Archive for October 4th, 2020

Marketing Plan Part I

Assignment Content

The key to creating an effective marketing plan is the ability to analyze the environment in which the product or service will be offered. Two tools used for this environmental analysis are the SWOT Analysis and Competitor analysis. In the SWOT analysis, the strengths and weaknesses represent the internal factors while the opportunities and threats reflect the external environment. The competitor analysis identifies major competitors in the field and their competitive advantages.

Note: Your SWOT Analysis Matrix will become Appendix 1 of your Marketing Plan, and your Competitor Analysis Matrix will become Appendix 2 of your Marketing Plan.

Create a SWOT Analysis Matrix, including two to three factors followed by supporting evidence.

Create a Competitor Analysis Matrix, identifying two to three factors followed by supporting evidence.

The Lottery

Remember that this must be an argument essay, not a summary and not a report. Your argument MUST be clearly stated. Do not make me try to figure it out.
Basically, there are three strategies for constructing arguments for these essays:
It can be a literary argument.
It can be a historical argument.
It can frame a contemporary societal argument.
Do not forget that no matter which strategy you pick, this essay is an essay about the short story you have selected. Do not forget to incorporate the story into your argument. An essay on The Lottery that JUST argues the death penalty should be abolished would not be sufficient because it is not tied to the literature.
I will post a link to an student paper on The Lottery on Canvas to stimulate ideas.
A good essay should have a hook, a clear thesis statement, and a thoughtful conclusion. Your argument should be supported with evidence.

Your essay should be a minimum of 1000 words. It should be typed, double spaced, Times New Roman or Calibri 11 or 12 point font. Use proper MLA format

Company research

Research on company Apple
1.No need for instruction and conclusion, but please include the references
2.Use the questions as topic headings and use the sub headings under each topic.
3.Layout and references are properly formatted using APA 7.
4.minimal grammar & sentence structure errors
More details are included in the file.

Computer Science/Information Technology

Explain the importance of “when rolling out security policies, make communications and priority. Be sure your approach include these points:
1. Be clear – avoid technical jargon when possible.
2. Set the tone at the top – ask your leaders to help deliver the message.
3. Use many channels – reinforce the message as many times as possible.
4. Be forthcoming – be honest and candid about any impact the policy will have.
5. Say “thank you” – acknowledge the efforts both to create and to implement the security policies.

You have been hired as a security consultant to secure the network of a Fortune 500 company.
1. Describe the purpose of a risk assessment, risk scope, and identify critical areas for an assessment.
2. Select risk assessment methodology and give your rationale behind the one you chose.

Special Education

https://iris.peabody.vanderbilt.edu/module/div/cresource/q2/p06/#content
https://iris.peabody.vanderbilt.edu/module/clde/

write a minimum of a one-page reflection on how the information in the 2 modules above (Diversity and Cultural and Linguistic Differences) relates to your goals as an educator and then identify which of the student learning objectives pertain to the content. Also, implicitly indicate which element of thought you used in expanding your understanding of diversity and cultural/linguistic differences.

ABSTRACT AND FINAL RESEARCH PAPER

in this final section of your paper, the research process is concluded. You should provide a summary of your research based on the Research Questions or Hypothesis, Problem Statement, Purpose, Significance (those items noted in the Introduction section), and how you will address the items in the Introduction section with the selected Research Design (Methodology).

Contractors

Answer the following:

1. List 4 benefits to hiring contractors to fill a position, or set of positions, you need filled. (Not just one or two words each)

2. List 4 downsides to hiring contractors to fill a position, or set of positions, you need filled.

3. Give 4 reasons that hiring someone full time to fill a position is better.

4. Create 6 RFP questions related to your scenario for a service or technology will either have to purchase or contract or service

Compare/Contrast Florida Const. v US Const.

Florida’s State Constitution

Compare and contrast Florida’s state constitution with the U.S. Constitution.

What is a constitution? What is its purpose?

Discuss in your paper the similarities (in the format and arrangement, structure of governmental offices, for example) and the differences (length of the documents, specificity, # of amendments, and so on) between these two documents.

When was each constitution proposed and where? When was each ratified, how, and by whom?

Next, find the processes by which Florida’s Constitution can be amended. How many ways exist by which Florida’s Constitution can be amended? List and describe each way.

Then, research online to find one proposed amendment to the Florida Constitution which will be on the ballot in Florida this year (2020). Describe, in your own words, what it would do if approved by voters.

Finally, provide your own informed opinion: Do most changes to our state law belong in the Florida state constitution or in our state statutes (Florida state law)? Why?

Explain your views. Cite at least one outside news article as a source of recent information, in addition to your other sources.

Computer Science/Information Technology

You have been tasked with introducing a new security policy to your organization. The new policy requires all employees to wear Identification badges. All visitors will be required to sign in and wear visitor badges.
Thoroughly answer:
1. Why would an organization introduce this type of policy?
2. Many offices within the company are located outside of the united states where there are potential language barriers. How would you implement this policy throughout the entire company?

You have been hired as a consultant to perform a network security assessment for a large firm – you will be focusing on footprinting and Scanning the organization.
Thoroughly answer:

1. Describe the methodology and tools you would use to conduct your assessment.
2. Give rationale for each step in your methodology.

Drones

**Answer the following question**

Discussion questions; For your Primary Post give an in-depth story or explanation.

1. Discuss a specific area where we can use drones or some other new technology in security (cyber or enterprise) and how that technology will replace one job but open up a new job(s).  Make sure to discuss some of the barriers to using drones or that technology