Categories
Writers Solution

Aristotle defined tyranny as an illegitimate form of government by one individual that tightly controlled every part of life and government.

Required Resources

Read/review the following resources for this activity:

Textbook: Chapter 6, 10

Magstadt, T. M. (2017). Understanding politics: Ideas, institutions, and issues. Australia: Cengage Learning.

Lesson

Instructions

Aristotle defined tyranny as an illegitimate form of government by one individual that tightly controlled every part of life and government. Adolf Hitler is the most notorious tyrant. Using a totalitarian society from the past or present, discuss how the state and its leader attempt to impede citizens from exercising their rights. In your discussion, explain some components of an “ideal citizen,” consequences of voter apathy, and ways the state controls the citizen.

Writing Requirements (APA format)

Length: 1.5-2 pages (not including title page or references page)

1-inch margins

Double spaced

12-point Times New Roman font

Title page

References page (minimum of 2 scholarly sources)

Grading

This activity will be graded based on the essay rubric.

Course Outcomes (CO): 1

Due Date: By 11:59 p.m. MT on Sunday

Rubric

Week 5 Assignment: Essay – Ideal Citizen in a Totalitarian Government

Week 5 Assignment: Essay – Ideal Citizen in a Totalitarian Government

Criteria  RatingsPts

This criterion is linked to a Learning Outcome Actual case study of a country.

20.0 pts

Uses a historical or contemporary example of a totalitarian country

16.0 pts

There is a totalitarian country, but it is not real.

12.0 pts

There is a country, but it is not totalitarian.

0.0 pts

There is no country mentioned.

20.0 pts

This criterion is linked to a Learning Outcome Control by a totalitarian leader

20.0 pts

Describes the three ways, violence, propaganda, and scapegoating, that leaders use to keep control in the country.

16.0 pts

Only two of the tactics of totalitarian leaders are described.

12.0 pts

Only one of the tactics of totalitarian leaders are described.

0.0 pts

How a totalitarian leaders keeps control is not addressed.

20.0 pts

This criterion is linked to a Learning Outcome Citizens in the country.

20.0 pts

States and describes two ways of stopping a totalitarian regime by using political socialization, civil disobedience, resist propaganda. Discusses voter apathy.

16.0 pts

States and describes one way of stopping a totalitarian regime by using political socialization, civil disobedience, resist propaganda. Discusses voter apathy.

12.0 pts

States and describes one way of stopping a totalitarian regime by using political socialization, civil disobedience, resist propaganda. Does not discuss voter apathy.

0.0 pts

Does not address the concepts.

20.0 pts

This criterion is linked to a Learning Outcome Scholarly resources

10.0 pts

Uses both the book and, at least, one outside scholarly source.

8.0 pts

Uses only the book or a scholarly source.

6.0 pts

Uses only a scholarly source and the source is not scholarly.

0.0 pts

Does not use the book or scholarly source.

10.0 pts

This criterion is linked to a Learning Outcome APA

5.0 pts

All sources are properly cited and referenced according to APA standards.

4.0 pts

Sources are either properly cited or referenced, missing one of those elements.

3.0 pts

The citation and/or reference are incorrect.

0.0 pts

No APA format was used.

5.0 pts

This criterion is linked to a Learning Outcome Writing

5.0 pts

Presents information using clear and concise language in an organized manner (minimal errors in English grammar, spelling, syntax, and punctuation).

4.0 pts

Presents information using understandable language but is somewhat disorganized (some errors in English grammar, spelling, syntax, and punctuation).

3.0 pts

Presents information using understandable language but is very disorganized (many errors in English grammar, spelling, syntax, and punctuation).

0.0 pts

Presents information that is not clear, logical, professional or organized to the point that the reader has difficulty understanding the message (numerous errors in English grammar, spelling, syntax, and/or punctuation).

5.0 pts

Project 4: System Development or Application Assurance

Start Here

It is critical that cybersecurity professionals be able to use all applicable systems, tools, and concepts to minimize risks to an organization’s cyberspace and prevent cybersecurity incidents. In this project, you will demonstrate your understanding of how to apply security principles, methods, and tools within the software development life cycle. You will also apply your knowledge of the cybersecurity implications related to procurement and supply chain risk management.

This is the fourth and final project for this course. There are 13 steps in this project. Begin below to review your project scenario.

Transcript

Competencies

Your work will be evaluated using the competencies listed below.

• 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

• 1.5: Use sentence structure appropriate to the task, message and audience.

• 2.4: Consider and analyze information in context to the issue or problem.

• 9.4: Software Security Assurance: Demonstrate secure principles, methods, and tools used in the software development life cycle.

• 9.5: Software Security Assurance: Describe the cybersecurity implications related to procurement and supply chain risk management.

Step 1: Assess Software Vulnerabilities

Project 2 outlined the steps involved to produce a final vulnerability and threat assessment, and Project 3 covered risk analysis and mitigation. Those assessments were across the entire enterprise and included numerous elements outside the realm of systems and technology. However, they did uncover opportunities for improvement in the application software processes.

For this step, return to the vulnerability and threat assessment from Project 2 and focus on all areas of application software that were itemized. Give additional thought to uncover software that perhaps did not make the list or were assumed to be secure and simply overlooked.

The assignment is to create a more comprehensive list of application software that could place the enterprise at risk of a breach, loss of data, loss of production, and/or loss of brand confidence.

The assessment should include the application of secure principles, development models such as the maturity model or integrated product and process development (IPPD), software development methods, libraries and toolsets used in the software development life cycle or systems development life cycle.

Use the Software Vulnerability Assessment Template to submit your results for feedback.

Submission for Project 4: Software Vulnerability Assessment

Previous submissions

0

Drop files here, or click below.

Add Files

In the next step, you will review your organization’s software procurement policy.  

Step 2: Review Software Procurement Policy

Upon completion of the software specific vulnerability assessment, conduct a review of the organization’s software procurement policies for software development methods.

Note that there is no submitted assignment for this step. Your review will be used in the submission for the following steps.

When the review is complete, move to the next step, where you will create a table or spreadsheet that lists recommended policies for software procurement that address certain questions or concerns.

Step 3: Create a Software Procurement Policy List

You’ve reviewed the organization’s policies for software development methods. Now it’s time to create a policy list for software procurement. The following are some sample questions to be included in a software procurement policy:

• Does the vendor provide any cybersecurity certifications with the product?

• Does the vendor provide access to the source code for the product? Are there other security issues in source code to be addressed?

• What is the guaranteed frequency of security updates to be provided for the product?

• What is the implementation process for software updates/upgrades?

What are additional questions or concerns that should be included in the procurement process? Create a table or spreadsheet that lists recommended policies to properly address these questions or concerns.

Use the Procurement Policy Template to list the cybersecurity implications related to procurement and supply chain risk management and submit your results for feedback.

Submission for Project 4: Procurement Policy List

Previous submissions

0

Drop files here, or click below.

Add Files

In the next step, you will generate assurances or controls to address each of the policy issues identified here.

Step 4: Document Relevant Software Acceptance Policies

Now that the procurement policies have been identified in the previous step, what assurances or controls should be established as policy that would evaluate the security implications during the software acceptance process? The objective is to provide a one-page overview of security testing that would be included in the acceptance of a vendor’s application.

The next step in this project will document the actual testing and validation. This step is simply to verify the congruence between the procurement process and acceptance process. In other words, do the procurement policies establish the correct cyber security framework for software purchase and do the acceptance policies match?

In considering the security implications of the in the software acceptance phase of the development cycle, use the Software Acceptance Policy Template to document recommended tests and assurances for the procurement policies identified in the previous steps.

Submit your results below for feedback.

Submission for Project 4: Software Acceptance Policy

Previous submissions

0

Drop files here, or click below.

Add Files

In the next step, you will research software testing and validation.

Step 5: Research Software Testing and Validation Procedures

Based on the software acceptance policies created in the previous step, consider what testing and validation procedures could be used to assure compliance.

Note that there is no submitted assignment for this step. You will submit the final list of recommended testing and validation procedures in the next step.

Step 6: Document Software Testing and Validation Procedures

You’ve completed the research, and it is now time to create testing and validation procedures that follow a specific process to assure compliance. The key to the success of this step is to document exact procedures to be followed by a testing team prior to installation.

At a minimum, the procedures should address the following questions:

• What are potential vulnerabilities inherent in the application platform?

• How well does the vendor document preventive measures built into the application?

• Are there alternative solutions provided by the vendor or in the application in case of a breach?

• What additional safeguards can be added to ensure the security of the software environment?

The testing and validation procedures should address each of these concerns.

The executive team will want to see specific steps for the testing team to follow as the team members complete the tests and assurances you recommended in the previous step.

Document your specific testing and validation recommendations from a cybersecurity policy standpoint in the Test Script Procedures Template and submit for feedback.

Submission for Project 4: Test Script Procedures

Previous submissions

0

Drop files here, or click below.

Add Files

In the next step, you will consider procedures for upgrading software.

Step 7: Review Software Upgrade Procedures

In the last step, you documented testing and validation requirements. In this step, it’s important to review software upgrades. Installation of a software upgrade has similar, yet unique requirements from the previous steps. In most enterprise environments, software updates and upgrades follow a specific change management routine. However, complete reliance on this procedure can lead to unintended oversight of cybersecurity issues. The change management process is generally focused on detecting errors and the auditing and logging of changes in the operational environment after the upgrade has been performed.

From the cyber perspective, this is not enough. As demonstrated in previous steps, significant effort is required to ensure a secure environment, not just an operational one. The question to be answered is “when” should the upgrade be performed during an application or system change. Should it be performed multiple times during the update?

Think through this issue thoroughly and make notes on your thought process. It is important that the risk analysis associated with an application or system change is conducted at the optimal time.

Note that there is no submitted assignment for this step. However, the research and corresponding notes related to this step will be applicable to the final report for Maria and the other executives. When this is complete, move to the next step, where supply chain risks will be considered.

Step 8: Review Supply Chain Risks

Following the previous steps relative to the supply chain and previous projects, it is time to thoroughly review risk within the supply chain.

Like many companies, your organization is dependent on a supply chain, so the software development process must include a supply chain risk management (SCRM) plan to minimize the impact of supply chain-related risks on business operations and the security of the infrastructures and data.

Note that there is no submitted assignment for this step. The identified supply chain risks will be reported in the next step.

Step 9: Document Supply Chain Risks

After review, it’s time to document supply chain risks. This portion of the overall report requires a two- to three-page narrative that addresses the following supply chain concerns:

1. Describe cybersecurity implications related to the procurement process.

2. Provide recommendations that would address these concerns.

3. Include appropriate supply chain risk management practices.

Where appropriate, cite references to support the assertions in the recommendations and conclusion.

Submit your report on supply chain concerns here for feedback.

Submission for Project 4: Supply Chain Cyber Security Risk Report

Previous submissions

0

Drop files here, or click below.

Add Files

Then, move to the next step, in which you will consider how the procedures of acquisition, procurement, and outsourcing line up in the organization.

Step 10: Consider Alignment Issues

Based on the review and recommendations on the supply chain described in the previous step, consider how well the policies and procedures regarding the acquisition, procurement, and outsourcing of software in your organization are aligned.

Outline a strategic approach to getting all the functions in alignment. There is no submission for this step. The alignment recommendations will be submitted in the next step.

Step 11: Develop an Acquisition Alignment Report

Keeping the alignment issues in mind from the previous step, prepare a one-page plan to align acquisition, procurement, and outsourcing of software applications for the enterprise. This should be a strategic approach to getting all the functions in alignment. Start with a request for information, proceed through acquisition, testing, and implementation, and finish with ongoing maintenance of the application.

All the work has been done in the previous steps. This step is designed to “bring it all together” in one easy-to-understand approach. The approach will be used in the final step to complete the supply chain analysis with a mitigation plan as it applies to software acquisition and maintenance.

Submit your one-page plan to align acquisition, procurement, and outsourcing efforts with your organization’s information security goals here for feedback.

Submission for Project 4: Acquisition Alignment Report

Previous submissions

0

Drop files here, or click below.

Add Files

In the next step, you will consolidate all your work thus far.

Step 12: Consolidate Your Work

The acquisition plan alignment is complete. For this exercise, collate all the material presented in the previous steps into a cohesive presentation that describes the entire software risk analysis processes and articulates specific supply chain cybersecurity threats and the technologies and policies that can be used to mitigate them.

You will use your consolidated results in your final project submission in the next step.

Project 4: System Development or Application Assurance

Step 13: Write the Risk Analysis/Supply Chain Threats/Mitigation Report

Management is always interested in solutions, and Maria Sosa and the other executives at your company are no exception. In the case of cybersecurity, there are no absolute solutions to an ever-changing environment. However, there are steps to mitigation that might eliminate or minimize the results of certain vulnerabilities. This final step is to describe the mitigation strategies recommended as a result of all previous steps in the project.

The final report for the executive meeting should be five to seven pages, only one to two of which will have to be written in this step. The remainder is from all the previous steps in the project.

Use the Supply Chain Risk Mitigation Final Report Template to submit your specific testing and validation procedures.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

• 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

• 1.5: Use sentence structure appropriate to the task, message and audience.

• 2.4: Consider and analyze information in context to the issue or problem.

• 9.4: Software Security Assurance: Demonstrate secure principles, methods, and tools used in the software development life cycle.

• 9.5: Software Security Assurance: Describe the cybersecurity implications related to procurement and supply chain risk management.

Submission for Project 4: Supply Chain Risk Mitigation Final Report

Previous submissions

0

Drop files here, or click below.

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals Aristotle defined tyranny as an illegitimate form of government by one individual that tightly controlled every part of life and government.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

An algorithm is a set of well-defined instructions in sequence to solve the problem.

Assessment Type Individual – Application Code
Length or Duration Four (4) Programs / Tasks
Subject Learning Outcomes SLO 2, SLO 3, SLO 4
Weighting 25%
Assessment Purpose
Many common problems solved by programmers include manipulation of numeric values and lists of numbers. In this assessment, you will use your understanding of the fundamental programming principles to solve four problems that involve numbers.
Assessment Item
For this assessment, you must submit four (4) algorithm descriptions and C++ programs, one for each task described in the brief below
Assessment Instructions
This assessment consists of four (4) tasks. You will need to prepare the following two components for each task.
Component 1: Algorithms
An algorithm is a set of well-defined instructions in sequence to solve the problem. An algorithm should not be computer code. Instead, the algorithm should be written in such a way that it can be used in similar programming languages to implement a solution in code.
Example: Find the largest of two numbers entered by the user.
Step 1: Start
Step 2: Declare variables a and b
Step 3: Get input from the user for a and b
Step 4: if a is greater than b Step 4.1: print a
Step 5: if b is greater than a Step 5.1: print b
Step 6: Stop
Component 2: C++ Coding
You will provide a C++ program for each of the four (4) questions given below that implements the algorithm you describe in Part 1.
CRICOS: 02155J / HE PROVIDER:
Assessment Tasks
Task 1 – Grading System
Write a program that allows the user to enter the mark scored within a range of 0 – 50. Given a positive value, do the following:
? If the given score is between 0 and 50 (0 = score = 50), then calculate the percentage (e.g., 100% for 50, 75% for 37.5, etc…). A percentage is a number or ratio that represents a fraction of 100.
? Calculate the grade from the percentage received. The grade will be: F, if the percentage is 0 – 59.99.
D, if the percentage is 60 – 69.99.
C, if the percentage is 70 – 79.99.
B, if the percentage is 80 – 89.99.
A, if the percentage is 90 – 100.
? If the given score is greater than 50, print “Score is greater than 50.”.
Example 1
Please enter your score: 32.6
You have passed with 65.2%, and received a grade D.
Example 2
Please enter your score: 10.5
You have failed with 21%, and received a grade F.
Example 3
Please enter your score: 50
You have passed with 100%, and received a grade A.
Example 4
Please enter your score: 74 Score is greater than 50.
Note: Inputs from the user are shown in bold blue.
Task 2 – Calculate Miles per Gallon
Write a program that allows a user to enter the litres of petrol consumed and the number of miles travelled by the car. Given a positive value for both litres of petrol and miles travelled, calculate the number of miles per gallon the car delivered. One litre of petrol is 0.264179 gallons.
You must show the output in three decimal places as shown in the example.
Example
Please enter the number of litres of petrol consumed: 15.5
Please enter the number of miles travelled: 75
Petrol Consumed: 15.500
Miles Travelled: 75.000
Miles per gallon: 18.316
Note: Inputs entered by the user are shown in bold blue.
Task 3 – Looping Through all Numbers from Start to Finish
Write a program that prompts the user to input two (2) integer values; a starting value and an end value. Loop through all the values from start to end, which should include the start and end values. For each value:
? If the number is divisible by both 3 and 5, print the word “ticktock”. For example for 15, 30, and 45 you would print “ticktock”.
? Else if it is a multiple of 3 (value % 3 == 0), print the word “tick”. For example, for 3, 6, and 9 you would print “tick”.
? Else if it is a multiple of 5 (value % 5 == 0) , then print “tock ”. For example, for 5, 10, and 20 you would print “tock”.
? Else if it is not divisible by 3 or 5, print the number. For example, for 1 you would just print ‘1’.
Example
Please enter a start value: 4
Please enter an end value: 15
tock tick
7
8 tick tock 11 tick 13 14 ticktock
Note: Inputs entered by the user are shown in bold blue.
Task 4 – Order Numbers
Write a program that prompts the user to input 3 integer values and print these values in ascending and descending order.
Example
Please enter the first number: 45
Please enter the second number: 12
Please enter the third number: 78
Ascending order:
12
45
78
Descending order:
78
45
12
Note: Inputs entered by the user are shown in bold blue.
Submission
All work must be submitted via the LMS, in the assignments section appropriate to this brief. Please ensure the above mentioned submission date and/or time are adhered to, or penalties may apply. You should submit a compressed (zip) file containing your C++ solutions folder. Within this file, each task must have its own file. Please ensure you use the following naming conventions for this submission.
Your zip file should be named using the following convention:
[Student_ID][Surname][First Name][SubjectCode][Assessment_#]
E.g.: 1234_Singh_Visha_PRG1002_Assessment_02
Each task within the zip file should follow this convention:
[Task_#][Student_ID] [SubjectCode][Assessment#]
E.g.: Task_1_1234_PRG1002_Assessment_02
Therefore, your zip file should consist of four (4) individual files, that each use the above mentioned naming format.
For more information on late submission, please see the Assessment Policy.
Academic Integrity
The integrity of the assessment process is fundamental for ensuring appropriate evaluation at AIT. All work submitted should be your own, and where additional resources are used, they must be referenced according to the Harvard style. Additionally, Turnitin is available in the LMS to test plagiarism in your writing.
For more information on academic integrity, please see the Academic Integrity and Academic Integrity Penalties Policies.
Appeals
Fair application of the assessment rubric, rules and guidelines should be administered for each assessment. If you feel an evaluation requires further consideration, you may be entitled to an appeal.
For more information on your right to an appeal, please see the Assessment Appeals Procedure and Policy.
Policies
For access to the policies mentioned above and related to education at AIT, please see the footer of the AIT website, and follow the link named Education Policies and Procedures.
Website: https://www.ait.edu.au
Assessment Rubric
Task Descriptor (F)
Fail (P) Pass (C) Credit (D)
Distinction (HD)
High Distinction
Ability to produce appropriate readable comments in code
15% No comments Major lack of comments make it difficult to
understand the code A few lines of code are commented on, but do not adequately explain what the code intends to accomplish Important lines of code are commented on and
are useful in understanding what the code accomplishes, or the code is overly commented on Comments are succinct, well-written and clearly explain what the code intends to
accomplish
Produces organised code with adequate indentation and correct naming conventions
10% No clear organisation in code Some organisation, indentation and use of correct naming conventions with some exceptions Organisation, indention, and use of naming conventions produces readable code with few exceptions Organisation, indention, and use of naming conventions produces readable code without exception Organisation, indention, and use of naming conventions produces readable code without exception and follows documented best practices supported by correctly cited resources
Ability to apply appropriate variables or
data structures (i.e., array)
15% Not able to identify required data type or data structure Able to identify required data type or data structure but they are not applied correctly and correct results are not produced Able to identify and apply required data type or data structure, and they are applied adequately, although correct
results are not produced Able to identify and apply required data type or data structure and produce partially correct results Able to identify and apply required data type or data structure and produce correct results
Ability to analyse problems and identify appropriate requirements
20% Unable to identify any input and output based on stated problems Able to identify only one input and output based on stated problems Able to identify correct inputs and outputs based on stated problems with some errors or missed cases for one problem Able to identify solutions, inputs and outputs for all stated problems Able to identify correct solutions, inputs and outputs for all stated problems including corner cases
Ability to identify and apply correct control structures (sequential,
selective, and loops)
30% Not able to identify required control structures Able to identity required control structures but does not apply them correctly Able to identify and apply required control structures but with limited evidence of correct results Able to identify and apply required control structures and produce correct results with few exceptions Able to identify and apply required control structures and produce correct results without exception
Ability to keep the program free from syntax,
logical and run-time errors
10% Unable to run the program due to syntax or runtime errors Able to create a program but with logic errors Able to create a program that runs without any logic errors Able to create a program that runs without any logical errors but that does not produce correct output Able to create a program that runs without any logical error and displays appropriate outputs
CRICOS: 02155J / HE PROVIDER:

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. An algorithm is a set of well-defined instructions in sequence to solve the problem. 

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

In layman’s terms, culture can be defined as the “programming of the mind

In layman’s terms, culture can be defined as the “programming of the mind.”  It is something that is firmly ingrained in us as we grow up.  Based on your experiences here in the United States, what do you think are the things that define American culture?  To put it another way, what are the things that are “uniquely American?”  Describe your points in detail.  Also, given that the US has historically been a cultural melting pot based on immigrants from all across the globe, do you believe that the culture here is more diverse or richer than it is in other countries?  Explain your rationale.

Minimun 275 words

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. In layman’s terms, culture can be defined as the “programming of the mind

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

What are the main differences between accounting for a defined contribution plan and accounting for a defined benefits plan

Each answer need to be 2 pages with references and cite!

1.What are the main differences between accounting for a defined contribution plan and accounting for a defined benefits plan (you can address one of the main differences)?  What kind of plan would you prefer and why?

2.Why do financial accountants (vs. tax accountants) need to consider the financial reporting requirements pertaining to taxes (you can address one of the considerations)?

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliverycapitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. accounting for a defined contribution plan and accounting for a defined benefits plan

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

an issue of public health concern within a specifically defined population

Identify an issue of public health concern within a specifically defined population, where behaviour plays an important role in health outcomes. Using relevant theoretical models and evidence, develop a novel health promotion intervention designed to positively influence the health behaviour(s) of your chosen target population.
Grading criteria
Introduction
An introduction to the assignment that establishes the importance of the selected behaviour(s) in health outcomes relating to an issue of public health concern in a defined population. Relevant information should aim to provide an overview regarding the public health issue identified and its relation with the behaviour under examination in the defined population.
Maximum score15
Discussion
Discuss the development of a novel health promotion intervention aiming to influence the targeted health behaviour(s) in a positive manner in the defined population. The development of the particular health promotion intervention should follow relevant theoretical models and evidence including critical consideration of social, psychological and cultural influences on the targeted health behaviour(s). Please note that the development of the particular health promotion intervention could encompass a newly developed intervention, or novel combination of previously used interventions and/or intervention components, or the application of an establish intervention to a new population.
Maximum score30
Implications
Evidence based discussion of the potential benefits arising from the implementation of the developed health promotion intervention (such as expected alteration(s) in metric(s) associated with relevant health outcomes) with a particular focus on the use of specific strategies and techniques within the developed health promotion intervention to communicate health promotion messages. This section should also identify potential difficulties associated with the implementation of the particular health promotion intervention, including issues affecting relevant health communication, empowerment and policy development/management efforts.
Maximum score30
Conclusion
Effective summary of key points.
Maximum score10
Presentation and Referencing
High quality presentation that conforms to principles of academic writing and contains minimal errors in sentence construction, grammar and punctuation. The assignment followed appropriate academic conventions regarding in-text citations and referencing.
Maximum score15

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?  film dealing with the march on Washington on August 28, 1963
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay.
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays

Categories
Writers Solution

favor defined contribution retirement plans

Are employees more likely to favor defined contribution retirement plans over defined benefit retirement plans (pension plans)? How about employers?

…………………………………………………………………………………………………

SEE SOLUTION BELOW

ASSIGNMENT COMPLETED AT https://capitalessaywriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

NO PLAGIARISM

Management: Defined Contribution Retirement Plans versus the Defined Benefit Retirement Plans (Pension Plans

(Course Instructor)

(University Affiliation)

(Student’s Name)

March 16th 2016.

Whether Employees Favor Defined Benefits or Defined Contribution Retirement Plans

            The qualified plans can be classified as either defined benefits or defined contributions (Mathis et al., 2013, p. 459). The defined contribution is a retirement plan where the employee, employer, or both make contributions with no promised payout of future funds. In contrast, the defined benefits plans offer automatic payouts upon the employee retirement, at employer set formula that factors the years of service and salary scale. The defined benefits plans are most common and are preferred by the employees.          The defined contribution plans involves the employee and employer contributions, upon which the contributions are invested at the discretion of the employer (Mathis et al., 2013). However, the capital gains and losses affect the contributions. When the employer retires, s/he receives the balance on the account after the employer has factored the effects of capital investments. The value of the defined contributions plans are often affected by the changes in the investments and market conditions. Most employees would prefer a retirement plan that guarantees them definite returns. As explained the changes in market and investments affects greatly the contributions in the defined contributions, unlike in defined benefits where the retirement benefits are determined solely based on the employer’s and employee contributions. The fact that defined benefits guarantees definite amount of money, unlike the defined contributions, that is affected b…………………………………………………………………………………………………………………………………………………………………………………………………………………………….

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com

NO PLAGIARISM 

Categories
Writers Solution

Defined Contribution Retirement Plans versus the Defined Benefit Retirement Plans

Are employees more likely to favor defined contribution retirement plans over defined benefit retirement plans (pension plans)? How about employers?

……………………………………………………………………………………………………

SEE SOLUTION BELOW

ASSIGNMENT COMPLETED AT https://capitalessaywriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

NO PLAGIARISM

Management: Defined Contribution Retirement Plans versus the Defined Benefit Retirement Plans (Pension Plans

(Course Instructor)

(University Affiliation)

(Student’s Name)

Whether Employees Favor Defined Benefits or Defined Contribution Retirement Plans

            The qualified plans can be classified as either defined benefits or defined contributions (Mathis et al., 2013, p. 459). The defined contribution is a retirement plan where the employee, employer, or both make contributions with no promised payout of future funds. In contrast, the defined benefits plans offer automatic payouts upon the employee retirement, at employer set formula that factors the years of service and salary scale. The defined benefits plans are most common and are preferred by the employees.           The defined contribution plans involves the employee and employer contributions, upon which the contributions are invested at the discretion of the em…………………………………….…………………………………………………………………………………………………………………………………………………………………………………………………………………………….

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com

NO PLAGIARISM

Categories
Writers Solution

Organizational citizenship behaviour is defined as employees’ behaviours

Assessment Information
Subject Code: BUS 604
Subject Name: Business Research Methods
Assessment Title: Assessment 3 – Research Ethics Proposal
Weighting: 40 %
Total Marks: Length: 40
3000 (+- 10%)
COURSE: Master of Business (Research)
Unit: Business Research Methods
Unit Code: BUS 604
Type of
Assessment: Assessment 3 – Research Ethics Proposal
Unit Learning Outcomes addressed: (a) Demonstrate a critical appreciation of the major steps involved in conducting research.
(b) Demonstrate an extended understanding of various business research designs and methods, and be able to evaluate and explain their strengths and weaknesses in research designs for particular projects.
(c) Demonstrate a critical appreciation of ethical issues in research and an advanced understanding of appropriate procedures and protocols applicable to these issues.
(d) Critically review and evaluate research literature.
(e) Design research for a particular project, explaining the limitations, advantages, and technical and ethical implications of the techniques employed.
(f) Select, justify and design questions suitable for a survey instrument and be able to analyse survey data in relation to a particular research question.
(g) Prepare a formal research proposal investigating an innovative and/or unresolved research question.
Criteria for
Assessment: • Knowledge and Understanding
• Content and exploration of theories and ideas
• Analysis, synthesis and critical engagement
• Technical skills and referencing
Submission Date: Week 13
Total Mark &
Weighting: 40 marks | 40%
Students are advised that any submissions past the due date without an approved extension or approved extenuating circumstances incur a 5% penalty per calendar day, calculated from the total mark e.g. a task marked out of 40 will incur a 2- mark penalty per calendar day.
Assessment Task Description
Scenario
Organizational citizenship behaviour is defined as employees’ behaviours that are discretionary and -not directly or explicitly recognized by the formal reward system, and that in the aggregate promotes the effective functioning of the organization- (Organ, 1988). That is, an employee’s favourable behaviour that is not specified in the person’s contract and is not an enforceable requirement of the employee’s role. Organizational Citizenship Behaviour (OCB), leadership styles, and perceived justice are essential for organizational success. However, these constructs have not been adequately studied together within the small and medium enterprises’ (SMEs) context. Thus, a research is being conducted to assess the effects of leadership styles and perceived justice on organizational citizenship behaviour of employee of SMEs in Sydney, Australia. This study will use the cross-sectional survey as the research design. The convenience sampling technique will be used to select a sample size of 305. Questionnaire will be used to collect the data. Data will be analysed using multiple regression.
Task
Based on the scenario, develop a research ethics proposal to be submitted to the Excelsia College Ethics committee for approval. You must use the Research Ethics Proposal templates attached, for to this assessment.
You must;
1. identify a relevant title for the project
2. Identify and define the research problem
3. State 2 aims for the research
4. Explain the need for and value of the research.
5. List your research questions or hypotheses.
6. Outline the research design and methodology
7. Indicate whether the research is the first stage of a larger project.
8. Who will be approached or recruited to be research participants? How many participants will be involved in your study?
9. List the selection and, if appropriate to your study, the exclusion criteria for participants.
10. How will you recruit respondents for your research?
11. How will you provide detailed information about the study to potential participants?
12. Describe how you will obtain consent to participate from those volunteering as participants for the research.
13. Detail how will you ensure that participants do not feel under any obligation to assist you with your research as participants.
14. Describe how you will preserve participants’ confidentiality as you collect and analyse the data and when you report the results
15. If there are any potential risks (physical, emotional, social or legal) to individual participants’ wellbeing (beyond those normally encountered in everyday life) as a result of their involvement in the research, detail the steps that will be taken to address these risks including any support facilities such as counselling, debriefings or referrals.
16. If there are any potential safety implications for yourself as the researcher (beyond those normally encountered in everyday life) please indicate how these will be addressed.
17. If research participants will receive any payment, reimbursement, or other benefits from participation in the research, please detail this and provide a justification for the level of compensation.
18. Describe briefly how the research data will be recorded, for example, audiotape, videotape, or written notes.
19. Describe what you will do with the recorded data once it has been analysed.
20. Specify who apart from yourself (and your supervisors if applicable) will have access to the research data and results, and any conditions to be placed on that access.
21. Detail who will own the data and the results of your research.
22. Create Timelines of the research study
NB: You must use relevant sources to support your arguments where necessary.
Marking rubrics
Criteria HD (High
Distinction)
85%-100% DN (Distinction)
75%-84% CR (Credit) 74%-65% P (Pass) 50%-64% F (Fail)
0%-49%
Knowledge and understanding
5 marks Command of the topic,
unusual
creativity, perception and insight, all suggesting that work should be published in an academic forum. Demonstrates
command of the topic by showing
creativity,
perception and insight — a
serious contribution to the academic debate. Demonstrates
a well-
informed understanding of the topic by showing creativity and insight — a
serious contribution to the academic debate. Understanding
of
contemporary academic debate, with some creative input and insight, with a tendency
toward description. Limited/poor understanding demonstrated. Any creative input is somewhat off the point.
Content and exploration of theories and ideas
10 marks Outstanding selection that makes a
substantial contribution to academic debate. Outstanding selection from a wide relevant and innovative range of perspectives and sources. Selection from a wide and
relevant
range of
perspectives and sources that draws upon contemporary academic debate. Relevant selection from a range of
perspectives and sources. Sources are
mostly integrated into the overall argument. Narrow selection, minimal use of sources, to support the argument.
Analysis, synthesis and critical engagement
15 marks Outstanding use of source material. Excellent argument that is of the
highest academic
quality. Critical distance and
outstanding analysis of the question, to a high degree of excellence. Sources very well integrated into the overall argument. Clear well structured argument that is well crafted and cogent. Critical distance and
outstanding analysis of the question. Sources wellintegrated
into the
overall argument. Clear, cogent
and well-
structured argument.
Critical
distance and sound analysis of the question. Mostly clear, cogent and wellstructured argument. Demonstrates criticality and generally good analysis. Sources are not properly integrated into the argument. Absence of clear and cogent argument.
Incomplete analysis with a tendency to accept the source material at face value.
Technical skills and referencing
5marks Referencing impeccable using appropriate conventions.
No errors in grammar or spelling. Referencing
clear and accurate using appropriate conventions.
Virtually no errors in
grammar or spelling. Referencing clear and accurate using appropriate
conventions. Good grammar and spelling. Referencing sufficiently clear and using an appropriate convention. Adequate
grammar and spelling. References limited/inappropriate.
Many errors in grammar and spelling, making it difficult or impossible to read