Describe in detail the goals you have for this unit

Explain how financial managers use financial calculators, Microsoft Excel, and financial statements to measure the financial performance of a business entity. Use Microsoft Word to write a paper for this Assignment and answer the questions listed below: 1. Describe in detail the goals you have for this unit. 2. Describe how this unit will help you in your professional development. 3. After viewing the videos, what are the three most important concepts you learned? 4. How would learning how to use Excel and a financial calculator assist you with your personal goals or as a business manager?

  • CapitalEssayWriting.com is a company which offers academic support and assistance to students. Our mission is to provide high quality academic services to our clients. This is done through quality writing and consistent follow-up of the students’ instructions. At CapitalEssayWriting.com, we have highly qualified and competent writers to handle any of your projects. Our past quality projects and assignments ideally speak for themselves.

Choose one of the media articles or case studies listed by the lecturer.

Length: 1200-1300 words
Submission method options
Alternative submission method
Task
Your lecturer will place a link in for relevant article and/or case studies.
https://bestantivirus.reviews/article/internet-security-threats
This will be available to you just after your second assignment has been submitted.
1. Choose one of the media articles or case studies listed by the lecturer.
2. Use the title of the article/case study provided as the title of your essay, so that the lecturer knows which article you are analysing.
3. Undertake further research about your chosen case, to assist you in analysing and discussing it in your essay.
You are required to complete the following:
Write an essay:
• The word limit for the essay is 1200-1300 words. Headings, citations and references do not count towards the word limit, but quotations do.
• Analyse the article/case study from the perspective of four classical ethical theories including utilitarianism, deontology, virtue and contract. Present well-reasoned arguments for your assessments and recommendations.
• Write an overall conclusion that justifies your recommendations made in your essay.
• Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations.
Rationale
This assessment extends the skills practiced in Assessment item 1 and 2, to help you to achieve all the learning objectives.
In addition to identifying a contentious situation in ICT and dissecting the argument(s) about it, you must also now demonstrate the ability to evaluate the elements of the argument by introducing classical ethical principles where appropriate.
Since Assessment item 1 and 2, your knowledge will have grown, and you will now realise that almost all ICT ethical dilemmas can be classified under one of the main ICT ethical issues that are discussed in this subject; for instance, surveillance is a sub-issue of privacy, harmful software is a sub-issue of ICT professionalism, and piracy is a sub-issue of intellectual property.
In ICT, the main ethical issues are taken to be:
• ICT professionalism
• Privacy
• Security
• Cyber-crime
• Intellectual property
• Regulation on the internet
• Social inclusion
• Community and identity
• Pervasive and convergent computing.
The assessment item is designed to help you to build skills towards achieving the learning objectives, by requiring you to:
• identify an ICT-related ethical issue from a media article or case study;
• apply classical ethical theory to the analysis of an ethically questionable situation to determine the rightness or wrongness of actions/decisions made therein;
• derive logical and justifiable conclusions to resolve the ethical issue(s);and,
• apply proper academic referencing.

  • CapitalEssayWriting.com is a company which offers academic support and assistance to students. Our mission is to provide high quality academic services to our clients. This is done through quality writing and consistent follow-up of the students’ instructions. At CapitalEssayWriting.com, we have highly qualified and competent writers to handle any of your projects. Our past quality projects and assignments ideally speak for themselves.

Understanding a real-time and time-critical system

TECH 7410: Software Engineering Methodologies
Assignment 1
Due Date: Thu, Dec 22, 2016 – 16:00 (Week 6)
Weighting: 20%
Submission: via Moodle
Refer to Course Description, especially in regard to: Extensions, Special Consideration, Late Submissions, and Plagiarism.
Purpose:
The purposes of the assignment:
1. Understanding a real-time and time-critical system
2. Understanding Entity Relationship Diagram and Data Flow Diagram in terms of a realtime software system
3. Analyzing a real-time system and the flow of the corresponding software
Introduction:
The banks in Australia (and most of the other countries having modern banking system) provide the customers to transfer money between two accounts in real time. In most of the Australian banks, the transfer software/app, popularly known as Real-time Money Transfer (RMT), has the identical flow. As for example, a transfer starts after usual login and standard authentication. After that, user selects a recipient for the transfer. Having proper authentication (if required), if the total amount to transfer is less than the current balance of the user, the system transfers the money immediately to the recipient. Some of the system allows the sender to send an email to the recipient to let him know about the transfer. Although the transfer seems to be a straight-forward one, most of the bank enforce additional authentication to ensure the smooth and safe transfer of the money. You are now the in-charge of the development of this software in a new Bank. Your task is to oversee the development of this Real-time system required to ensure secured money transfer.
Description:
The RMT should work according to the following rules:
Step-1: Sender enters the interface after successful authentication
Step-2: Selects the account (multiple account may be linked in one interface) and amount to transfer
Step-3: Select the recipient of the transfer either
a) from an already Save info and move to Step-6, OR
b) by entering the recipient name and account info
Step-4: The bank sends a code in SMS in sender’s mobile number (which is already stored in the bank database)
Step-5: Sender retrieve that code from SMS and enter the code in the website/ app and resume the transfer
Step-6: Transfer is completed and a confirmation message is shown
Special Remark: Note that the code is valid for 5 minutes only and if you click on: “Send SMS again with Code” for 5 times within a minute, the account will be blocked for an hour. In addition, if the user requests to send multiple SMSs with different codes, only the final one will work.
Your task is to do a Real-Time Structured Analysis for the RMT considering the aforementioned steps and the Special Remark. You are to present your analysis including the following information:
1. An External Entity-Relationship Diagram (ERD) indicating relationships of the RMT and the other external entities in the system.
2. Data and Control Flow Diagrams (DFD/CFDs) – to sufficient detail that only a single task is carried out by each process at the lowest level. You should show the control events that occur on the same diagrams. Use the real-time extensions for control flows etc. shown in the lecture notes. You need to determine when and where events will occur. For example, whenever a piece of data becomes available it may need a control event to let the system know that it is available. These events must be clearly shown in these DFD/CFD diagrams and then handled in the Control Specification (CSPEC).
3. Process Specifications (Pspecs) – a psuedo-code or similar design language specification is required for each process at the lowest level.
4. Control Specifications (Cspec) – use combinational or sequential FSMs as required, presented in an appropriate format. The idea is that the Cspec will completely describe how each and every event or control flow is handled in the system. Note you need to provide both -Process Activation Table- and -State Machine Diagram-.
5. A Data Dictionary is required to adequately describe each name or special term used in the analysis, which includes process names, data flow names, control flow names etc. If you think further information is required make reasonable assumptions and clearly state these in the submission.
Submission Criteria:
The assignment must be submitted electronically through Moodle in pdf format. Draw the diagram using any suitable graphic software, no handwritten diagrams will be accepted. Write a conclusion of the analysis in your own words.
Marking Guide:
Item Marks
An External Entity-Relationship Diagram 4
Data and Control Flow Diagrams (DFD/CFDs) 4
Process specifications (Pspecs) 4
Control Specifications (Cspec) 4
Data Dictionary 3
Conclusion 1
Total 20

  • CapitalEssayWriting.com is a company which offers academic support and assistance to students. Our mission is to provide high quality academic services to our clients. This is done through quality writing and consistent follow-up of the students’ instructions. At CapitalEssayWriting.com, we have highly qualified and competent writers to handle any of your projects. Our past quality projects and assignments ideally speak for themselves.

Discuss how federal, state, and local law enforcement agencies enforce the act.

Write a 1,050- to 1,400-word paper on the history of the USA PATRIOT Act.

Include the following information in your paper:

Discuss how federal, state, and local law enforcement agencies enforce the act.

Explain how the act affects an organization’s security plan.

Format your paper consistent with APA guidelines, with a min. of 6 peer reviewed sources

  • CapitalEssayWriting.com is a company which offers academic support and assistance to students. Our mission is to provide high quality academic services to our clients. This is done through quality writing and consistent follow-up of the students’ instructions. At CapitalEssayWriting.com, we have highly qualified and competent writers to handle any of your projects. Our past quality projects and assignments ideally speak for themselves.

Choose one of the media articles or case studies listed by the lecturer.

Assessment item 3
Applying Ethical Theory
Value: 10 %
Length: 1200-1300 words
Submission method options
Alternative submission method
Task
Your lecturer will place a link in for relevant article and/or case studies.
https://bestantivirus.reviews/article/internet-security-threats
This will be available to you just after your second assignment has been submitted.
1. Choose one of the media articles or case studies listed by the lecturer.
2. Use the title of the article/case study provided as the title of your essay, so that the lecturer knows which article you are analysing.
3. Undertake further research about your chosen case, to assist you in analysing and discussing it in your essay.
You are required to complete the following:
Write an essay:
• The word limit for the essay is 1200-1300 words. Headings, citations and references do not count towards the word limit, but quotations do.
• Analyse the article/case study from the perspective of four classical ethical theories including utilitarianism, deontology, virtue and contract. Present well-reasoned arguments for your assessments and recommendations.
• Write an overall conclusion that justifies your recommendations made in your essay.
• Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations.
Rationale
This assessment extends the skills practiced in Assessment item 1 and 2, to help you to achieve all the learning objectives.
In addition to identifying a contentious situation in ICT and dissecting the argument(s) about it, you must also now demonstrate the ability to evaluate the elements of the argument by introducing classical ethical principles where appropriate.
Since Assessment item 1 and 2, your knowledge will have grown, and you will now realise that almost all ICT ethical dilemmas can be classified under one of the main ICT ethical issues that are discussed in this subject; for instance, surveillance is a sub-issue of privacy, harmful software is a sub-issue of ICT professionalism, and piracy is a sub-issue of intellectual property.
In ICT, the main ethical issues are taken to be:
• ICT professionalism
• Privacy
• Security
• Cyber-crime
• Intellectual property
• Regulation on the internet
• Social inclusion
• Community and identity
• Pervasive and convergent computing.
The assessment item is designed to help you to build skills towards achieving the learning objectives, by requiring you to:
• identify an ICT-related ethical issue from a media article or case study;
• apply classical ethical theory to the analysis of an ethically questionable situation to determine the rightness or wrongness of actions/decisions made therein;
• derive logical and justifiable conclusions to resolve the ethical issue(s);and,
• apply proper academic referencing.

  • CapitalEssayWriting.com is a company which offers academic support and assistance to students. Our mission is to provide high quality academic services to our clients. This is done through quality writing and consistent follow-up of the students’ instructions. At CapitalEssayWriting.com, we have highly qualified and competent writers to handle any of your projects. Our past quality projects and assignments ideally speak for themselves.

Define organizational effectiveness.

FOR CLASS CJA/474

Write a 1,050- to 1,200-word paper that addresses the following components:

Define organizational effectiveness.

Apply theories of organizational effectiveness to the management of criminal justice personnel.

Describe methods for exerting control in an organizational setting.

Format your paper consistent with APA guidelines.

  • CapitalEssayWriting.com is a company which offers academic support and assistance to students. Our mission is to provide high quality academic services to our clients. This is done through quality writing and consistent follow-up of the students’ instructions. At CapitalEssayWriting.com, we have highly qualified and competent writers to handle any of your projects. Our past quality projects and assignments ideally speak for themselves.

Mark sued a bank for injuries.

Negligence

Mark sued a bank for injuries. He was not paying attention as he entered the bank because he was looking at his phone. And he fell suffering $10,000 in injuries. Prior to the fall, the janitor had buffed the floor. The janitor had an IQ of 70. Normally, the janitor was closely supervised. However, today his manager was extremely tired, and the manager didn’t notice that the janitor had carelessly used way too much floor wax that was extremely slippery. Is the bank liable for the janitor’s negligence? (Be sure to go through all the negligence elements.) Additionally, note that under the doctrine of respondeat superior the bank WILL be liable for any potential negligence of the janitor employee. What defenses will the bank assert? Assume that the jurisdiction does not recognize assumption of risk or contributory negligence. The jurisdiction does recognize the defense of comparative negligence.

The requirements below must be met for your paper to be accepted and graded: •Write between 500 – 750 words (approximately 2 – 3 pages) using Microsoft Word. •Attempt APA style, see example below. •Use font size 12 and 1” margins. •Include cover page and reference page. •At least 60% of your paper must be original content/writing. •No more than 40% of your content/information may come from references. •Use at least two references from outside the course material, preferably from EBSCOhost. Text book, lectures, and other materials in the course may be used, but are not counted toward the two reference requirement.

Reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) must be identified in the paper and listed on a reference page.Reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) must come from sources such as, scholarly journals found in EBSCOhost, online newspapers such as The Wall Street Journal, government websites, etc. Sources such as Wikis, Yahoo Answers, eHow, etc. are not acceptable.

  • CapitalEssayWriting.com is a company which offers academic support and assistance to students. Our mission is to provide high quality academic services to our clients. This is done through quality writing and consistent follow-up of the students’ instructions. At CapitalEssayWriting.com, we have highly qualified and competent writers to handle any of your projects. Our past quality projects and assignments ideally speak for themselves.

A Holistic Response to Crime Victimization

 

The focus of the Holistic Victim Restitution Plan is to critically analyze victimology through the application of information from sociology, law, psychology, ethics, and related fields to the study of victimology and to develop a holistic plan for victim restitution.

Consider the following questions when analyzing the 10 required scholarly sources:

Who conducted the research or project? Who or what was the topic or focus of the research? What was done (if it was a data driven article)? How was it done (if it was a data driven article)? What were the findings or conclusions of the author? What were the contributions (findings that may have been made to new information on the topic area or applications)? In creating your Holistic Victim Restitution Plan, you are required to

Discuss the history of victimology, victimology theories, and varying approaches used to address the needs of crime victims. Explain who the stakeholders are in crime victimization. Describe the interrelationship of victimology to social justice and the operations of the criminal justice system, including, but not limited to: crime scene investigation techniques and security; the collection, preservation and presentation of evidence; and issues related to correctional institutions, incarceration, and release of offenders. Identify the socioeconomic (cultural) diversity and its relation to contemporary criminal and social justice and victimology. Detail the breakdown of possible strategies and interventions designed to address criminal victimization. Describe how techniques of addressing victimization impact the needs of crime victims. Predict how crime prevention and intervention strategies will be handled over at least the next two decades. Create a holistic plan for addressing victim restitution. The Holistic Victim Restitution Plan

Must be nine double-spaced pages in length (excluding title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center. Must include a separate title page with the following: Title of paper Student’s name Course name and number Instructor’s name Date submitted Must include a formal abstract. Must include section sub-headings. Must begin with an introductory paragraph that has a succinct thesis statement. Must include a discussion of the eight elements listed in the instructions above. Must end with a conclusion that reaffirms your thesis. Must use at least 10 scholarly sources in addition to the course text. Must document all sources in APA style as outlined in the Ashford Writing Center. Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.

  • CapitalEssayWriting.com is a company which offers academic support and assistance to students. Our mission is to provide high quality academic services to our clients. This is done through quality writing and consistent follow-up of the students’ instructions. At CapitalEssayWriting.com, we have highly qualified and competent writers to handle any of your projects. Our past quality projects and assignments ideally speak for themselves.

From the scenarios, discuss two (2) business challenges you identified from Chris and Erica’s weekly scenarios, and suggest how you would effectively address these issues.

View the “Week 11 Scene 1” and “Week 11 Scene 2” scenarios. From the scenarios, discuss two (2) business challenges you identified from Chris and Erica’s weekly scenarios, and suggest how you would effectively address these issues.

https://blackboard.strayer.edu/bbcswebdav/institution/BUS/100/1136/week11/W11-S1.html

https://blackboard.strayer.edu/bbcswebdav/institution/BUS/100/1136/week11/W11-S2.html

  • CapitalEssayWriting.com is a company which offers academic support and assistance to students. Our mission is to provide high quality academic services to our clients. This is done through quality writing and consistent follow-up of the students’ instructions. At CapitalEssayWriting.com, we have highly qualified and competent writers to handle any of your projects. Our past quality projects and assignments ideally speak for themselves.

echnology has changed the way we conduct business on a daily basis. A number of organizations have opted for integrating systems and sharing information with their counterparts.

Assignment 1: Discussion—Integration of Technology

Technology has changed the way we conduct business on a daily basis. A number of organizations have opted for integrating systems and sharing information with their counterparts.

Using the Argosy University online library resources and the Internet, research information technology (IT) systems for supply chains.

Then respond to the following:

As a manager, if you have to design an IT system for supply chain purposes using a cross-functional team, who would you include on your team and why? Explain some of the trade-offs you would consider when designing/acquiring the system. Be specific and support your reasoning with examples. After your initial post, discuss the following:

What trade-offs are involved in (a) sharing information with other organizations in a supply chain and (b) the acquisition of information-processing technology? Who needs to be involved in decisions as they pertain to technology acquisition for supply chain management? Name three different ways that technology has improved the ability to manage supply chains. Explain why integrated technology has improved the ability to manage supply chains. Write your initial response in 200 to 300 words. Apply APA standards to citation of sources. ___________________________________________________________________________________________________________________________-

2nd part

Assignment 2: LASA 2—Evaluating a Supply Chain

In this assignment, you will develop an understanding of the supply chain. You will provide your assessment of a supply chain in the form of an evaluation. This assignment is the second of the two LASA assignments you will complete in this course.

Using the Argosy University online library resources and the Internet, research methods of evaluating supply chains. Select at least three (3) scholarly sources to support the information in your presentation.

Description of LASA:

In this assignment, you will evaluate a supply chain.

Scenario:

You are consulting for the same organization that you worked for in LASA 1. The organization has asked you to design a supply chain and implement a program to monitor its performance with respect to sustainability. They have also asked you to give recommendations for improving upon your plan as the organization grows. The chief executive officer (CEO) has asked you to present your design and recommendations in a PowerPoint presentation at a meeting with the executive management team.

Instructions:

Your presentation should include the following information:

Evaluate the organization’s facilities with regard to capacity and location. Determine whether the organization has enough capacity and whether or not the facilities are strategically located. Conduct an inventory analysis of the firm. Evaluate the firm’s ERP system. Evaluate the firm’s inventory management systems. Identify the firm’s inventory costs. Determine the firm’s optimum order quantities. Identify the firm’s seasonality adjustments and reorder points. Describe the systems used to monitor the performance of the suppliers. Identify the key performance indicators (KPIs). Describe the firm’s risk management strategies. Identify the firm’s conflict management strategies. Recommend strategies, tools, etc. the organization can use to improve or expand upon the supply chain in the future. Identify any potential ethical issues that could have a negative impact on the organization and make recommendations to address them. In addition to the slides in the presentation, include a detailed outline in the speaker notes section explaining the content on each slide. Use at least three (3) scholarly sources to support the information in your presentation. Be sure to cite the sources for your information.

Make sure your presentation adheres to the following Presentation Guidelines:

Create a presentation that is professional and visually appealing. Include a combination of text and graphics. Do not write out your entire presentation on the slides. Use bullet points of keywords and short phrases instead of long sentences and paragraphs. Create your presentation (slides and Speaker Notes) using language that can be easily understood by the intended audience. Use APA formatting for your slides and Speaker Notes (outline). Develop a 10–15-slide presentation (including the title slide and reference slide) in PowerPoint format. Apply APA standards to citation of sources. Use the following file naming convention: LastnameFirstInitial_M5_A2.doc.

  • CapitalEssayWriting.com is a company which offers academic support and assistance to students. Our mission is to provide high quality academic services to our clients. This is done through quality writing and consistent follow-up of the students’ instructions. At CapitalEssayWriting.com, we have highly qualified and competent writers to handle any of your projects. Our past quality projects and assignments ideally speak for themselves.

Some politicians have suggest that the United States enact a constitutional amendment requiring that the federal government balance its budget annually.

Some politicians have suggest that the United States enact a constitutional amendment requiring that the federal government balance its budget annually. Explain why such an amendment, if strictly enforced, would force the government to enact a contractionary fiscal policy whenever the economy experienced a severe recession
write one argument paragraph that the government should NOT enact such a practice.

The length of the three paragraphs should be one page and half

  • CapitalEssayWriting.com is a company which offers academic support and assistance to students. Our mission is to provide high quality academic services to our clients. This is done through quality writing and consistent follow-up of the students’ instructions. At CapitalEssayWriting.com, we have highly qualified and competent writers to handle any of your projects. Our past quality projects and assignments ideally speak for themselves.

The business plan of a healthcare organization describes the purpose of the HCO and lends structure to its organizational goal

Business and Strategic Planning
The business plan of a healthcare organization describes the purpose of the HCO and lends structure to its organizational goals. The strategic plan is used as a directional guide; in other words, how the organization will fulfill its purpose and put ideas into action. The strategic plan also prioritizes the organization’s resources as a means to fulfill the business plan. Simply put, the business plan is the “what,” and the strategic plan is the “how.”
To prepare for this assignment, read Chapters 1 and 2 in the course text as well as the required article by Varkey and Bennett (2010). You may also want to review the recommended article by Williams (2008). For your initial post, answer the following questions in the discussion forum:
What is the difference between a healthcare organization’s business and strategic plan? Be sure to include the purpose of each plan and how they relate to one another.
Why is it important for a healthcare organization to develop a strategic plan?
Support your initial post with in-text citations and references for at least two scholarly sources.
Class Text

Stevens, R., & Silver, L. S. (2015). Strategic planning and marketing in healthcare organizations. San Diego, CA: Bridgepoint Education, Inc.

Week 1 Discussion 2
Strategic Planning and Marketing
Figure 1.1 in the course text illustrates how various functional plans for a healthcare organization support the overall strategic plan.
various functional plans for a healthcare organization support the overall strategic plan
Figure 1.1: Relationship of overall strategic plan to business unit plans. Adapted from Strategic Planning and Marketing in Healthcare Organizations by R. Stevens and L. S. Silver, 2015, section 1.2: “The Importance of Strategic Planning and Marketing – Strategic Planning Process Overview.” Copyright 2015 by Bridgepoint Education, Inc.

The healthcare delivery system is often described as a service-driven industry. Therefore, it is vitally important for healthcare organizations to define the services that they are providing; however, it is equally important to determine the demographics or customer base that requires the specific service.

The strategic planning process supports the healthcare organization by prioritizing objectives and detailing the actions needed to fulfil the goals of the business plan. Specific actions are unique and depend on the healthcare organization’s services, goals, and mission. Not all objectives outlined in the strategic plan require marketing plans (e.g., purchasing land, equipment, and buildings). Other objectives may require a marketing plan (e.g., providing physical therapy targeted toward a specific demographic).
To prepare for this discussion, read Chapters 1 and 2 of the course text. You may also want to review the recommended article by Yang (2010). Then read the scenario below and construct your initial post based on the directives that follow.
Scenario
The marketing director for Happy Valley long-term care center looks at the organization’s strategic plan to differentiate marketable objectives from non-marketable objectives.
Objectives found in the healthcare organization’s strategic plan include the following:
Purchasing medical equipment
Purchasing more land
Acquiring financial capital
Acquiring physical resources
Providing elder day care to Alzheimer’s patients
Providing physical therapy
Providing social activities such as bingo
Promoting product awareness such as: marketing in a manor to improve the public’s perception of the HCO’s product or service
Providing shuttle service to medical appointments
Increasing sales
Creating a brand

Establishing the organization as a leader in the long-term care industry

Initial Post: Based on the Happy Valley scenario detailed above and the information presented in Chapters 1 and 2 of the course text, construct an initial post in which you
Differentiate between the organization’s stated objectives as to whether they are marketable or non-marketable objectives.

Select the marketable objectives (i.e., those you would recommend developing in a marketing plan), and explain why you consider those objectives marketable.

Explain why the marketing plan objectives should be in line with the objectives in the healthcare organization’s strategic plan.

Be sure to provide concrete examples from the text and from your own research. Each source should be cited and referenced according to APA style as outlined in the Writing Center.

Class Text

Stevens, R., & Silver, L. S. (2015). Strategic planning and marketing in healthcare organizations. San Diego, CA: Bridgepoint Education, Inc.
Answer

  • CapitalEssayWriting.com is a company which offers academic support and assistance to students. Our mission is to provide high quality academic services to our clients. This is done through quality writing and consistent follow-up of the students’ instructions. At CapitalEssayWriting.com, we have highly qualified and competent writers to handle any of your projects. Our past quality projects and assignments ideally speak for themselves.