistics like these! Instead, you must explain why the numbers reported in Family Circle may, or may not, accurately represent the population of U.S. drivers. There are 100 possible answers to this conference topic.You need only provide a single idea, to get the conversation rolling. Leave some material for others to contribute. Be sure that your contribution explicitly references what weve read and practiced this week. It is your classmates job to support or refute what youve said.Question 3:Lies, Damned Lies, and StatisticsActions for Lies, Damned Lies, and StatisticsThe title of this discussion topic comes from a quote often attributed to former British Prime Minister Benjamin Disraeli, who claimed that there are three types of lies: Lies, Damned Lies, and StatisticsThe (entirely fictitious) University of South Central Maryland (USCM) is being sued for sexually discriminatory hiring practices. Last year, they hired two classes of employees, administrative staff and academic staff. They received 750 applications from women for administrative staff positions, of which they hired 250, and 250 applications from women for academic positions, of which they hired 200. In total, then, they had 1000 applications from women of which they hired 450, or 45%. They received 300 applications from men for the administrative positions, of which they hired 75, and 700 applications from men for the academic positions, of which they hired 550. In total, of the 1000 applications they received from men, they hired 625, or 62.5%.Based on the numbers presented, what do you think of the discrimination claim?Question 4:Operations and production managers often use the normal distribution as a probability model to forecast demand in order to determine inventory levels; manage the supply chain; control production and service processes ; and perform quality assurance checks on products and services. The information gained from such statistical analyses help managers optimize resource allocation decisions and reduce process times, which in turn often improves contribution margins and customer satisfaction.Based on your understanding of the characteristics of the normal distribution, examine the attached chart (assume that the process specifications have a low bound of 9 and an upper bound of 15), and contribute to our discussion by posting an response to ONE of the questions below, and by responding to a post of a classmate.1. Does either of the processes below fit a normal distribution? Why or why not?2. Which processes shows more variation? What does this mean?3.Question 5:I was reading a magazine and saw an advertisement claiming that a car had the best performance in the industry on maintenance. There was actually a footnote at the bottom giving the statistics and important information. It stated the sample size and how the results were calculated. That impressed me and you do not see these footnotes often. You may feel differently. How do you feel about this? Question 6:Polling An Application of SamplingActions for Polling An Application of SamplingListen to the Econtalk podcast on polling found here:http://www.econtalk.org/archives/2008/07/rivers_on_polli.htmlIt can also be found in the webliography.What can we learn from the podcast about sampling issues? Can you think of an example from your business life where you have encountered gross errors in forecasting or estimations that you think may due the sort of issues mentioned in the podcast? Can you think of a place in your organization where polling would be a useful tool? Short of hiring Doug Rivers company, what sorts of issues do you need to keep in mind when designing a polling technique?
What should those objectives be?
Graded Assignment 2 Case Study:You are a member of an Information Technology team in a medium-sized organization that is implementing a new technology system that will impact employees, customers, and suppliers. Your manager has requested that you work with the team to create a communications plan for the project. She would like to meet with you in two hours to review your thoughts on the key objectives of the communication plan. What should those objectives be?Do not use first person (I, me, my, we, us, our, etc.) in the assignment. Use research to support your answers. Cite sources throughout the assignment, and include sources at the end of the assignment in proper APA format.