Categories
Writers Solution

Explain the concepts and basic features of integrated marketing communications

Subject Title Integrated Marketing Communications (IMC)
Subject Code MKT201A
Assessment Title Assessment 1. Case Study.
Graduate Capabilities
• Innovative Problem Solving
• Global Citizenship
Learning Outcome/s (found in the
Subject Outline) a) Explain the concepts and basic features of integrated marketing communications
b) Link the aims of integrated marketing communications with basic marketing principles to analyse given communication problems
Assessment type (group or individual) Individual
Weighting % 25%
Word count 1000 words (+/- 10%) excluding cover and references
Due day Sunday by 11.55pm week 4
Submission type Turnitin ?
Format / Layout of Assessment
Report:
ICMS Cover Page
Table of Contents
Introduction
Analysis
Market
Competition
Consumer
?
?
?
?
?
?
?
Page 1 of 5
Conclusion
Reference List
Appendices if required
?
?
Assessment instructions Choose one case study from either the selection provided by your lecturer or propose another which will need to be approved by your lecturer, then conduct further research and analyse an integrated marketing communications campaign applying the theories and concepts from the unit. Each case study includes a detailed profile of a client such as business context,
business model, marketing communication channels, and a plan to develop a new product targeting a new type of consumers, etc.
Based on the learning contents from the first 4 weeks, students are required to present a brief market analysis (approximately 1000 words +/- 10%, 1-2 pages) including the following points:

  • analyse the market that your ‘client’ is facing (e.g. current market situation and evolution, growth opportunities and threats, distribution channels, etc.)
  • identify the competition (e.g. main competitors, their positioning and target markets, etc.)
  • understand the consumers (e.g. who are current key consumers, what are their preferences, are they satisfied with the products of the client, are there any new consumer trends, what are the main trends for this type of consumer, etc.)
    The Case Study analysis needs to match the following:
    • 1000 words +/- 10% excluding cover sheet and references
    • Follow short report formatting • Minimum of 6 resources, 3 from academic resources at minimum.
    NOTE: The chosen case study will be used in Assessment 2.
    Readings for the assessment
    To assist you with writing this report, use the materials found on your
    • Moodle page (lecture slides, recommended and additional readings or other documents).
    • Review the class content.
    • Review the useful links posted on Moodle.
    Complete the Module activities which are designed to support the critical tasks of this Assessment. If you have any further questions, make sure you speak to your lecturer.
    Grading Criteria / Rubric See detailed marking rubric below
    Page 2 of 5
    Assessment 1 – Marking Rubric
    Criteria HD (85-100) D (75-84) CR (65-74) PASS (50-64) FAIL (0-49)
    Criteria 1.
    Introduction. Brief Case Study Background.
    (10 %)? Highly effective introduction including a brief company/case overview. Mostly effective introduction including a brief company/case overview. Moderately effective introduction including a brief company/case overview. Introduction included but need more elaboration / background on the case/company or the overview is too long. There is no clear introduction and does not adequately provide an overview of the chosen case/company.
    Criteria 2.
    Market analysis, application of theories, concepts and methods. (25%)? The analysis is coherently presented. Shows a full understanding of the topic. Theories, concepts and methods are accurately applied and used to justify rationale throughout. Shows a depth of knowledge. Includes insightful commentary and highlights high significance. Links the different theories to analyse and solve the challenges face by the firm in the market in a throughout way The analysis is coherently presented. Shows a significant understanding of the topic. Theories, concepts and methods are accurately applied and used to justify rationale in most instances. Shows a depth of knowledge in all but 1 area. Includes insightful commentary and highlights above average significance. The analysis is present, but hard to follow at times. Shows a good understanding of the topic. Theories, concepts and methods are accurately applied and used to justify the rationale, but further elaboration was needed in 2 areas. Shows a depth of knowledge in all but 2 areas. Includes multiple instances of insightful commentary and highlights average significance. The analysis is present, but hard to follow at times. Shows a basic understanding of the topic. Theories, concepts and methods are sometimes inaccurately applied when used to justify the rationale. Or, greater depth is needed in the analysis and application of the unit content. Includes somewhat insightful commentary and highlights average significance. Analysis is confused or missing. Lacks depth or shows superficial understanding. Theories, concepts and methods are inaccurately applied when used to justify the rationale. Or, greater depth is needed in the analysis and application of unit content. Does not include insightful commentary and highlights little or no significance.
    Criteria 3. Competitor analysis, application of theories, concepts and
    methods. (25%)
    ? The analysis is coherently presented. Shows a full understanding of the topic. Theories, concepts and methods are accurately applied and used to justify rationale throughout. Shows a depth of knowledge. Includes insightful commentary and highlights high significance.
    The analysis is coherently presented. Shows a significant understanding of the topic. Theories, concepts and methods are accurately applied and used to justify rationale in most instances. Shows a depth of knowledge in all but 1 area. Includes insightful commentary and highlights above average significance. The analysis is present, but hard to follow at times. Shows a good understanding of the topic. Theories, concepts and methods are accurately applied and used to justify the rationale, but further elaboration was needed in 2 areas. Shows a depth of knowledge in all but 2 areas. Includes multiple instances of insightful The analysis is present, but hard to follow at times. Shows a basic understanding of the topic. Theories, concepts and methods are sometimes inaccurately applied when used to justify the rationale. Or, greater depth is needed in the analysis and application of the unit content. Includes somewhat insightful Analysis is confused or missing. Lacks depth or shows superficial understanding. Theories, concepts and methods are inaccurately applied when used to justify the rationale. Or, greater depth is needed in the analysis and application of unit content. Does not include insightful commentary and highlights little or no significance.
    commentary and highlights average significance. commentary and highlights average significance.
    Criteria 4.
    Consumer
    analysis, application of theories, concepts and
    methods. (25%)?
    The analysis is coherently presented. Shows a full understanding of the topic. Theories, concepts and methods are accurately applied and used to justify rationale throughout. Shows a depth of knowledge. Includes insightful commentary and highlights high significance.
    The analysis is coherently presented. Shows a significant understanding of the topic. Theories, concepts and methods are accurately applied and used to justify rationale in most instances. Shows a depth of knowledge in all but 1 area. Includes insightful commentary and highlights above average significance.
    The analysis is present, but hard to follow at times. Shows a good understanding of the topic. Theories, concepts and methods are accurately applied and used to justify the rationale, but further elaboration was needed in 2 areas. Shows a depth of knowledge in all but 2 area. Includes multiple instances of insightful commentary and highlights average significance.
    The analysis is present, but hard to follow at times. Shows a basic understanding of the topic. Theories, concepts and methods are sometimes inaccurately applied when used to justify the rationale. Or, greater depth is needed in the analysis and application of the unit content. Includes somewhat insightful commentary and highlights average significance.
    Analysis is confused or missing. Lacks depth or shows superficial understanding. Theories, concepts and methods are inaccurately applied when used to justify the rationale. Or, greater depth is needed in the analysis and application of unit content. Does not include insightful commentary and highlights little or no significance.
    Criteria 4.
    Conclusion. (5%)? Thorough conclusion that summarises effectively. Mostly thorough conclusion that summarises effectively. Somewhat thorough conclusion that summarises adequately. Minimal conclusion that summarises averagely but lacks depth in some areas. Conclusion present but does not summarise and is not effective. Or conclusion missing.
    Criteria 5.
    Presentation, referencing and structure (10%)? Professional presentation and effective communication of analysis and evaluation, fully supported with evidence. Outstanding report structure and communication of ideas enhances readability. Free of errors and logical flow, appropriate sections. At least 6 resources from reliable sources, with at least 3 being from academic sources… e.g., journals, company websites, trustworthy articles. Well-structured presentation and communication of analysis and evaluation, supported with evidence that closely correspond to the elements of the report. Very good report structure, free of errors and has a logical flow, appropriate sections. 5 resources from reliable
    sources, e.g., journals, company websites, trustworthy articles.
    OR
    1 source not reliable.
    Appropriate presentation and communication of analysis and evaluation, supported with some evidence. Good report structure, free of errors and has a logical flow with appropriate sections. 4 resources from reliable
    sources, e.g., journals, company websites, trustworthy articles.
    OR
    2 sources not reliable.
    Presentation that shows some evidence of report structure, but errors may detract from the communication of the analysis and evaluation.
    There is some evidence used but it may not correspond to the elements and sometimes detract from the readability. Basic report structure, some errors and is hard to follow, some sections are missing. 3 resources from reliable
    sources, e.g., journals, company websites, trustworthy articles.
    OR
    2 sources not reliable Lacks evidence of a structured presentation with limited analysis and evaluations. The few pieces of evidence used do not correspond to the key elements. Missing appropriate report structure, contains errors and hard to follow, appropriate sections are missing. 2 resources, OR less than 3 from reliable sources e.g., journals, company websites, trustworthy articles.
    OR
    4 or more not from reliable sources

WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER on Explain the concepts and basic features of integrated marketing communications

TO BE RE-WRITTEN FROM THE SCRATCH

Categories
Writers Solution

Incomplete mobile communications campaign

2000 words and 25 slides
Assessment Brief
ASSESSMENT BRIEF I MOBILE COMMUNICATIONS
File: 305_MobileCommunications_Assessment3 1
Author: Thomson / Rogerson Date: 30/05/2018 Status: Final
MOBILE COMMUNICATIONS
Assessment 3
Creating a Mobile Communications Experience
Class Presentation and Written Report
Due: Week 12
Weighting: 40%
Learning Outcomes:
d. investigate the advantages of different types of revenue models for mobile communications;
e. create a strategic mobile communications campaign for placement in an app, mobile, web or social media
environment;
f. express a qualified view on where strategic mobile communications will be heading in the next 1 to 5 years.
Description:
Students are to develop a strategic mobile communication campaign for a product, brand or service that would
benefit from a mobile-first communication strategy. Also, include an assessment of how this solution could be
adapted to where mobile communication as an advertising and media strategy is developing over the next 1 to 5
years.
Details:
2,000 word report and minimum 25 slide presentation.
Upload report and presentation to Moodle as PDF files for marking.
Marking Criteria & Rubrics:
Criterion 1: Comprehensiveness of mobile communications campaign – 40%
Fail: Incomplete mobile communications campaign
Pass: Adequate but basic mobile communications campaign
Credit: Competent mobile communications campaign
Distinction: Compressive and detailed mobile communications campaign
High Distinction Outstanding and insightful mobile communications campaign
Criterion 2: Assessment of future relevance of campaign – 30%
Fail: Incomplete reflection of advantages of revenue model
Pass: Adequate but basic reflection of advantages of revenue model
Credit: Competent reflection of advantages of revenue model
Distinction: Compressive and detailed reflection of advantages of revenue model
High Distinction Outstanding and insightful reflection of advantages of revenue model
Criterion 3: Quality of presentation – 30%
Fail: Incomplete presentation
Pass: Adequate but basic presentation
Credit: Competent presentation
Distinction: Compressive and detailed p presentation
High Distinction Outstanding and insightful presentation

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com ON  Incomplete mobile communications campaign

NO PLAGIARISM, Get impressive Grades in Your Academic Work

Categories
Writers Solution

Business Data Communications and Networking

Business Data Communications and Networking

Thirteenth Edition

Jerry Fi tzGerald Jerry FitzGerald & Associates

Alan Dennis Indiana University

Alexandra Durcikova University of Oklahoma

� �

ACQUISITIONS EDITOR Darren Lalonde EDITORIAL MANAGER Gladys Soto CONTENT MANAGEMENT DIRECTOR Lisa Wojcik CONTENT MANAGER Nichole Urban SENIOR CONTENT SPECIALIST Nicole Repasky PRODUCTION EDITOR Padmapriya Soundararajan PHOTO RESEARCHER Billy Ray COVER PHOTO CREDIT © Wright Studio/Shutterstock

This book was set in 10/12, Minion Pro by SPi Global and printed and bound by Strategic Content Imaging.

Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foun- dation of principles that include responsibility to the communities we serve and where we live and work. In 2008, we launched a Corporate Citizenship Initiative, a global effort to address the environmental, social, economic, and ethical challenges we face in our business. Among the issues we are addressing are carbon impact, paper specifications and pro- curement, ethical conduct within our business and among our vendors, and community and charitable support. For more information, please visit our website: www.wiley.com/go/citizenship.

Copyright © 2017, 2015, 2012, 2009, 2007 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923 (Web site: www.copyright.com). Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008, or online at: www.wiley.com/go/permissions.

Evaluation copies are provided to qualified academics and professionals for review purposes only, for use in their courses during the next academic year. These copies are licensed and may not be sold or transferred to a third party. Upon com- pletion of the review period, please return the evaluation copy to Wiley. Return instructions and a free of charge return shipping label are available at: www.wiley.com/go/returnlabel. If you have chosen to adopt this textbook for use in your course, please accept this book as your complimentary desk copy. Outside of the United States, please contact your local sales representative.

ISBN: 978-1-119-36883-0 (PBK) ISBN: 978-1-119-36885-4 (EVALC)

Library of Congress Cataloging in Publication Data: LCCN: 2017042819

The inside back cover will contain printing identification and country of origin if omitted from this page. In addition, if the ISBN on the back cover differs from the ISBN on this page, the one on the back cover is correct.

� �

To my son Alec, Alan

To all curious minds who want to know how today’s modern world works.

Alexandra

� �

� �

ABOUT THE AUTHORS

Alan Dennis is a Fellow of the Association for Information Systems and a professor of information systems in the Kelley School of Business at Indiana University. He holds the John T. Chambers Chair in Internet Systems, which was established to honor John Chambers, president and chief executive officer of Cisco Systems, the worldwide leader of networking technologies for the Internet.

Prior to joining Indiana University, Alan spent nine years as a professor at the University of Georgia, where he won the Richard B. Russell Award for Excellence in Undergraduate Teaching. He has a bachelor’s degree in computer science from Acadia University in Nova Scotia, Canada, and an MBA from Queen’s University in Ontario, Canada. His PhD in management of information systems is from the University of Arizona. Prior to entering the Arizona doctoral program, he spent three years on the faculty of the Queen’s School of Business.

Alan has extensive experience in the development and application of groupware and Internet technologies and co-founded Courseload, an electronic textbook company whose goal is to improve learning and reduce the cost of textbooks. He has won many awards for theoretical and applied research and has published more than 150 business and research articles, including those in Management Science, MIS Quarterly, Information Systems Research, Academy of Management Journal, Organization Behavior and Human Decision Making, Journal of Applied Psychology, Communications of the ACM, and IEEE Transactions of Systems, Man, and Cybernetics. His first book was Getting Started with Microcomputers, published in 1986. Alan is also an author of two systems analysis and design books published by Wiley. He is the cochair of the Internet Tech- nologies Track of the Hawaii International Conference on System Sciences. He has served as a consultant to BellSouth, Boeing, IBM, Hughes Missile Systems, the U.S. Department of Defense, and the Australian Army.

Alexandra Durcikova is an Assistant Professor at the Price College of Business, University of Oklahoma. Alexandra has a PhD in management information systems from the University of Pittsburgh. She has earned an MSc degree in solid state physics from Comenius University, Bratislava, worked as an experimental physics researcher in the area of superconductivity and as an instructor of executive MBA students prior to pursuing her PhD. Alexandra’s research interests include knowledge management and knowledge management systems, the role of organizational climate in the use of knowledge management systems, knowledge management system characteristics, governance mechanisms in the use of knowledge management systems, and human compliance with security policy and characteristics of successful phishing attempts within the area of network security. Her research appears in Information Systems Research, MIS Quarterly, Journal of Management Information Systems, Information Systems Journal, Journal of Organizational and End User Computing, International Journal of Human-Computer Studies, International Journal of Human-Computer Studies, and Communications of the ACM.

Alexandra has been teaching business data communications to both undergraduate and grad- uate students for several years. In addition, she has been teaching classes on information technol- ogy strategy and most recently won the Dean’s Award for Undergraduate Teaching Excellence while teaching at the University of Arizona.

Dr. Jerry FitzGerald wrote the early editions of this book in the 1980s. At the time, he was the principal in Jerry FitzGerald & Associates, a firm he started in 1977.

v

� �

PREFACE

The field of data communications has grown faster and become more important than computer processing itself. Though they go hand in hand, the ability to communicate and connect with other computers and mobile devices is what makes or breaks a business today. There are three trends that support this notion. First, the wireless LAN and Bring-Your-Own-Device (BYOD) allow us to stay connected not only with the workplace but also with family and friends. Second, computers and networks are becoming an essential part of not only computers but also devices we use for other purpose, such as home appliances. This Internet of things allows you to set the thermostat in your home from your mobile phone, can help you cook a dinner, or eventually can allow you to drive to work without ever touching the steering wheel. Lastly, we see that a lot of life is moving online. At first this started with games, but education, politics, and activism followed swiftly. Therefore, understanding how networks work; how they should be set up to support scalability, mobility, and security; and how to manage them is of utmost importance to any business. This need will call not only for engineers who deeply understand the technical aspects of networks but also for highly social individuals who embrace technology in creative ways to allow business to achieve a competitive edge through utilizing this technology. So the call is for you who are reading this book—you are at the right place at the right time!

PURPOSE OF THIS BOOK Our goal is to combine the fundamental concepts of data communications and networking with practical applications. Although technologies and applications change rapidly, the fundamental concepts evolve much more slowly; they provide the foundation from which new technologies and applications can be understood, evaluated, and compared.

This book has two intended audiences. First and foremost, it is a university textbook. Each chapter introduces, describes, and then summarizes fundamental concepts and applications. Man- agement Focus boxes highlight key issues and describe how networks are actually being used today. Technical Focus boxes highlight key technical issues and provide additional detail. Mini case studies at the end of each chapter provide the opportunity to apply these technical and man- agement concepts. Hands-on exercises help to reinforce the concepts introduced in the chapter. Moreover, the text is accompanied by a detailed Instructor’s Manual that provides additional back- ground information, teaching tips, and sources of material for student exercises, assignments, and exams. Finally, our Web page contains supplements to our book.

Second, this book is intended for the professional who works in data communications and networking. The book has many detailed descriptions of the technical aspects of communica- tions from a business perspective. Moreover, managerial, technical, and sales personnel can use this book to gain a better understanding of fundamental concepts and trade-offs not presented in technical books or product summaries.

vi

� �

Preface vii

WHAT’S NEW IN THIS EDITION The thirteenth edition maintains the three main themes of the twelfth edition, namely, (1) how networks work (Chapters 1–5); (2) network technologies (Chapters 6–10); and (3) network secu- rity and management (Chapters 11 and 12). In the new edition, we removed older technologies and replaced them with new ones. Accordingly, new hands-on activities and questions have been added at the end of each chapter that guide students in understanding how to select technolo- gies to build a network that would support an organization’s business needs. In addition to this overarching change, the thirteenth edition has three major changes from the twelfth edition:

First, at the end of each chapter, we provide key implications for cyber security that arise from the topics discussed in the chapter. We draw implications that focus on improving the management of networks and information systems as well as implications for cyber security of an individual and an organization.

The second major change is that in Chapter 5 we have revised the way we explain how TCP/IP works to make it clearer and more streamlined.

Third, we have revised the security chapter (Chapter 11) to consider some of the newer threats and responses.

LAB EXERCISES www.wiley.com/college/fitzgerald

This edition includes an online lab manual with many hands-on exercises that can be used in a networking lab. These exercises include configuring servers and other additional practical topics.

ONLINE SUPPLEMENTS FOR INSTRUCTORS www.wiley.com/college/fitzgerald

Instructor’s supplements comprise an Instructor’s Manual that includes teaching tips, war stories, and answers to end-of-chapter questions; a Test Bank that includes true-false, multiple choice, short answer, and essay test questions for each chapter; and Lecture Slides in PowerPoint for classroom presentations. All are available on the instructor’s book companion site.

E-BOOK Wiley E-Text: Powered by VitalSource offers students continuing access to materials for their course. Your students can access content on a mobile device, online from any Internet-connected computer, or by a computer via download. With dynamic features built into this e-text, students can search across content, highlight, and take notes that they can share with teachers and classmates. Readers will also have access to interactive images and embedded podcasts. Visit www.wiley.com/college/fitzgerald for more information.http://www.wiley.com/college/fitzgeraldhttp://www.wiley.com/college/fitzgerald

� �

viii Preface

ACKNOWLEDGMENTS Our thanks to the many people who helped in preparing this edition. Specifically, we want to thank the staff at John Wiley & Sons for their support.

Alan Dennis Bloomington, Indiana

www.kelley.indiana.edu/ardennis

Alexandra Durcikova Norman, Oklahoma

http://www.ou.edu/price/mis/people/alexandra_durcikova.html

� �

CONTENTS

About the Authors v Preface vi

PART ONE INTRODUCTION 1 Chapter 1

Introduction to Data Communications 1 1.1 Introduction 1 1.2 Data Communications Networks 4

1.2.1 Components of a Network 4 1.2.2 Types of Networks 5

1.3 Network Models 7 1.3.1 Open Systems Interconnection

Reference Model 7 1.3.2 Internet Model 9 1.3.3 Message Transmission Using

Layers 10 1.4 Network Standards 13

1.4.1 The Importance of Standards 13 1.4.2 The Standards-Making Process 13 1.4.3 Common Standards 15

1.5 Future Trends 16 1.5.1 Wireless LAN and BYOD 16 1.5.2 The Internet of Things 17 1.5.3 Massively Online 17

1.6 Implications for Cyber Security 18

PART TWO FUNDAMENTAL CONCEPTS 25 Chapter 2

Application Layer 25 2.1 Introduction 25 2.2 Application Architectures 26

2.2.1 Host-Based Architectures 27 2.2.2 Client-Based Architectures 28 2.2.3 Client-Server Architectures 28 2.2.4 Cloud Computing Architectures 31 2.2.5 Peer-to-Peer Architectures 33 2.2.6 Choosing Architectures 34

2.3 World Wide Web 35 2.3.1 How the Web Works 35 2.3.2 Inside an HTTP Request 36 2.3.3 Inside an HTTP Response 37

2.4 Electronic Mail 39 2.4.1 How Email Works 39 2.4.2 Inside an SMTP Packet 42 2.4.3 Attachments in Multipurpose Internet

Mail Extension 43 2.5 Other Applications 43

2.5.1 Telnet 44 2.5.2 Instant Messaging 45 2.5.3 Videoconferencing 45

2.6 Implications for Cyber Security 47

Chapter 3

Physical Layer 57 3.1 Introduction 57 3.2 Circuits 59

3.2.1 Circuit Configuration 59 3.2.2 Data Flow 60 3.2.3 Multiplexing 60

3.3 Communication Media 63 3.3.1 Twisted Pair Cable 63 3.3.2 Coaxial Cable 64 3.3.3 Fiber-Optic Cable 64 3.3.4 Radio 65 3.3.5 Microwave 66 3.3.6 Satellite 66 3.3.7 Media Selection 68

3.4 Digital Transmission of Digital Data 69 3.4.1 Coding 69 3.4.2 Transmission Modes 69

ix

� �

x Contents

3.4.3 Digital Transmission 71 3.4.4 How Ethernet Transmits Data 72

3.5 Analog Transmission of Digital Data 73 3.5.1 Modulation 73 3.5.2 Capacity of a Circuit 76 3.5.3 How Modems Transmit Data 76

3.6 Digital Transmission of Analog Data 77 3.6.1 Translating from Analog to Digital 77 3.6.2 How Telephones Transmit Voice

Data 77 3.6.3 How Instant Messenger Transmits

Voice Data 79 3.6.4 Voice over Internet Protocol

(VoIP) 80 3.7 Implications for Cyber Security 80

Chapter 4

Data Link Layer 88 4.1 Introduction 88 4.2 Media Access Control 89

4.2.1 Contention 89 4.2.2 Controlled Access 89 4.2.3 Relative Performance 90

4.3 Error Control 91 4.3.1 Sources of Errors 91 4.3.2 Error Prevention 93 4.3.3 Error Detection 94 4.3.4 Error Correction via

Retransmission 95 4.3.5 Forward Error Correction 95 4.3.6 Error Control in Practice 97

4.4 Data Link Protocols 97 4.4.1 Asynchronous Transmission 97 4.4.2 Synchronous Transmission 98

4.5 Transmission Efficiency 101 4.6 Implications for Cyber Security 103

Chapter 5

NETWORK AND TRANSPORT LAYERS 110 5.1 Introduction 110 5.2 Transport and Network Layer Protocols 112

5.2.1 Transmission Control Protocol (TCP) 112

5.2.2 Internet Protocol (IP) 113

5.3 Transport Layer Functions 114 5.3.1 Linking to the Application Layer 114 5.3.2 Segmenting 115 5.3.3 Session Management 116

5.4 Addressing 119 5.4.1 Assigning Addresses 120 5.4.2 Address Resolution 125

5.5 Routing 127 5.5.1 Types of Routing 128 5.5.2 Routing Protocols 130 5.5.3 Multicasting 132 5.5.4 The Anatomy of a Router 133

5.6 TCP/IP Example 134 5.6.1 Known Addresses 136 5.6.2 Unknown Addresses 137 5.6.3 TCP Connections 138 5.6.4 TCP/IP and Network Layers 139

5.7 Implications for Cyber Security 141

PART THREE NETWORK TECHNOLOGIES 159 Chapter 6

Network Design 159 6.1 Introduction 159

6.1.1 Network Architecture Components 159

6.1.2 The Traditional Network Design Process 161

6.1.3 The Building-Block Network Design Process 162

6.2 Needs Analysis 164 6.2.1 Network Architecture

Component 165 6.2.2 Application Systems 166 6.2.3 Network Users 166 6.2.4 Categorizing Network Needs 166 6.2.5 Deliverables 167

6.3 Technology Design 168 6.3.1 Designing Clients and Servers 168 6.3.2 Designing Circuits 168 6.3.3 Network Design Tools 170 6.3.4 Deliverables 171

6.4 Cost Assessment 171 6.4.1 Request for Proposal 171

� �

Contents xi

6.4.2 Selling the Proposal to Management 173

6.4.3 Deliverables 173 6.5 Implications for Cyber Security 173

Chapter 7

Wired and Wireless Local Area Networks 177 7.1 Introduction 177 7.2 LAN Components 178

7.2.1 Network Interface Cards 179 7.2.2 Network Circuits 179 7.2.3 Network Hubs, Switches, and Access

Points 180 7.2.4 Network Operating Systems 183

7.3 Wired Ethernet 184 7.3.1 Topology 184 7.3.2 Media Access Control 187 7.3.3 Types of Ethernet 188

7.4 Wireless Ethernet 189 7.4.1 Topology 189 7.4.2 Media Access Control 189 7.4.3 Wireless Ethernet Frame Layout 190 7.4.4 Types of Wireless Ethernet 191 7.4.5 Security 192

7.5 The Best Practice LAN Design 193 7.5.1 Designing User Access with Wired

Ethernet 194 7.5.2 Designing User Access with Wireless

Ethernet 195 7.5.3 Designing the Data Center 197 7.5.4 Designing the e-Commerce Edge 199 7.5.5 Designing the SOHO

Environment 200 7.6 Improving LAN Performance 202

7.6.1 Improving Server Performance 203 7.6.2 Improving Circuit Capacity 204 7.6.3 Reducing Network Demand 204

7.7 Implications for Cyber Security 205

Chapter 8

Backbone Networks 214 8.1 Introduction 214 8.2 Switched Backbones 215 8.3 Routed Backbones 218

8.4 Virtual LANs 221 8.4.1 Benefits of VLANs 221 8.4.2 How VLANs Work 223

8.5 The Best Practice Backbone Design 226 8.6 Improving Backbone Performance 227

8.6.1 Improving Device Performance 227 8.6.2 Improving Circuit Capacity 228 8.6.3 Reducing Network Demand 228

8.7 Implications for Cyber Security 228

Chapter 9

Wide Area Networks 237 9.1 Introduction 237 9.2 Dedicated-Circuit Networks 238

9.2.1 Basic Architecture 238 9.2.2 T-Carrier Services 241 9.2.3 SONET Services 243

9.3 Packet-Switched Networks 243 9.3.1 Basic Architecture 243 9.3.2 Frame Relay Services 245 9.3.3 IP Services 246 9.3.4 Ethernet Services 246

9.4 Virtual Private Networks 247 9.4.1 Basic Architecture 247 9.4.2 VPN Types 248 9.4.3 How VPNs Work 248

9.5 The Best Practice WAN Design 251 9.6 Improving WAN Performance 252

9.6.1 Improving Device Performance 252 9.6.2 Improving Circuit Capacity 253 9.6.3 Reducing Network Demand 253

9.7 Implications for Cyber Security 254

Chapter 10

The Internet 265 10.1 Introduction 265 10.2 How the Internet Works 266

10.2.1 Basic Architecture 266 10.2.2 Connecting to an ISP 268 10.2.3 The Internet Today 269

10.3 Internet Access Technologies 270 10.3.1 Digital Subscriber Line 270 10.3.2 Cable Modem 271 10.3.3 Fiber to the Home 273 10.3.4 WiMax 274

� �

xii Contents

10.4 The Future of the Internet 274 10.4.1 Internet Governance 274 10.4.2 Building the Future 276

10.5 Implications for Cyber Security 277

PART FOUR NETWORK MANAGEMENT 284 Chapter 11

Network Security 284 11.1 Introduction 284

11.1.1 Why Networks Need Security 286 11.1.2 Types of Security Threats 286 11.1.3 Network Controls 287

11.2 Risk Assessment 288 11.2.1 Develop Risk Measurement

Criteria 289 11.2.2 Inventory IT Assets 290 11.2.3 Identify Threats 291 11.2.4 Document Existing Controls 293 11.2.5 Identify Improvements 296

11.3 Ensuring Business Continuity 296 11.3.1 Virus Protection 296 11.3.2 Denial-of-Service Protection 297 11.3.3 Theft Protection 300 11.3.4 Device Failure Protection 301 11.3.5 Disaster Protection 302

11.4 Intrusion Prevention 305 11.4.1 Security Policy 306 11.4.2 Perimeter Security and Firewalls 306 11.4.3 Server and Client Protection 312 11.4.4 Encryption 315 11.4.5 User Authentication 321 11.4.6 Preventing Social Engineering 324

11.4.7 Intrusion Prevention Systems 325 11.4.8 Intrusion Recovery 327

11.5 Best Practice Recommendations 328 11.6 Implications for Your Cyber Security 330

Chapter 12

Network Management 340 12.1 Introduction 340 12.2 Designing for Network Performance 341

12.2.1 Managed Networks 341 12.2.2 Managing Network Traffic 345 12.2.3 Reducing Network Traffic 346

12.3 Configuration Management 349 12.3.1 Configuring the Network and Client

Computers 349 12.3.2 Documenting the Configuration

350 12.4 Performance and Fault Management 351

12.4.1 Network Monitoring 351 12.4.2 Failure Control Function 353 12.4.3 Performance and Failure

Statistics 355 12.4.4 Improving Performance 358

12.5 End User Support 358 12.5.1 Resolving Problems 358 12.5.2 Providing End User Training 360

12.6 Cost Management 360 12.6.1 Sources of Costs 360 12.6.2 Reducing Costs 363

12.7 Implications for Cyber Security 364

Appendices (Online) Glossary (Online) Index 373

� �

PART ONE INTRODUCTION

C H A P T E R 1

INTRODUCTION TO DATA COMMUNICATIONS

This chapter introduces the basic concepts of data communications. It describes why it is impor- tant to study data communications and introduces you to the three fundamental questions that this book answers. Next, it discusses the basic types and components of a data communications network. Also, it examines the importance of a network model based on layers. Finally, it describes the three key trends in the future of networking.

OBJECTIVES ◾ Be aware of the three fundamental questions this book answers ◾ Be aware of the applications of data communications networks ◾ Be familiar with the major components of and types of networks ◾ Understand the role of network layers ◾ Be familiar with the role of network standards ◾ Be aware of cyber security issues ◾ Be aware of three key trends in communications and networking

OUTLINE 1.1 Introduction 1.2 Data Communications Networks

1.2.1 Components of a Network 1.2.2 Types of Networks

1.3 Network Models 1.3.1 Open Systems Interconnection

Reference Model 1.3.2 Internet Model 1.3.3 Message Transmission Using Layers

1.4 Network Standards

1.4.1 The Importance of Standards 1.4.2 The Standards-Making Process 1.4.3 Common Standards

1.5 Future Trends 1.5.1 Wireless LAN and BYOD 1.5.2 The Internet of Things 1.5.3 Massively Online

1.6 Implications for Cyber Security Summary

1.1 INTRODUCTION What Internet connection should you use? Cable modem or DSL (formally called Digital Sub- scriber Line)? Cable modems are supposedly faster than DSL, providing data speeds of 50 Mbps to DSL’s 1.5–25 Mbps (million bits per second). One cable company used a tortoise to represent DSL in advertisements. So which is faster? We’ll give you a hint. Which won the race in the fable, the tortoise or the hare? By the time you finish this book, you’ll understand which is faster and why, as well as why choosing the right company as your Internet service provider (ISP) is probably more important than choosing the right technology.

Over the past decade or so, it has become clear that the world has changed forever. We con- tinue to forge our way through the Information Age—the second Industrial Revolution, according

1

� �

2 Chapter 1 Introduction to Data Communications

to John Chambers, CEO (chief executive officer) of Cisco Systems, Inc., one of the world’s leading networking technology companies. The first Industrial Revolution revolutionized the way people worked by introducing machines and new organizational forms. New companies and industries emerged, and old ones died off.

The second Industrial Revolution is revolutionizing the way people work through network- ing and data communications. The value of a high-speed data communications network is that it brings people together in a way never before possible. In the 1800s, it took several weeks for a message to reach North America by ship from England. By the 1900s, it could be transmitted within an hour. Today, it can be transmitted in seconds. Collapsing the information lag to Internet speeds means that people can communicate and access information anywhere in the world regard- less of their physical location. In fact, today’s problem is that we cannot handle the quantities of information we receive.

Data communications and networking is a truly global area of study, both because the technology enables global communication and because new technologies and applications often emerge from a variety of countries and spread rapidly around the world. The World Wide Web, for example, was born in a Swiss research lab, was nurtured through its first years primarily by European universities, and exploded into mainstream popular culture because of a development at an American research lab.

One of the problems in studying a global phenomenon lies in explaining the different polit- ical and regulatory issues that have evolved and currently exist in different parts of the world. Rather than attempt to explain the different paths taken by different countries, we have chosen simplicity instead. Historically, the majority of readers of previous editions of this book have come from North America. Therefore, although we retain a global focus on technology and its business implications, we focus mostly on North America.

This book answers three fundamental questions. First, how does the Internet work? When you access a website using your computer, laptop,

iPad, or smartphone, what happens so that the page opens in your Web browser? This is the focus in Chapters 1–5. The short answer is that the software on your computer (or any device) creates a message composed in different software languages (HTTP, TCP/IP, and Ethernet are common) that requests the page you clicked. This message is then broken up into a series of smaller parts that we call packets. Each packet is transmitted to the nearest router, which is a special-purpose computer whose primary job is to find the best route for these packets to their final destination. The packets move from router to router over the Internet until they reach the Web server, which puts the packets back together into the same message that your computer created. The Web server reads your request and then sends the page back to you in the same way—by composing a message using HTTP, TCP/IP, and Ethernet and then sending it as a series of smaller packets back through the Internet that the software on your computer puts together into the page you requested. You might have heard a news story that the U.S. or Chinese government can read your email or see what websites you’re visiting. A more shocking truth is that the person sitting next you at a coffee shop might be doing exactly the same thing—reading all the packets that come from or go to your laptop. How is this possible, you ask? After finishing Chapter 5, you will know exactly how this is possible.

Second, how do I design a network? This is the focus of Chapters 6–10. We often think about networks in four layers. The first layer is the Local Area Network, or the LAN (either wired or wireless), which enables users like you and me to access the network. The second is the backbone network that connects the different LANs within a building. The third is the core network that connects different buildings on a company’s campus. The final layer is connections we have to the other campuses within the organization and to the Internet. Each of these layers has slightly different concerns, so the way we design networks for them and the technologies we use are

� �

Introduction 3

slightly different. Although this describes the standard for building corporate networks, you will have a much better understanding of how your wireless router at home works. Perhaps more importantly, you’ll learn why buying the newest and fastest wireless router for your house or apart- ment is probably not a good way to spend your money.

Finally, how do I manage my network to make sure it is secure, provides good performance, and doesn’t cost too much? This is the focus of Chapters 11 and 12. Would it surprise you to learn that most companies spend between $1,500 and $3,500 per computer per year on network man- agement and security? Yup, we spend way more on network management and security each year than we spend to buy the computer in the first place. And that’s for well-run networks; poorly run networks cost a lot more. Many people think network security …

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com ON Identify the organization’s internal strengths and weaknesses

NO PLAGIARISM, Get impressive Grades in Your Academic Work

  1. Applied Sciences
  2. Architecture and Design
  3. Biology
  4. Business & Finance
  5. Chemistry
  6. Computer Science
  7. Geography
  8. Geology
  9. Education
  10. Engineering
  11. English
  12. Environmental science
  13. Spanish
  14. Government
  15. History
  16. Human Resource Management
  17. Information Systems
  18. Law
  19. Literature
  20. Mathematics
  21. Nursing
  22. Physics
  23. Political Science
  24. Psychology
  25. Reading
  26. Science
  27. Social Science
Categories
Writers Solution

MARKETING STRATEGY AND INCLUSIVE MARKETING COMMUNICATIONS

Assignment Overview: MARKETING STRATEGY AND INCLUSIVE MARKETING COMMUNICATIONS

Strategies and Target Marketing

While online shopping had been growing over the last decade, 2020’s pandemic and lockdowns propelled the activity to new heights. We will use this case to look at how online vs. in-store shopping is presented.

Case 3 Resources

Target Market (2021)

The Nature and Functions of Distribution (Place) (2021)

Using Supply Chain Management to Increase Efficiency and Customer Satisfaction (2021)

Promotion Strategy (2021)

Sales Promotion (2021)

The Huge Impact of Advertising (2021)

Online Shopping vs In Store Shopping – Infographics (2021)

Case Assignment

Online vs. In-Store

Using the module’s readings and at least one article published in 2020 or 2021 from Trident Library’s Business Source Complete (EBSCO), a full-text database, research marketing strategy, and target marketing for online vs. store-based business.

Company Background

Select a business that has both online and physical stores. Provide a background of the company; define the target market. Cite and reference your sources. (1/2 page) IBISWorld, used in Module 1, may be a good resource.

The In-Store Experience

Research how the company promotes its store. Look to social media, traditional marketing, and articles about the store’s strategy. Provide an overview of how the store communicates with consumers. Consider its target markets. Cite and reference your sources. (1 page)

Online Shopping

Research how the company promotes its online shopping. Look to social media, its online store, and articles about the site’s strategy. Provide an overview of how the online store communicates with consumers. Consider its target markets. Cite and reference your sources. (1 page)

Making Connections

Based on the research above, compare and contrast how the company markets its two shopping situations. Provide rationale. Cite and reference your sources. (1/2 page)

No quotations are permitted in this paper. Each paragraph (except the introduction and conclusion) must contain at least one in-text citation.

Since you are engaging in research, be sure to cite and reference the sources in APA format. NOTE: failure to use research with accompanying citations to support content will result in reduced scoring “Level 2-Developing” on the grading rubric.

This is a professional paper, not a personal one based on feelings. It must be written in the third person; this means words like “I”, “we”, and “you” are not appropriate.

Categories
Writers Solution

compare primary types of mobile communications and how they are implemented on different platforms

Assessment 1
Strategic Mobile Communications Comparison
Class Presentation and Written Report
Due: Week 4
Weighting: 30%
Learning Outcomes:
a. compare primary types of mobile communications and how they are implemented on different platforms;
b. review how mobile communications agencies function and the effectiveness of their business models.
Description:
Prepare a class presentation and written report comparing and contrasting two forms of mobile communications (mobile banners, mobile text, YouTube videos, Facebook ads/posts, Instagram posts, SnapChat stories etc) and how each of these are implemented on at least two different platforms (smart phones, tablets, web-based, desktop etc).
The comparison should include the strengths, weaknesses, target audience, effectivity and remuneration models for each of the two mobile communication forms selected.
Details:
1,500 word report and minimum 20 slide presentation.
Upload report and presentation to Moodle as PDF files for marking.
Marking Criteria & Rubrics:
The student must demonstrate an ability to investigate and compare various types of strategic mobile communications campaigns and the platforms they are used on. This also includes reporting on the function of mobile communication agencies and the effectiveness of their business models.
Reference images can be included. All images and sources must be referenced using Harvard Referencing. Include in-text referencing and a reference list as per the Macleay College FAQ and Tips On Harvard Referencing ( found in the Unit Details Folder of your course stream on Moodle).
Criterion 1: Depth of research, analysis and comparison – 40%
Fail: • Incomplete research, analysis and comparison
• General comparisons, implementation analysis and description on separate platforms incomplete and lacking logical organisation.
Pass: • Adequate but basic research, analysis and comparison
• Shows limited evidence and incomplete description of general comparisons, implementation analysis and description on separate platforms while lacking logical organisation.
Credit: • Competent research, analysis and comparison
• Some evidence of general comparisons, implementation analysis and description on separate platforms presented in a logical manner.
Distinction: • Compressive and detailed evidence of research, analysis and comparison
• General comparisons, implementation analysis and description on separate platforms presented in a logical, concise and succinct manner with small
ASSESSMENT BRIEF I MOBILE COMMUNICATIONS
File: 305_MobileCommunications_Assessment1 1
Author: Gemenis Date: 18/10/2021 Status: Final
Assessment Brief
exception.
• All sources referenced correctly.
High Distinction • Outstanding and insightful research, analysis and comparison
• General comparisons, implementation analysis and description on separate platforms presented in a logical, concise and succinct manner
• Extensive use of research data to support critical evaluation.
• All sources referenced correctly
Criterion 2: Accuracy of description of agency function and business model – 30%
Fail: • Incomplete review of business model and accuracy of agency function
• Lacks understanding and clarity of agency function and business model
Pass: • Adequate but basic review of business model and accuracy of agency function
• Understanding and clarity of agency function and business model is incomplete in places
Credit: • Competent and sound review of business model and accuracy of agency function
• Understanding and clarity of agency function and business model is complete but limited in depth
Distinction: • Comprehensive and detailed review of business model and accuracy of agency function
• Understanding and clarity of agency function and business model is concise and in depth
High Distinction • Outstanding review of business model and accuracy of agency function.
• Understanding and clarity of agency function and business model is extensive, concise and succinct with in depth analysis.
Criterion 3: Quality of presentation – 30%
Fail: • Incomplete written report, referencing and layout.
• Writing lacks focus and contains serious errors.
• Files not converted to PDF for submission.
Pass: • Adequate but basic written report, referencing and layout.
• Writing is unclear in places. There are several grammatical or spelling errors.
Credit: • Competent written report, referencing and layout
• Writing is generally clear. There are minimal grammatical or spelling errors.
Distinction: • Comprehensive and detailed written report, referencing and layout.
• Writing is concise and clear. There are minimal grammatical or spelling errors
High Distinction • Outstanding and insightful presentation, referencing and layout.
• Writing is concise, clear and accomplished. There are no grammatical or spelling errors.
ASSESSMENT BRIEF I MOBILE COMMUNICATIONS
File: 305_MobileCommunications_Assessment1 2

WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery– primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals compare primary types of mobile communications and how they are implemented on different platforms

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG
Categories
Writers Solution

Health care consumers receive various communications about different health care options

 External Influences on Consumer Choice Worksheet

HCS/490 v11

Page 2 of 2

C:\Users\djshirey\OneDrive - University of Phoenix\F_Drive\Style Guides\UPX Logos\Horizontal format\UOPX_Sig_Hor_Black_Medium.pngExternal Influences on Consumer Choice Worksheet

Health care consumers receive various communications about different health care options. It is important to understand consumer demographics to determine the impact (positive or negative) media, social networks, branding, marketing, and communication play in health care consumer choices.

In this assignment, you will research managed care plans to determine what impact social media and other external influences have on consumer behaviors. Research the different insurance plans listed below by reviewing various health care organizations or resources.

Consider within your research who might access the health care systems (i.e., age, generation, socioeconomic status, military/veteran, and health care insurance plans, etc.).

List 4 advantages and 4 disadvantages of HMOs, PPOs, and CDHPs in the following chart.

Health Maintenance Organization (HMO)Consumer Directed Health Plan (CDHP)Preferred Provider Organization (PPO)
Advantages1.2.3.4.1.2.3.4.1.2.3.4.
Disadvantages1.2.3.4.1.2.3.4.1.2.3.4.
This is the best plan for what type of consumer?

Write a 90- to 175-word response to each of the following prompts. Consider the information you listed in the chart above as well as what you know about consumer behavior when you compose your response.

· Explain the impact media and social networking have on consumers when choosing the most appropriate managed care health insurance plans. Consider the positive and negative impacts.

(Insert answer here)

· Describe how branding, marketing, and communication influence a consumer’s choice when considering an appropriate managed care health insurance plan. Consider positive and negative influences.

(Insert answer here)

· Explain how communication and education to consumers differ by generation when marketing managed care health insurance plans. Consider why it is important to communicate and educate differently across generations.

(Insert answer here)

Cite 2 peer-reviewed, scholarly, or similar references.

Copyright 2021 by University of Phoenix. All rights reserved.

Copyright 2021 by University of Phoenix. All rights reserved

WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery- primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals Health care consumers receive various communications about different health care options

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG
Categories
Writers Solution

Understanding the Communications Plan

Based on the video by Doug Rose  (Links to an external site.)(specifically Section 1: Understanding the Communications Plan) think of a presentation or proposal you have given or observed, or may be giving in the future, and complete a Stakeholder Register (Stakeholder Register example).  Requirements include a brief synopsis of the presentation or proposal (1 page maximum) and a completed register. You may use whatever format for the register (word document, spreadsheet, etc.) that is convenient.

Part1  synopsis of the Presentation or Project. 

part2 is stakeholder register ( 1)Name, 2)Title, 3)Role, 4)Expectations, 5)Power, 6)Impact, 7)Interest, 8)Influence, 9)Priority.  

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services Understanding the Communications Plan

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

The Importance of professional communications and tools and techniques for enhancing the same.

Assessment type: Case Study Report – individual assignment (2,000 words)
Purpose: This assessment will allow students to demonstrate that they can identify, assess and analyse the situation provided in a case study. This assessment contributes to learning outcomes b, c and d.
Value: 15% Due Date: Week 10
Topic: Based on the case study, students need to write a report on one of the following topics as per the last digit of their student ID.
Task Details:
Case study: Toyota Australia
Since its foundation in 1937, globally, Toyota has strived continuously to contribute to the sustainable development of society and the planet through its business operations. Their principle that they have continued since Toyota Australia started in 1963 and has helped to cement their position as Australia’s leading automotive company.
Motor vehicles greatly expand the freedom of mobility, however, they recognised that they can also have an effect on the society and the environment. With this in mind, they listened carefully to their stakeholders as they pursued a business that works towards harmony with people, society, and the global environment. They are continuously innovating to develop vehicles that meet the needs of the market both now and into the future. Their research focuses on vehicles powered by a range of alternative fuels and vehicles with the potential for automated driving. They continue to work towards vehicles that are safe for everyone, and that maintain the standards of durability and reliability that people expect from the Toyota brand.
Based on the above case study, students need to write a report on one of the following topics as per the last digit of their student ID at KOI:
Topic Last Digit of your student ID
0) The Importance of professional communications and tools and techniques for enhancing the same. In this topic you need to examine what professional communication techniques and tools ICT professionals need to use to communicate well in workplace at Toyota. You need to use specific examples in ICT industry in your discussion of this topic. 0or5
1) The importance of personal privacy and how to protect it in face of the emerging Networking Technologies at Toyota. 1 or 6
ICT 303 PROFESSIONAL ETHICS IN COMPUTING T221 14/07/2021 11:21 •AUSTRALIAN INSTITUTE OF BUSINESS ANO MANAGEMENT PTY LTD © ABN: 72 132 629 979
Please discuss how emerging technologies such as IOT (Internet of Things) introduces privacy risks and what strategies can companies adopt to minimise these privacy risks. You can pick an industry where IOT has found significant acceptance and highlight the privacy aspects in that context.
2) Guidelines for ethical use of computers and networks at Toyota. 2 or 7
Please discuss the NETIQUETTE technique and explain how it can help professionals to embrace ethical use of networks. You need to use some cases in the discussion to add value to your discussion. Please discuss how emerging technologies such as IOT (Internet of Things) introduces privacy risks and what strategies can companies adopt to minimise these privacy risks. You can pick an industry where IOT has found significant acceptance and highlight the privacy aspects in that context.
2) Guidelines for ethical use of computers and networks at Toyota. Please discuss the NETIQUETTE technique and explain how it can help professionals to embrace ethical use of networks. You need to use some cases in the discussion to add value to your discussion. 2 or 7
3) Intellectual Property (IP) rules and processes important for conducting high-tech business at Toyota. Please discuss how IP rules and processes are important for conducing high tech business at Toyota. You need to state the key definitions used in this essay (IP. High tech business) and clearly highlight their importance using examples. 3 or 8
4) The importance of collaboration and methods for enhancing collaboration at Toyota. Given that ICT projects involve multi-stakeholder collaboration discuss collaboration technologies that are available for ICT professionals to collaborate on ICT projects. 4 or 9
Use a consistent referencing style – Harvard

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals The Importance of professional communications and tools and techniques for enhancing the same.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

The impact of mobile technology (applications + gadgets) on business communications.

The impact of mobile technology (applications + gadgets) on business communications. (its my group topic) please make 3 main questions and their 2 small questions and 6 biblography) make 2 biblography of each question

This assignment is the second part of your Team Project. At this stage, you already have your team and topic assignment. You have completed your Course Project Plan and Agreement, and you are now ready to begin the planning of your report. The assignment will be developed through two steps. The first step is writing the research questions, and the second step is conducting research and completing an annotated references list (bibliography).

Instructions

Step 1: Complete the unit readings, including the Yorkville Write a Report.

Step 2: Your team will write 5 research questions. Your research questions will identify the key dimensions of your overall topic, which has been assigned by your instructor. The unit 6 reading describes how to write research questions. (Each person presents 1 RQ + 1/2 sub questions)

Step 3: If you have not already done so in the Team Plan and Agreement, ensure that you assign research questions and tasks to individual team members, so everyone is clear about their contribution to the final report.

Step 4: Begin collecting research in the YU Library guided by your research questions. For each research question, identify three (3) academic references from the YU library.

Step 5: Review the research and create an annotated references list. (You will find instructions about how to create an annotated reference list in the unit 6 readings.)

Step 6: Draft the report introduction including the statement of the purpose of the report.

Submission Details

Your overall submission should include:

1.      Title page (page 1) (include assignment title and topic, name, date, course code/title, instructor name). If you have team members who didn’t contribute to this assignment, do not include their names on the title page.

2.      Research Questions (page 2)

Research Questions

My Questions:

1.      What are the………………………….?

1.1.  ……………………..?

1.2.  …………………………….?

* Suggestion: Write at least 2 or 3 questions first n then select one final one.         

3.      Annotated References List (full references with annotations). The references page must be completed for this assignment and should be APA formatted.

* Each annotated bibliography should be placed on ONE page only.

* Please highlight the 3 sections in your bibliography (Gray + White + gray)

4.    A reference list (sorted alphabetically) References

*How many annotated bibliography for each research question? TWO

Submit on the unit 6 assignment page. Submit all assignments in this course as MS Word documents.

Helpful Hints

·        Papers written with double-spacing allow easier review and editing.

·        Use APA referencing guidelines for citations and references. Click here to review “APA Style”.

·        Do not write in first person; write in third person (he, she, they).

·        Ensure all references are academic sources. If an article is found in an academic journal in one of the library databases, then you can assume it has been peer reviewed and thus acceptable. Many articles found readily online may not have been exposed to any editorial vetting process, and thus should not be used as a resource.

Late Submission Policy

·        This assignment is subject to the Late Submission penalty policy, namely 5% per day for three days.

·        This page will close and will not allow further submissions after this Late Submission period has expired.

·        In the event of an emergency preventing you from submitting within this time frame, special permission must be obtained from your instructor. Documentation substantiating emergency is required. In such a circumstance, if the extension is granted, the professor will reopen the submission function for you on an individual basis.

·        Please do not email your submissions to your professor, either before or after the due date; all coursework should be submitted through the online course (Moodle).

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. The impact of mobile technology (applications + gadgets) on business communications.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Identify a communications difficulty that occurred when you used an electronic channel (Email or SMS)

Start by reading and following these instructions:

  1. Quickly skim the questions or assignment below and the assignment rubric to help you focus.
  2. Read the required chapter(s) of the textbook and any additional recommended resources. Some answers may require you to do additional research on the Internet or in other reference sources. Choose your sources carefully.
  3. Consider the discussions and any insights gained from them.
  4. Create your Assignment submission and be sure to cite your sources, use APA style as required, check your spelling.

Answer these essay questions:

  1. Identify a communications difficulty that occurred when you used an electronic channel (Email or SMS) that you believe would not have occurred had you delivered the message in a face-to-face meeting. What was there about the use of the electronic channel that was at the heart of the problem that is not an issue when talking face-to-face? If you have an opportunity to send the same kind of message again by an electronic means, what would you do differently, and why?
  2. Firms are becoming ever more dependent upon electronic communication channels for many reasons, including virtual employees, growth of project complexity, the global marketplace, and the fact that customers can now come from everywhere. Do you believe that high-quality virtual presence (video, audio, shared documents, etc.) is becoming more important? Explain your answer.
  3. It has been argued that bureaucratic control systems are a holdover from a time when businesses, products, technologies, and society itself ran, and changed, at a far slower pace than it does today. Due to the rapid growth of global competition, the acceleration of technological change, and the growing interconnectedness of individuals some believe that bureaucracies should be replaced by more agile and dynamic mechanisms. For example, statistical process control, one of a number of tools and methods W. Edwards Deming successfully advocated after World War II, strived to improve quality and productivity by removing sources of variation. Detractors assert that business in today’s agile world changes too quickly for statistical process control to be useful. Attack or defend the position that the basic ideas of bureaucratic control systems are still relevant in today’s world, and support your argument.
  4. Some argue that the traditional role of managers and bureaucratic control systems are in conflict with the principles and processes of self-management and self-designing teams. It has been suggested that managers need to change to be more like coaches in order for such agile teams to be effective. Attack or defend this idea and support your position.

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Identify a communications difficulty that occurred when you used an electronic channel (Email or SMS)

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays