What should those objectives be?

Graded Assignment 2 Case Study:You are a member of an Information Technology team in a medium-sized organization that is implementing a new technology system that will impact employees, customers, and suppliers. Your manager has requested that you work with the team to create a communications plan for the project. She would like to meet with you in two hours to review your thoughts on the key objectives of the communication plan. What should those objectives be?Do not use first person (I, me, my, we, us, our, etc.) in the assignment. Use research to support your answers. Cite sources throughout the assignment, and include sources at the end of the assignment in proper APA format.

Discuss a time where you influence health care through advocacy.

The purpose of learning the ropes of policy, politics and advocacy is to influence health care or broader social agendas that influence human health. Discuss a time where you influence health care through advocacy.The discussion must address the topic, you are expected to post 400 words in your initial post with 2 scholarly references. APA format.Hello, student. Continue working on the week discussion, and please cover this question in your discussion.Nurses have a long history of advocacy. Do you think that nurses apply advocacy today in the different levels of nursing practice?

compare and contrast discussion of the economic challenges and incentives related to your project

You are an associate director at Piedmont Hospital Atlanta, a 300-bed hospital located in an urban area. A sum of money is available for investment in the facility. You have been tasked by the hospital CEO to present a possible investment scenario in which you renovate your existing facility, expand the current facility, or clinically integrate your electronic health records (EHRs). There is only enough money to fund one of the potential projects. Your primary sources of data and information may or may not be reliable. Please see the attached Finance, Risk, and Cost Data document for the data needed to create your presentation.Create a four to five-slide PowerPoint presentation that will include the points listed below. You are to create your presentation as though you were presenting the elements to a group for review. Add speaker’s notes to the bottom of each slide for ease of narration (as this will be presented in a video script) and to provide accessible content to people with accessibility needs.· A basic design of the projected service/project (i.e., the option you are promoting)· An analysis of the role of public policy in terms of your provision of health care services and provide justification of your choice· An explanation of the relevance of the current financial data (the attachment) in terms of the projected outcome of the project· A compare and contrast discussion of the economic challenges and incentives related to your projectMust present engaging multimedia content to improve learner retention of information. You may wish to include visual enhancements in your presentation. These may include appropriate images, a consistent font, appropriate animations, and transitions from content piece to content piece and slide-to-slide.Must use at least two scholarly sources formatted according to APA style. All sources used within the presentation must be cited properly within the slides and included on the required reference slide, which will be the last slide of the presentation.

What motivation concepts and theories help you to analyze the case?

CASE STUDY 7: A Funeral in the Public Service CenterHal G. RaineyFor many years, the Social Security Administration (SSA) followed a very bureaucratized process for handling claims. A “claim” is a request for services, such as a retiree’s application for SSA to begin paying his or her social security benefits (that is, to start sending monthly checks to him or her). Claims handling also involves many different functions, such as updating records, adding and deleting dependents and relatives from records, handling changes in the requests, and other matters.For years, the claims would be handled like this: a client (a citizen making a claim) would apply at a local Social Security Administration office, or by mail. The local office would forward the claim to one of eight public service centers (PSCs) in eight different regions of the country. At the PSC, a different unit would handle each different phase of handling the claim. One unit would receive the claim and route it to the others. Another unit had specialists, called claims authorizers, who would rule on the legality of the claim—did the person have a legitimate claim? Then a claim would be shipped, with a large batch of other claims, to a next unit that contained benefits authorizers, or specialists who would calculate how much the client should receive in social security payments. Then the claim would move to another unit for disbursement or payment of claims, and to another for filing and retention. This process was like a big assembly line, with the claim moving from one phase of the work to another.Congress added many programs and specifications to social security and related programs. At the same time, the nation’s population grew and became more complex. The claims-handling process got much more complicated, and this assembly-line system began to have problems, such as many delays in handling claims and many lost claims. As an example of the problems with the system, when a benefits authorizer would find that a claims authorizer had not provided all the information about a claim that the benefits authorizer needed, the claim had to be delivered back to the claims authorization unit that had previously handled it. Often, the returned claim went back to a different person from the one who worked on it to begin with. This resulted in slow processing and frequent mistakes.SSA went through a long period of trying to figure out how to resolve the problems, and finally decided to adopt a modular design in the PSCs. They put together in units, called modules, all the different specialists needed to process a claim—claims authorizers, benefits authorizers, typists, file clerks, and others. These groups worked together like teams. They would take a client’s claim and work it through to completion, so that they actually had the person as the client of their module—they could identify the clients as theirs. They could also communicate more readily with each other about any problems that came up. There were some tough problems in implementing this new system, but it worked out very well, and has become the standard design in the PSCs.Time passes and brings changes that require adjustments by all people and organizations. Advances in information technology—computers and communications technology—brought changes for the SSA. The processing of claims became more computerized. Local offices handle many claims by entering the data directly into the main SSA computers in Baltimore, and getting answers back directly. This reduced the load of claims coming to the PSCs. In addition, the work in the PSCs became more computerized and automated through higher technologies. Claims authorizers and benefits authorizers handled more correspondence by simply hitting a key on the computer terminal that caused the needed correspondence to print out. This reduced the need for typists. More information was going directly into the computer, and requiring less paperwork, and this reduced the need for file clerks to file the papers. The modules needed fewer and fewer typists and file clerks. This created problems, because if a module needed only a couple of file clerks, and was only assigned two, the module became more dependent upon their work habits. If both file clerks were absent, the module managers had to do the filing to keep the module’s work going.Social Relations Among Specialists. In the old system, a social and educational hierarchy existed among the specialists. Benefits authorizers were the most highly paid and highly trained, followed by claims authorizers, and then by typists and filing clerks. The filing clerks were often single mothers with low incomes and low educational levels. They often struggled with serious personal challenges in their lives outside of work. They would sometimes miss work or arrive late because of child care problems. When SSA moved to the modules, the move helped to break down social distance between these groups. The file clerks would work directly with the others, usually as friends and coworkers. Also, SSA tried to move file clerks up the ranks through training and development processes.In one of the PSCs in the midwestern United States, the assistant director (A.D.) of the PSC had an idea for responding to the problem of the declining need for file clerks. He started a new organizational design, in which file clerks were assigned to special units, from which they would be farmed out, as needed, to the modules. The design was something like the old idea of a typing pool or secretarial pool. The problem was that the file clerks felt isolated and demoted by being taken out of their modules.The A.D. learned of the file clerks’ unhappiness in a fairly dramatic way. In his office one day, he received a request from the members of the file clerks’ unit to come down to their office area. When he arrived, he found the office draped with black crepe and black balloons. A large black casket lay on a desk in the middle of the room. The file clerks, dressed in funeral clothing, began singing funeral hymns. A spokesperson for the group came forward to tell him that they were there to hold a funeral for the file clerks unit, to mourn the death of the file clerks.The A.D. was stunned. He had heard that the file clerks were unhappy with the change he had made, but had not expected such a development. He was not sure how to proceed. He was not really sure what the “funeral” was supposed to mean or to communicate, except that the file clerks were unhappy. Questions were running through his mind. What should he do right now, as he faced the file clerks and their funeral? What should he do in the longer term? Should he discipline them? He knew that people in other units would be very aware of how he treated these file clerks and some would complain if he “let them get away” with such disruption and insubordination. Because of the problems mentioned earlier, that file clerks often had with late arrival or absences, the discipline and work habits of the file clerks were sensitive issues in the PSC.Source:This case was written by Hal G. Rainey, Alumni Foundation Distinguished Professor, Department of Public Administration and Policy, University of GeorgiaDiscussion QuestionsAnalyze the incident in relation to questions of values.1a. What values was the A.D. promoting with the change?1b. What values were the file clerks emphasizing through their behavior?What motivation concepts and theories help you to analyze the case?What leadership concepts and theories help you to analyze the case?On the basis of your answers to the preceding questions, make suggestions to the A.D. about actions he should take.4a. What should he say and do, as he stands before the file clerks at their “funeral?”4b. Once he leaves the room and returns to his office, what should he plan to do in the longer term?4c. In advising him on actions to take, try to express the relations between your advice and important issues about values, motivation, and leadership.

Design an application that accepts 10 numbers and displays them in descending order.

Chapter 8Exercise1. Design an application that accepts 10 numbers and displays them in descending order.4. The village of Ringwood conducted a census and created records that contain household data, including income. Ringwood has exactly 75 households. Write a program into which a village statistician can enter each of the 75 household income values, and determine the mean and median house-hold income.13. Your student disk contains fi les named DEBUG08- 01. txt, DEBUG08- 02. txt, and DEBUG08- 03. txt. Each fi le starts with some comments that describe the problem. Comments are lines that begin with two slashes (//). Following the comments, each fi le contains pseudocode that has one or more bugs you must fi nd and correct.08-01// This application reads 10 numbers// and sorts them, and displays the three highest numbersstart Declarations num SIZE = 10 num number num numbers[SIZE] num count getReady() while count < SIZE detailLoop() endwhile finish()stopgetReady() output “Enter a number “ input numberreturndetailLoop() numbers[SIZE] = number count = count + 1 output “Enter a number “ input numberreturnfinish() sort() output “The highest three are “, numbers[0], numbers[0], numbers[0]returnsort() num x = 0 num y = 0 num COMPS = count – 1 while y < COMPS x = 0 while x < COMPS if numbers[x] < numbers[x + 1] then swap() endif x = x + 1 endwhile y = y + 1 endwhilereturnswap() num temp temp = numbers[x + 1] numbers[x + 1] = numbers[x] numbers[x] = tempreturn08-02// This application reads student typing test data// including number of errors on the test, and the number// of words typed per minute. Grades are assigned based// on the following table:// Errors// Speed 0 1 2 or more// 0–30 C D F// 31–50 C C F // 51–80 B C D// 81–100 A B C// 101 and up A A Bstart Declarations num MAX_ERRORS = 2 num errors num wordsPerMinute num grades[5][3] = {“C”, “D”, “F”}, {“C”, “C”, “F”}, {“B”, “C”, “D”}, {“A”, “B”, “C”}, {“A”, “A”, “B”} num LIMITS = 5 num speedLimits[LIMITS] = 0, 31, 51, 81, 101 num row output “Enter number of errors on the test “ input errors if errors = MAX_ERRORS then errors > MAX_ERRORS endif output “Enter the speed in words per minute “ input wordsPerMinute while row < LIMITS AND wordsPerMinute >= speedLimits[row] row = row + 1 endwhile row = row – 1 output “Your grade is “, grades[errors][row]stop08-03This application reads sales data for an automobile dealership.// Up to 100 sale amounts can be entered. The entered sale amounts// are sorted so the median sale can be displayed.start Declarations num SIZE = 100 num QUIT = 99999 num saleAmount num sales[SIZE] num count = 0 num middlePosition num x num y num temp num comps getReady() while saleAmount count < SIZE detailLoop() endwhile finish()stopgetReady() output “Enter sale amount “ input saleAmountreturndetailLoop() sales[x] = saleAmount count = count + 10 output “Enter sale amount “ input saleAmountreturnfinish() sort() middlePosition = count * 2 output “The median sale amount is “, sales[middlePosition]returnsort() comps = count – 1 while y < comps x = 0 while x < y if sales[x] > sales[x + 1] then swap() endif x = x + 1 endwhile y = y + 1 endwhilereturnvoid swap() temp = sales[x] sales[x + 1] = sales[x] sales[x] = tempreturnComplete Chapter 10: Exercise 1, 2, 3, 6, 11Exercises 1,2,3,61. Identify three objects that might belong to each of the following classes: a. Automobile b. Novel Author c. College Course2. Identify three different classes that might contain each of these objects: a. Wolfgang Amadeus Mozart b. My pet cat named Socks c. Apartment 14 at 101 Main Street3. Design a class named Customer Record that holds a customer number, name, and address. Include methods to set the values for each data field and display the values for each data field. Create the class diagram and write the pseudocode that defines the class.6. Complete the following tasks: a. Design a class named Book that holds a stock number, author, title, price, and number of pages for a book. Include methods to set and get the values for each data fi eld. Create the class diagram and write the pseudocode that defi nes the class. b. Design an application that declares two Book objects and sets and displays their values. c. Design an application that declares an array of 10 Books. Prompt the user for data for each of the Books, then display all the values.Chapter 9Exercises 2, 5, 62. Create the logic for a program that continuously prompts the user for a number of dollars until the user enters 0. Pass each entered amount to a conversion method that displays a breakdown of the passed amount into the fewest bills; in other words, the method calculates the number of 20s, 10s, 5s, and 1s needed.5. a. Create the logic for a program that performs arithmetic functions. Design the program to contain two numeric variables, and prompt the user for values for the variables. Pass both variables to methods named sum() and difference(). Create the logic for the methods sum() and difference(); they compute the sum of and diff erence between the values of two arguments, respectively. Each method should perform the appropriate computation and display the results. b. Add a method named product() to the program in Exercise 5a. Th e product() method should compute the result when multiplying two numbers, but not display the answer. Instead, it should return the answer to the calling program, which displays the answer.6. Create the logic for a program that continuously prompts a user for a numeric value until the user enters 0. Th e application passes the value in turn to a method that squares the number and to a method that cubes the number. The program displays the results before reprompting the user. Create the two methods that square and cube a number passed to them, and then return the calculated value.Exercise 8, 12,8. Create the logic for a program that continuously prompts the user for two numeric values that represent the sides of a rectangle. Include two overloaded methods that compute a rectangle’s area. One method takes two numeric parameters and calculates the area by multiplying the parameters. Th e other takes a single numeric parameter, which is squared to • If both numbers entered are greater than 0, call the method version that accepts two parameters and pass it both values. • If one of the values entered is 0 but the other is not, call the version of the method that accepts just one parameter and pass it the nonzero value. • If both the entered values are 0, display an error message. • If both numbers entered are greater than 0, call the method version that accepts two parameters and pass it both values. • If one of the values entered is 0 but the other is not, call the version of the method that accepts just one parameter and pass it the nonzero value. • If both the entered values are 0, display an error message.12. Create the logic for a program that prompts a user for three numbers and stores them in an array. Pass the array to a method that reverses the order of the numbers. Display the reversed numbers in the main program.Exercise 6,6. Complete the following tasks: a. Design a class named Book that holds a stock number, author, title, price, and number of pages for a book. Include methods to set and get the values for each data field. Also include a displayInfo() method that displays each of the Book’s data fields with explanations. b. Design a class named Text Book that is a child class of Book. Include a new data field for the grade level of the book. Override the Book class displayInfo() method so that you accommodate the new grade- level fi eld. c. Design an application that instantiates an object of each type and demonstrates all the methods.Ch 11 Exercise 1, 2a, b Exercise 6, 171. Complete the following tasks: a. Design a class named Circle with fields named radius, area, and diameter. Include a constructor that sets the radius to 1. Include get methods for each field, but include a set method only for the radius. When the radius is set, do not allow it to be zero or a negative number. When the radius is set, calculate the diameter ( twice the radius) and the area ( the radius squared times pi, which is approximately 3.14). Create the class diagram and write the pseudocode that defines the class.2. 2. Complete the following tasks: a. Design a class named Square with fields that hold the length of a side, the length of the perimeter, and the area. Include a constructor that sets the length of a side to 1. Include get methods for each field, but include a set method only for the length of a side, and do not allow a side to be zero or negative. When the side is set, calculate the perimeter length ( four times the side length) and the area ( a side squared). Create the class diagram and write the pseudocode that defines the class.b. Design an application that declares two Squares. Set the side length of one manually, but allow the other to use the default value supplied by the constructor. Then, display each Square’s values.6. Complete the following tasks: a. Design a class named Book that holds a stock number, author, title, price, and number of pages for a book. Include methods to set and get the values for each data field. Also include a displayInfo() method that displays each of the Book’s data fields with explanations.b. Design a class named TextBook that is a child class of Book. Include a new data field for the grade level of the book. Override the Book class displayInfo() method so that you accommodate the new grade- level field.c. Design an application that instantiates an object of each type and demonstrates all the methodsCh 12 Exercises 1, 2, 4, 101. Take a critical look at three GUI applications with which you are familiar— for example, a spreadsheet, a word- processing program, and a game. Describe how well each conforms to the GUI design guidelines listed in this chapter.2.Select one element of poor GUI design in a program with which you are familiar. Describe how you would improve the design.4. Design the storyboards, interactivity diagram, object dictionary, and any necessary scripts for an interactive program for customers of Sunflower Floral Designs. Allow customers the option of choosing a fl oral arrangement ($ 25 base price), cut fl owners ($ 15 base price), or a corsage ($ 10 base price). Let the customer choose roses, daisies, chry-santhemums, or irises as the dominant flower. If the customer chooses roses, add $5 to the base price. After the customer clicks an Order Now button, display the price of the order.

Was it an internal or external project?

Find an article describing a national project in detail. On the basis of the article and on your understanding of the project, answer the questions below. State any assumptions that you feel are necessary to provide answers.Who were the stakeholders?Was it an internal or external project?What were the most important resources used in the project? Explain.What were the needs and expectations of each stakeholder?What are the alternative approaches for this project?Was the approach selected for the project the best, in your opinion? Explain.What were the risks in the project?Rank the risks according to severity.What was done or could have been done to mitigate those risks?Was the project a success? Why?Was there enough outsourcing in the project? Explain.What lessons can be learned from this project?The assignment is to answer the question provided above in essay form. This is to be in narrative form and should be as thorough as possible. Bullet points should not to be used.The paper should be at least 1.5 – 2 pages in length, Times New Roman 12-pt font, double-spaced, 1 inch margins and utilizing at least one outside scholarly or professional source related to project management. The textbook should also be utilized. Do not insert excess line spacing. APA formatting and citation should be used.

Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company

Course Project: Security Assessmentand RecommendationsOverview | Guidelines | Grading Rubrics | Best PracticesThis course does involve a lot of technical information and theory, but what really matters is how this knowledge can be used to identify and remediate real-world security issues. What you learn in this course should be directly applicable to your work environment. The course project that you will complete is designed to further this goal. In the first part of the project, you will choose an organization from one of two given scenarios (below) andidentify potential security weaknesses, and in the second part of the project, you will recommend solutions. The first part of the project is due in Week 3, and the second part of the project, along with the first part (presumably revised based on instructor feedback) is due in Week 6. This project constitutes a significant portion of your overall grade. This is an individual assignment and may not be completed in teams.Phase I – Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design CompanyIn this phase, you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. The scenarios are in Doc Sharing in the Course Project select area.You will then identify potential security weaknesses.Security weaknesses – You must choose two from the following three areas (hardware, software, and policy – excluding password policies) and identify an item that requires improved security.Todefine the asset or policy with sufficient detail to justify your assessment, your assessment must include:· the vulnerability associated with the asset or policy· the possible threats against the asset or policy· the likelihood that the threat will occur (risk)· the consequences to mission critical business processes should the threat occur· how the organization’s competitive edge will be affected should the threat occurTo clarify an item that requires improved security, you must identify one of these items:· one hardware and one software weakness· one hardware and one policy weakness· one software and one policy weaknessOther required elements include:· Cover sheet· APA-style· In-text citations and Reference section· Minimum length 3 pages, maximum length 5 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length.Phase II: the Course Project (comprised of Phase I and II) – Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design CompanyIn this phase of the project you will include Part I (presumably improved as needed based upon Week 3 feedback) and then you will recommend solutions for the security weaknesses you identified in the Phase I.Definition of the solution – Hardware solutions must include vendor, major specifications with an emphasis on the security features, and location of placement with diagram. Software solutions must include vendor andmajor specifications, with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.Justification – You must address the efficacy of the solution in terms of the identified threats and vulnerabilities; the cost of the solution, including its purchase (if applicable); and its implementation, including training and maintenance.Impact on business processes – You must discuss any potential positive or negative effects of the solution on business processes and discuss the need for a trade-off between security and business requirements using quantitative rather than simply qualitative statements.Other required elements include:· Cover sheet· APA-style· In-text citations and Reference section· 5 reference minimum· Minimum length of solutions: 6 pages, maximum length 10 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length.The course project will consist of two deliverables:Phase I (Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company); and Phase II: the Course Project (comprised of Phases I and II – Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design Company).The grading standards for each deliverable areas follows:Phase I (Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company)CategoryPointsDescriptionSecurity Weaknesses80Identifies two plausible and significant weaknesses from required list (hardware, software, policy). Includes realistic vulnerability(s) associated with the asset or policy, plausible and likely threats against the asset or policy, an estimation of the likelihood that the threat will occur (risk), the consequences to mission critical business processes should the threat occur, and how the organization’s competitive edge will be affected should the threat occur.Presentation20Writing quality and flow demonstrates a graduate-level writing competency and does not contain misspellings, poor grammar, incorrect punctuation, and questionable sentence structure (syntax errors).Total100A quality paper will meet or exceed all of the above requirements.Phase II – the Course Project (comprised of Phase I and II) – Recommend solutions to the potential weaknesses from either the Aircraft Solutions or Quality Web Design CompanyCategoryPointsDescriptionSecurity Weaknesses60Identifies two plausible and significant weaknesses from required list (hardware, software, policy). Includes realistic vulnerability(s) associated with the asset or policy, plausible and likely threats against the asset or policy, an estimation of likelihood that the threat will occur (risk), the consequences to mission critical business processes should the threat occur, and how the organization’s competitive edge will be affected should the threat occurDefinition of Solution30Includes vendor andmajor specifications, and identifies the relevant security features as related to the weakness identified. If hardware, includes location of placement with diagram. Policy solutions include the complete portion of the policy that effectively address the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.Justification30Demonstrates the efficacy of the solution in terms of the identified threats and vulnerabilities. Includes complete costs, including purchase, implementation, training, and maintenance as needed.Impact on Business Processes25Addresses plausible, potential positive, or negative effects on business processes. Discusses trade-off between security and business requirements using quantitative statements.Presentation25Writing quality and flow demonstrates a graduate-level writing competency and does not contain misspellings, poor grammar, incorrect punctuation, and questionable sentence structure (syntax errors).Total170A quality paper will meet or exceed all of the above requirements.Course projects cause many students anxiety. Some anxiety is probably healthy; it means you want to do a good job. But too much anxiety usually interferes with performance. Here are some tips you may want to consider as you plan and create your course project.1.Read the Course Project Requirements and the Course Project Sample Template (in Doc Sharing) early. Here’s why: if you have in mind the required specifications of the assignment as you start the weekly assignments and other activities, you’ll be able to recognize when you come across information that you might want to use in your project.2.Keep a separate project notebook. Don’t worry about keeping it highly organized and documented; just jot down ideas as they come to you. You’ll be surprised how much anxiety you prevent by simply having ideas ready when you sit down to write.3.Use the “mull” method. This means spend a few days mulling over the assignment. Don’t force yourself to think about it, but, if you’ve read over the project requirements and have your project notebook with you as you do your regular class activities and your regular daily activities, your brain will work on the assignment all by itself. As it does so, more ideas will come to you and all you have to do is jot them down.4.Don’t try to write the paper from the beginning to the end correctly the first time. If you do, you’ll probably forget all kinds of things and your sentence structure and word choice, not to mention spelling and grammar, will likely not be as good as it should be. Don’t edit as you write. Just write. That way the ideas can come out with less effort. Edit later.5.Use your text to help you get ideas. For example, when considering vulnerabilities, check the index at the back of the text for the word “vulnerabilities” and browse through those pages. When you’re designing the network, look through the chapter on security in networks.6.Use available sources such as the DeVry Library, our course Lectures, discussions, other books, journals, the Internet, and so forth.7.Keep a digital notebook. When you find an interesting article (or even an article that looks as if it could be useful), copy it and paste it into your document along with the address (URL), date, author, and so forth. You can read through these later and keep what seems useful and discard the rest.8.Make a schedule and keep to it. For example, you may set aside an hour to research topics. Use the suggestion in #7, pasting down articles and parts of articles to read later. Set aside another hour or two later to read through the material you collected. If it’s of no use, delete it so that your digital notebook becomes more refined and useful. If you start work early and schedule smallish times to do your work, you’ll find that, a) you learn a lot more, b) you have much less anxiety, and c) you end up with a better grade. Try it!9.Ask questions. The Q & A forum in the threaded discussions in the course shell is an excellent place to ask questions. This isn’t cheating; this is working together to increase everyone’s knowledge. You’re not asking someone to write your paper, you’re asking for ideas (or answering other students’ questions). Contact your instructor with questions. Your instructor is the expert on what is expected, so use this resource.10.Read about APA-style citations by clicking the link, APA Guidelines for Citing Sources, near the bottom of the Course Syllabus. You will save a lot of time by addressing these style issues as you write your paper rather than trying to do this at the end.11.Once you’ve written your rough draft, start the editing process:•Look over the Course Project Requirements, particularly the Grading Standards, and make sure that you’ve addressed every element that is required.•Remove any unnecessary sentences or phrases. This project is not supposed to be long (remember that there is a 12-page maximum for the final project – not counting the cover page, graphics, references, etc.), it’s supposed to be good. Any extra wording should be deleted. For example, “All of these weaknesses happen on a regular base and in order to make sure that they do not occur, the company needs to step in and make modification that will not only correct existing issues but prevent future ones as well,” could be written effectively as, “These vulnerabilities are ongoing and action needs to be taken.”•The key to good technical or business (and some would say creative) writing is being clear and effective. Don’t try to make the paper sound “educated.” For example, instead of writing“This document is set forth to identify and address potential security issues…,” just say what you need to say. Much better would have been, “This report addresses security issues….” This type of clear writing is a lot easier on the writer and on the reader.•When you use an acronym for the first time, spell it out. For example, “…the use of a VPN (virtual private network) is common among….” After that, just use the acronym.•Whenever you use pronouns like “it” or “they” that refer to something mentioned earlier, be sure that it is clear to what or to whom “it” or “they” refer. For example, “The company has implemented a firewall at corporate headquarters and a packet filtering router at the branch office. It has functioned well since then.” In this case, the “It” could refer to the company, the firewall, the headquarters, the branch office, or the packet filtering router. Clearer would be, “The company has implemented a firewall at corporate headquarters and a packet filtering router at the branch office. Network perimeter security has functioned well since then.”•Read your work out loud. You may find lots of little mistakes and sentence structure errors this way.•Use spell check and grammatical correction features of your word processing software, but don’t rely on them. Correctly spelled words will two often be red as bean write when they are whey off.•Proofread when you are not tired and when you have had some time away from your work on the paper. Your goal should be to catch ALL mistakes or omissions. Professional or academic papers that contain errors send a message to the reader that a) you are not a reliable source of information or b) you don’t care about the reader. Neither of these may be true but, that’s the message you send when you send errors.•Be sure that all ideas that you got from outside sources are accompanied by an in-text citation (not a footnote) and that the in-text citation refers to an item in the References section. Be sure to use APA-style.•As much as possible, avoid direct quotations. Only use direct quotations when necessary. For example, “…as Bill Gates once famously said, ‘No one will ever need more than 640K of memory’….” Since the writer is stating a specific (and silly) idea expressed by a well-known person, this little direct quotation is appropriate. But longer “cut-and-paste” sections are almost always unnecessary in this project, and most instructors don’t feel comfortable giving you a grade for a paper that was, to any significant extent, written by someone else. Usually a paper that contains more than 15-20% direct quotations is considered unacceptable. Some instructors think even this is way too high. When in doubt, contact the instructor. In any case, if you use a lot of direct quotations, expect to receive a poor grade and, if you use ANY direct quotation, be sure to use quotation marks and an in-text citation. If you don’t, you risk disciplinary action for violation of the academic integrity policy. See the course syllabus for more details.Of all these tips, probably the most important are: start early and ask questions. Your instructor is committed to helping you get the most out of the course. If you start early, you’ll be able to ask questions that will save you time and effort. If you wait until the last minute, you’ll be stressed and won’t have time to incorporate feedback from your instructor.GOOD LUCK AND GOOD WRITING!

Identify 1 motivational theory and 1 leadership theory, and discuss their relevance to global human resource management.

In your own words, answer this unit’s discussion questions in a main post (recommended minimum 300 words)Assignment DetailsGlobalization affects the management and the motivation efforts required to manage and motivate a culturally diverse workforce.Identify 1 motivational theory and 1 leadership theory, and discuss their relevance to global human resource management. Discuss how these will affect employees within a company.Review and consider the theories presented by 2 of your peers.One approach to your replies is to share your thoughts. Address additional supporting reasons on the importance of the theories presented. Another approach would be to expand on the discussion. Provide your perspective by introducing examples and possible outcomes.

Understand the role of governments when entering into new markets

Case Study Goals:Understand the role of governments when entering into new marketsApply cultural considerations in adapting a global brand to a local contextCritically assess marketing implementation strategies.Identify potential country markets that match with a company’s core competencies.Demonstrate critical thinking and effective writing skills consistent with a 400-level college course.Case Study Objectives:Understand how a company’s management orientation can direct their approach to foreign market entryDemonstrate understanding and application of the external environments affecting global marketing activitiesList, describe and apply the different modes of foreign market entryAnalyze qualitative country and business facts and their implication on global marketing strategyMake and defend your country selection and business decisionsDevelop critical thinking skills by demonstrating ability to apply global marketing concepts to a particular situationDemonstrate college-level writing skills consistent with a 400-level course.Please answer the following questions:The two from the Case Study itself:What has made Conexia successful so far?How will the U.S market be different from what Conexia has seen in Argentina?Additional questions to answer:Based on the case narrative, identify two issues challenging Conexia’s current operation and decision. What would you recommend to Conexia to solve those challenges?For its next expansion project, what country and city would you recommend for Conexia? Be sure to explain your rationale in terms of why that country/city would be an attractive expansion strategy.Study the case and list three strengths, weaknesses, opportunities and threats to Conexia entering the US market. Remember that in a SWOT analysis, strengths and weaknesses are internal. Opportunities and threats are external.Case Study Goals:Understand the role of governments when entering into new marketsApply cultural considerations in adapting a global brand to a local contextCritically assess marketing implementation strategies.Identify potential country markets that match with a company’s core competencies.Demonstrate critical thinking and effective writing skills consistent with a 400-level college course.Case Study Objectives:Understand how a company’s management orientation can direct their approach to foreign market entryDemonstrate understanding and application of the external environments affecting global marketing activitiesList, describe and apply the different modes of foreign market entryAnalyze qualitative country and business facts and their implication on global marketing strategyMake and defend your country selection and business decisionsDevelop critical thinking skills by demonstrating ability to apply global marketing concepts to a particular situationDemonstrate college-level writing skills consistent with a 400-level course.PREPAREyour Case Study as follows:Carefully read the case once for a review and then a second time for specific content information. Be sure to give special emphasis on the strengths, weaknesses, opportunities and threats for the organization. Be prepared to discuss the organization in terms of mode of entry, operational policies as well as extent of customization based on cultural considerations.Thoroughly read the chapters in the weekly conferences and conduct additional outside research on country and business resources.Review the following global marketing topics to ensure you understand the marketing principles and can demonstrate you can apply them in this case. Be sure you understand all of the global marketing concepts covered in this case and review these concepts in the course modules if needed:Marketing environmentManagement orientationsForeign market entryGlobal branding principlesProduct developmentBrandingPricingPromotionDistributionSWOT analysis3. Prepare thoughtful answers to the questions being asked!4. FollowALLthe guidelines for writing and submitting your Written Assignment5. The Written Assignment should be 4 pages except cover and reference pages

Why does Miner use this writing strategy to describe the Nacirema?

Miner1. Who are the Nacirema?2. Why does Miner use this writing strategy to describe the Nacirema?Lovely Hula Hands (Trask)After defining the terms norm, value, and belief provide an example of a Hawaiian norm, value and belief from the reading.How is the commercialization of Hawaiian culture analogous to prostitution, according to Trask?What is your reaction to Trask’s article? How do you think your own statuses (e.g. nationality, race, class, etc….) influence your reaction?McDonald’s in Hong Kong: Consumerism, Dietary Change and the Rise of a Children’s Culture (Watson)What are some of the factors that allowed for the success of McDonald’s in Hong Kong?Give at least four examples of how McDonald’s culture has been localized in Hong Kong.In the beginning of the article, Watson poses the question, “Does the roaring success of McDonald’s and its rivals in the fast food industry mean that Hong Kong’s local culture is under siege (p. 152). And, “Are food chains helping to create a homogeneous, ‘global’ culture…” (p.152)? How does he ultimately answer these questions? Do you agree with his response? Why/why not?NOTE:Remember, there will be ten discussion opportunities during the quarter. You must participate in at least FIVE. You decide which five. I will drop your five lowest scores. Each post is worth 20 points. Extra posts do not equal extra credit. Strong posts will demonstrate understanding and connection to course materials and include citations/references (see grading rubric for details).You also must respond to two peers’ responses to the prompt for the discussions in which you choose to participate. Responses are due by midnight on Wednesday. Responses should be at least 150 words each (put the word count in all responses). Replies should take the conversation further by adding questions or your own ideas in your replies. In addition, you can point out both strengths and areas of improvement on your peers’ submission. Strong posts will demonstrate understanding and connection to course materials. Each reply is worth 5 points, for a total of 10.You have the opportunity to earn extra credit points by responding to your peers’ replies to your own thread (100 minimum word count, worth up to 2 points each). These are due on the same day as your other replies to peers. In order to ‘entice’ others to respond to you, and thus be able to take advantage of this extra credit opportunity, you will have to craft a strong original post that is engaging enough to others that they are interested in replying to it. Posting early in the discussion also helps

× How can I help you?