Categories
Writers Solution

Social Worker in a Housing Support Program that provides case management support to people who are at risk of losing their tenancy. 

Scenario for Assessment 2 SWSP6013

You are a Social Worker in a Housing Support Program that provides case management support to people who are at risk of losing their tenancy.  The program you are working in is funded by the Federal Australian government. The house in question is owned and administered by a state funded housing NGO and all referrals into the program come from the NSW Government Department of Communities and Justice (DCJ). To be eligible for this program families have to have been homeless and also identified as needing support to sustain a tenancy.

A referral is received for a family with the identified issue in the referral being difficulty maintaining the property (squalor) and rental arrears. the Housing provider is requesting your service to help family put in place a payment plan and provide support to clean up the property in order to avoid breaches against the tenancy and possible eviction. The referral also states that a report has been made to Child Services due to concerns that the Children are not being looked after and living in poor living conditions.

The family are of mixed ethnicity. Kaylie (Mum) is First Nations from the (Noongar People); Rua (Dad) is of Maori descent, having moved from New Zealand to Australia with his family, as a child; Brayden (13); Dylan (11); Simone (10); Shyla (10); Taylor (9), Brianna (6) and Latrell (3). 

You make an appointment to go out and meet with Kaylie and Rua to undertake an assessment, Rua wasn’t able to attend but you were able to meet with Kaylie at the house. During your assessment with Kaylie you were able to ascertain the following information;

  • A large dog is present when you arrive. It walks with a limp and barks very aggressively at you on arrival.
  • The property is a three-bedroom house with a small kitchen
  • Kaylie and Rua have three biological children (Brayden, Simone and Latrell). Dylan, Shyla, Taylor & Brianna are Rua’s Nieces and Nephews who have been temporarily placed in their car as Rua’s Sister is not able to currently care for them due to being in a long-term psychiatric hospital admission.
  • Kaylie tells you that they have recently fallen behind on their rent due to having not received financial support for looking after the children temporarily and have had to get them settled into a new school.  Kaylie says that they don’t want to tell Child Services in case they decide to remove the children all together.
  • Kaylie acknowledges not being able to keep up with the housework and being at times overwhelmed, She  tells you that Rua is also feeling overwhelmed and has started to talk about feeling ‘really stressed and angry like before, say’s he can’t sleep or think stright’.
  •  In talking with Kaylie and walking through the property you try and make a plan to conduct a ‘clean up’ and discard some of the items that aren’t needed/rubbish but you start to realise that the items aren’t ‘rubbish’, the family just has a lot of stuff due to having seven children living in the house.
  • Kaylie eventually tells you that Rua isn’t present because he is doing ‘cash only’ labouring work for a local building firm. Kaylie says that this is intermittent, but they use it to buy groceries.
  • Brayden is present during the interview, although it is a school day. He appears to be looking after Latrell, feeding him lunch, and playing a video game with him on his phone. You ask Kaylie why Brayden is home on a school day. She tells you he doesn’t like school ‘because of the reading’ and would rather ‘look after the young ones’.  

WE OFFER THE BEST CUSTOM PAPER WRITING SERVICES. WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU.

Assignment status: Social Worker in a Housing Support Program

Already Solved By Our Experts

(USA, AUS, UK & CA PhD. Writers)

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS

Order from Academic Writers Bay

Categories
Writers Solution

Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system

Assessment Description

Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system. Security principles such as deter, deny, delay, and detect are used to reduce attack surfaces and possible vectors. Reference the “System Hardening” CYB-515 video (located in the Class Resources) as needed to complete the lab.

Provide screenshots of each step in Part 1. On each screenshot, include 1-2 sentences that summarize what the screenshot is illustrating. For Part 2, provide screenshots of the results. All the screenshots will be used to manage network configuration and sessions to ensure port security that will harden the Windows Server.

Part 1

In the virtual sandbox environment, you will perform the steps to harden a Linux distribution by doing the following:

  • Add a Linux OS VM (Ubuntu, Kali, Parrot, or SecurityOnion).
  • On the Linux VM, open a terminal and run apt-get install lynis
  • To run Lynis, navigate to the correct directory and add ‘./’ in front of the command: ./lynis
  • Run a basic scan. This may take several minutes.
  • $ lynis audit system

Part 2

Access the Windows Server VM and perform the following hardening steps:

  • Disable automatic administrative logon to the recovery console.
  • Set a BIOS/firmware password to prevent unauthorized changes to the server startup settings.
  • Configure the device boot order to prevent unauthorized booting from alternate media.
  • Enable the Windows firewall in all profiles (domain, private, public) and configure it to block inbound traffic by default.
  • Perform port blocking at the network setting level. Perform an analysis to determine which ports need to be open and restrict access to all other ports.
  • Disable NetBIOS over TCP/IP and remove ncacn_ip_tcp.
  • Check the Windows Defender settings.
  • Configure allowable encryption types for Kerberos.
  • Do not store LAN Manager hash values.
  • Set the LAN Manager authentication level to allow only NTLMv2 and refuse LM and NTLM.
  • Remove file and print sharing from network settings. File and print sharing could allow anyone to connect to a server and access critical data without requiring a user ID or password.
  • Disable unneeded services. Most servers have the default install of the operating system, which often contains extraneous services that are not needed for the system to function and that represent a security vulnerability. Therefore, it is critical to remove all unnecessary services from the system.
  • Remove unneeded Windows components. Any unnecessary Windows components should be removed from critical systems to keep the servers in a secure state.
  • Enable the built-in Encrypting File System (EFS) with NTFS or BitLocker on Windows Server.
  • Install an open-source antivirus program of your choice
  • Run your antivirus program against your machine

Part 3

Examine the antivirus program you installed. Research potential faults and vulnerabilities within the program, including the open-source nature of the program.

Write a 750-1000-word lab report that includes a title page, table of contents, overview, and the required screenshots with summaries.

Describe the strengths and weaknesses associated with the open-source antivirus program you installed running in an enterprise network.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.  

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.  

You are not required to submit this assignment to LopesWrite.

The similitude score has to be at least 20%

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com on Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system

NO PLAGIARISM, Get impressive Grades in Your Academic Work

Categories
Writers Solution

Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system

Assessment Description

Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system. Security principles such as deter, deny, delay, and detect are used to reduce attack surfaces and possible vectors. Reference the “System Hardening” CYB-515 video (located in the Class Resources) as needed to complete the lab.

Provide screenshots of each step in Part 1. On each screenshot, include 1-2 sentences that summarize what the screenshot is illustrating. For Part 2, provide screenshots of the results. All the screenshots will be used to manage network configuration and sessions to ensure port security that will harden the Windows Server.

Part 1

In the virtual sandbox environment, you will perform the steps to harden a Linux distribution by doing the following:

  • Add a Linux OS VM (Ubuntu, Kali, Parrot, or SecurityOnion).
  • On the Linux VM, open a terminal and run apt-get install lynis
  • To run Lynis, navigate to the correct directory and add ‘./’ in front of the command: ./lynis
  • Run a basic scan. This may take several minutes.
  • $ lynis audit system

Part 2

Access the Windows Server VM and perform the following hardening steps:

  • Disable automatic administrative logon to the recovery console.
  • Set a BIOS/firmware password to prevent unauthorized changes to the server startup settings.
  • Configure the device boot order to prevent unauthorized booting from alternate media.
  • Enable the Windows firewall in all profiles (domain, private, public) and configure it to block inbound traffic by default.
  • Perform port blocking at the network setting level. Perform an analysis to determine which ports need to be open and restrict access to all other ports.
  • Disable NetBIOS over TCP/IP and remove ncacn_ip_tcp.
  • Check the Windows Defender settings.
  • Configure allowable encryption types for Kerberos.
  • Do not store LAN Manager hash values.
  • Set the LAN Manager authentication level to allow only NTLMv2 and refuse LM and NTLM.
  • Remove file and print sharing from network settings. File and print sharing could allow anyone to connect to a server and access critical data without requiring a user ID or password.
  • Disable unneeded services. Most servers have the default install of the operating system, which often contains extraneous services that are not needed for the system to function and that represent a security vulnerability. Therefore, it is critical to remove all unnecessary services from the system.
  • Remove unneeded Windows components. Any unnecessary Windows components should be removed from critical systems to keep the servers in a secure state.
  • Enable the built-in Encrypting File System (EFS) with NTFS or BitLocker on Windows Server.
  • Install an open-source antivirus program of your choice
  • Run your antivirus program against your machine

Part 3

Examine the antivirus program you installed. Research potential faults and vulnerabilities within the program, including the open-source nature of the program.

Write a 750-1000-word lab report that includes a title page, table of contents, overview, and the required screenshots with summaries.

Describe the strengths and weaknesses associated with the open-source antivirus program you installed running in an enterprise network.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.  

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.  

You are not required to submit this assignment to LopesWrite.

The similitude score has to be at least 20%

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com on Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system

NO PLAGIARISM, Get impressive Grades in Your Academic Work

Categories
Writers Solution

Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system

Assessment Description

Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system. Security principles such as deter, deny, delay, and detect are used to reduce attack surfaces and possible vectors. Reference the “System Hardening” CYB-515 video (located in the Class Resources) as needed to complete the lab.

Provide screenshots of each step in Part 1. On each screenshot, include 1-2 sentences that summarize what the screenshot is illustrating. For Part 2, provide screenshots of the results. All the screenshots will be used to manage network configuration and sessions to ensure port security that will harden the Windows Server.

Part 1

In the virtual sandbox environment, you will perform the steps to harden a Linux distribution by doing the following:

  • Add a Linux OS VM (Ubuntu, Kali, Parrot, or SecurityOnion).
  • On the Linux VM, open a terminal and run apt-get install lynis
  • To run Lynis, navigate to the correct directory and add ‘./’ in front of the command: ./lynis
  • Run a basic scan. This may take several minutes.
  • $ lynis audit system

Part 2

Access the Windows Server VM and perform the following hardening steps:

  • Disable automatic administrative logon to the recovery console.
  • Set a BIOS/firmware password to prevent unauthorized changes to the server startup settings.
  • Configure the device boot order to prevent unauthorized booting from alternate media.
  • Enable the Windows firewall in all profiles (domain, private, public) and configure it to block inbound traffic by default.
  • Perform port blocking at the network setting level. Perform an analysis to determine which ports need to be open and restrict access to all other ports.
  • Disable NetBIOS over TCP/IP and remove ncacn_ip_tcp.
  • Check the Windows Defender settings.
  • Configure allowable encryption types for Kerberos.
  • Do not store LAN Manager hash values.
  • Set the LAN Manager authentication level to allow only NTLMv2 and refuse LM and NTLM.
  • Remove file and print sharing from network settings. File and print sharing could allow anyone to connect to a server and access critical data without requiring a user ID or password.
  • Disable unneeded services. Most servers have the default install of the operating system, which often contains extraneous services that are not needed for the system to function and that represent a security vulnerability. Therefore, it is critical to remove all unnecessary services from the system.
  • Remove unneeded Windows components. Any unnecessary Windows components should be removed from critical systems to keep the servers in a secure state.
  • Enable the built-in Encrypting File System (EFS) with NTFS or BitLocker on Windows Server.
  • Install an open-source antivirus program of your choice
  • Run your antivirus program against your machine

Part 3

Examine the antivirus program you installed. Research potential faults and vulnerabilities within the program, including the open-source nature of the program.

Write a 750-1000-word lab report that includes a title page, table of contents, overview, and the required screenshots with summaries.

Describe the strengths and weaknesses associated with the open-source antivirus program you installed running in an enterprise network.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.  

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.  

You are not required to submit this assignment to LopesWrite.

The similitude score has to be at least 20%

Assignment Status: Solved By Our Experts.

WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU

WE OFFER THE BEST PAPER WRITING SERVICES on Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system

USA, AUS, CA & UK PhD Writers

Categories
Writers Solution

American Constitution provides the guiding principles that influence decisions made by different systems in federal and state systems

Law and International Law

Issue

The American Constitution provides the guiding principles that influence decisions made by different systems in federal and state systems. In the State of Texas, legislation that directed courts to erect a cross at the front of sala was passed. The legislation also dictated that a short Christian prayer should be done before every court proceeding in the state. After examining some constitutional provisions, it is evident that this state is unconstitutional in the United States.

Rule

The legislation passed in the courts of the State of Texas should be directed by rules and laws set by the American constitution. The United States constitution has laws governing the law-making process and making changes in systems around the country. The development of law in each state in the country follows a procedure that ensures its viability in the stated jurisdiction. Elected legislative representatives assess a law’s applicability before considering it (National Archives n.p). Another law about the issue is the freedom of religion and religious displays in government properties (LLI n.p.). The constitution offers people freedom of religion and expression. Therefore, the constitution contains laws that should govern legislation development in the State of Texas.

Analysis

The law passed in the courts in the State of Texas are unconstitutional. The disqualification of these legislations emerges from the process that the district judge used to have the law passed in the court. First, he used a friend to get the legislation passed in the state. He was expected to follow the process of law-making provided by the constitution (National Archives n.p). The law also dictates that a short Christian prayer should always precede hearings, which denies other religions their freedom. The legislation forces people to uphold religious practices that diverge from their beliefs. Therefore, these characteristics disqualify the state law from being constitutional.

Conclusion

The court legislation set in the State of Texas is unconstitutional. Constitution law requires laws to follow a defined procedure during their development. The constitution also requires state systems to observe religious freedom in each state. The court legislation did not follow the set procedure, and it dictated that people must uphold the rules that favored one religion.

Works Cited

LLI. “Religious Displays on Government Property.” LII / Legal Information Institute, www.law.cornell.edu/constitution-conan/amendment-1/religious-displays-on-government-property. Accessed 7 July 2022.

National Archives. “The Constitution of the United States: A Transcription.” National Archives, 4 May 2020, www.archives.gov/founding-docs/constitution-transcript

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com on American Constitution provides the guiding principles that influence decisions made by different systems in federal and state systems

NO PLAGIARISM, Get impressive Grades in Your Academic Work

Categories
Writers Solution

The American Constitution provides the guiding principles that influence decisions made by different systems in federal and state systems

Law and International Law

Issue

The American Constitution provides the guiding principles that influence decisions made by different systems in federal and state systems. In the State of Texas, legislation that directed courts to erect a cross at the front of sala was passed. The legislation also dictated that a short Christian prayer should be done before every court proceeding in the state. After examining some constitutional provisions, it is evident that this state is unconstitutional in the United States.

Rule

The legislation passed in the courts of the State of Texas should be directed by rules and laws set by the American constitution. The United States constitution has laws governing the law-making process and making changes in systems around the country. The development of law in each state in the country follows a procedure that ensures its viability in the stated jurisdiction. Elected legislative representatives assess a law’s applicability before considering it (National Archives n.p). Another law about the issue is the freedom of religion and religious displays in government properties (LLI n.p.). The constitution offers people freedom of religion and expression. Therefore, the constitution contains laws that should govern legislation development in the State of Texas.

Analysis

The law passed in the courts in the State of Texas are unconstitutional. The disqualification of these legislations emerges from the process that the district judge used to have the law passed in the court. First, he used a friend to get the legislation passed in the state. He was expected to follow the process of law-making provided by the constitution (National Archives n.p). The law also dictates that a short Christian prayer should always precede hearings, which denies other religions their freedom. The legislation forces people to uphold religious practices that diverge from their beliefs. Therefore, these characteristics disqualify the state law from being constitutional.

Conclusion

The court legislation set in the State of Texas is unconstitutional. Constitution law requires laws to follow a defined procedure during their development. The constitution also requires state systems to observe religious freedom in each state. The court legislation did not follow the set procedure, and it dictated that people must uphold the rules that favored one religion.

Works Cited

LLI. “Religious Displays on Government Property.” LII / Legal Information Institute, www.law.cornell.edu/constitution-conan/amendment-1/religious-displays-on-government-property. Accessed 7 July 2022.

National Archives. “The Constitution of the United States: A Transcription.” National Archives, 4 May 2020, www.archives.gov/founding-docs/constitution-transcript

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com on The American Constitution provides the guiding principles that influence decisions made by different systems in federal and state systems.

NO PLAGIARISM, Get impressive Grades in Your Academic Work

Categories
Writers Solution

PHM Reliable Catering is a company that provides catering services to both small and large businesses

Computer Assignment MS Excel: Update Payroll

Using Microsoft Excel online or installed version of Microsoft Excel complete the following assignment

NOTE: To complete the assignment you will need to start with this file, Lab 3-2 PHM Reliable Catering Weekly Payroll Report

Problem: PHM Reliable Catering is a company that provides catering services to both small and large businesses. You have been asked to update the weekly payroll report to reflect changes in personnel, to update certain mandatory deductions, and to add overtime computations. The final worksheet is shown in Figure 3–87.

Computer Applications for Business – Week 6 Assignment MS Excel: Update Payroll Using Microsoft Excel online or installed version of Microsoft Excel complete the following assignment NOTE: To complete 1

1.    Open the workbook, Lab 3-2 PHM Reliable Catering Weekly Payroll Report.
 

2.    Save the file as CS155Week6LastnameFirstname. Ensure that you use your Lastname and Firstname in filename.

3.    Delete rows 12 through 14 to remove the statistics below the Totals row.

4.    Delete column B. Set column A width to 31.00 and columns B through K to 11.00. Select row 3 and set text to wrap in this row using the Wrap Text button (Home tab | Alignment group), and then set the row height to best fit.

5.    Delete the record for the employee Evans, Timothy. Add two blank lines directly above the row for Mi, Emily, and add the information for the two new employees listed in Table 3–11.
 

6.    Replace one of employee’s names with your name.

7.    If necessary, use the fill handle in cell E6 to copy the gross pay formula to the rows of the two new employees.

8.    Add the Tax Rates information shown in Figure 3–87 in cells A15:B20 to your worksheet.
 

9.    Change the font size in cell A1 to 28-point. Change the font size in cell A2 to 18-point. Change the font in cell A15 to 18-point italic and underlined. Change the row height for rows 1, 2, and 15 to best fit.

10.  Insert three columns to the right of the Gross Pay column. Add the column titles Taxable Income, Social Security, and Medicare in cells F3:H3. Center the contents of cells B3:K3. Calculate the Social Security and Medicare taxes in columns G and H by multiplying the tax rates in the Tax Rates table by the Gross Pay.

11.  Federal tax calculations must take into account two tiers of income tax, which are applied to the taxable income. Calculate the taxable income, which is the Gross Pay — (number of withholding allowances * $90).

12.  Calculate the federal tax withheld. If an employee has a taxable income of greater than or equal to $689, then the federal tax withheld equals $110.85 plus the federal tax rate found in cell B19 multiplied by the taxable income in excess of $689. If an employee’s taxable income is $689 or less, the federal tax withheld equals the taxable income multiplied by the federal tax rate found in cell B18. Use the IF function to calculate the federal tax in Column I.
 

13.  State tax is calculated as a percentage of federal tax. Use the tax rate in the Tax Rates table to calculate state tax in column J.
 

14.  Calculate Net Pay in column K, as Gross Pay — Social Security, Medicare, Federal Tax, and State Tax.

15.  Use the background color of your choice for the ranges A1:K2 and A15:B20.

16.  Center the range B4:B11. Apply the currency style with two decimal places, no dollar signs, and negative numbers in black and parentheses to the range C4:C11 and E4:K12.
 

17.  Apply a Thick Bottom Border to the range A3:K3. Apply a Thick Outside Border to the range A15:B20.

18.  Change the sheet tab name to Weekly Payroll and the tab color to match the color used as background color in cell A1.
 

19.  Preview the worksheet. In page setup fit the worksheet to one page in landscape orientation

WE HAVE DONE THIS ASSIGNMENT BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER on PHM Reliable Catering is a company that provides catering services to both small and large businesses

Are You looking for Assignment and Homework Writing help? We Provide High-Quality Academic Papers at Affordable Rates. No Plagiarism.

TO BE RE-WRITTEN FROM THE SCRATCH

Categories
Writers Solution

The scenario-based case study used in this course provides descriptive information and data to help you make decisions as if you were actively participating in a real-life investigation of a warehouse fire

Part 1: Scenario-Based Case Study 

The course project is a scenario-based case study, which will be due in Unit VIII. A scenario-based case study is similar to other case studies you may have experienced. The scenario-based case study used in this course provides descriptive information and data to help you make decisions as if you were actively participating in a real-life investigation of a warehouse fire. There are eight assignments for the scenario-based case study (one per unit). You will complete and submit Part 1, Sections I and II of the course project in this unit. Use APA level one headings for each section. The heading should be indicative of the major section to follow. Here is a tutorial on level headings.For the course project, you will utilize what you learn throughout the course to solve a real-world problem of what fire protection is needed to create plausible actions, concepts, or inventions to solve fire protection deficiencies that resulted in a large-scale fire in a warehouse distribution center.From Unit I through Unit VII, you will complete one part of your recommendation in each unit, and in Unit VIII, you will write an executive summary and conclusion. You will then compile all parts into one document as your final project. You can arrange each part in any order you would like before submitting the final project. For instance, this assignment about fire pumps is covered in Chapter 6 of the textbook; however, you may choose to cover fire protection, detection, and suppression systems (completed in Unit II) as the first part of your final project and to place fire pumps after another topic of your choice. You are able to organize the final report sections in any order that makes logical sense to you.During each part, you will prepare a well-organized narrative consisting of two sections. Only submit the assignment for that unit until the final case study is compiled from all units and submitted as a single document in Unit VIII. However, you should evaluate and revise the recommendations as needed during the process for each previous unit as you learn more during the progression of this course.This scenario-based case study is designed to draw upon your imagination to think creatively on potential concerns with fire and explosive hazards, fire controls, and fire and emergency management. You should look at fire protection technology in a holistic way. This way of design thinking is significantly different from what was previously designed by thinking in isolation. You will evaluate and develop recommendations to resolve potential fires in the future.Please click  here to view the background information of the scenario.Through the scenario-based case study process, you will begin developing a tool that will synchronize suggestions to improve life safety. You will accomplish this by utilizing recommendations to improve fire protection after a warehouse distribution center fire.Section ISection I will address the foreign-made fire pump and your recommendations after reviewing the background information.Your narrative will consist of your evaluation of the foreign-made fire pump and your choice of fire pump that you would recommend for the rebuild of the warehouse. The background information will provide you the needed material to identify the basic components common to fire protection for the City of Washington Distribution Warehouse. As you review the material, make sure you do the following actions: 

  1. examine what contributed to the fire,
  2. analyze building components and existing fire suppression systems, and
  3. prepare and disseminate recommendations.

Fire protection design involves an integrated approach where designers need to analyze the building’s use, occupancy, footprint, and existing fire protection systems or components. This assignment is not looking for compliance with building codes nor expecting you to be a fire protection system designer. However, the purpose of this assignment is for you to apply the concepts and knowledge you learned in this unit as you begin writing your final project covering protection systems that will detect, contain, control, and extinguish a fire. In addition, this assignment provides you with the opportunity to use your skills, expertise, and experience to enrich your response.Section IISection II will address the ethical dilemma of using the foreign-made fire pump, as described in the Points to Ponder Scenario within this unit, as a right versus right action or a right versus wrong action.As we saw in the unit lesson, Kidder (1995) described four basic paradigms that deal with most ethical dilemmas of right versus right choices. He believed ethical decisions often involve choices of the individual versus community, truth versus loyalty, short-term versus long-term, and justice versus mercy. Pick one of the paradigms below, and answer the question.

  • Is it right to use the foreign-made fire pump because others were not available in order to provide fire protection so the warehouse could re-open and the workers could go back to work?  -OR-
  • Do you believe using the fire pump dilemma was a right versus wrong action based on your own values, professional ethics, and institutional values?

For this assignment, you will write a two-page narrative (one page per section) supporting your positions. You must have a title page and references page. An abstract is not required. You may use information from reputable, reliable journal articles, case studies, scholarly papers, and other sources that you feel are pertinent. You should use at least three sources, one of which must be your textbook. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations following proper APA style

WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER The scenario-based case study used in this course provides descriptive information and data to help you make decisions as if you were actively participating in a real-life investigation of a warehouse fire

TO BE RE-WRITTEN FROM THE SCRATCH

Categories
Writers Solution

The USPAP provides 10 standards to meet when performing valuation or appraisal of a business.

the reply must be at least 250 words. Do not just say “good job” or “I learned something from your post.” Replies are not a cheering exercise. Instead, your replies must be substantial, reflecting what you learned from reading the post, offering an extension, or correcting a mistake. Use what you learned in researching for your post (or knowledge gained from other classes or personal experience) to either supplement or critique the post you are writing about. 

     The USPAP provides 10 standards to meet when performing valuation or appraisal of a business. Each of these standards encompass a different type of business. Real estate valuation is covered in standards 1-6, personal property in 3, 6, 7, and 8, and businesses and intangible assets in 3, 9, and 10. This thread will be discussing standard 9, which discusses the development stages of a business appraisal. This standard is broken up into 5 rules. Rule 1 discusses how the appraiser should be knowledgeable in various methods, practices, and procedures, and to ensure he or she has not made any substantial errors. Rule 2 offers definitions to various items that the appraiser is required to identify such as different assumptions, conditions, and basic definitions of the client, product, and purpose. Rule three simply encourages the appraiser to compare the liquidation value against the going concern value, specifically to identify if the liquidation value happens to be greater than the going concern value. Rule 4 seems to add further into rule 1, encouraging the appraiser to use multiple approaches and to ensure that all variables and information is accounted for. Finally, Rule 5 requires the appraiser to be able to ethically reconcile his appraisal, by explaining the relevance and accuracy of each approach, method, procedure, and calculation.

            This standard applies to businesses and intangible assets. An example in which this standard might be applicable, is to essentially all businesses. This standard requires appraisers to utilize each approach, income, market, and asset, in their final valuation. This exists to provide the most complete and accurate valuation, and compares the businesses income value to their competitors, and their assets. Being heavily invested in the stock market, this is a very valuable principle to work from. A business might be performing poorly through their income approach, however, their assets might be exponentially more valuable than the actual revenue that the business brings in. This comparison reminds me of a story told by Peter Lynch, a former fidelity mutual fund manager, in his book One Up on Wall Street. 21st Century Fox had recently purchased the Pebble Beach Golf course at fair market value. This fair market value was actually understated an incredible amount, as the assets that Pebble Beach had owned were much more valuable than the business itself. 21st Century Fox ended up selling an unused section of land on the Pebble Beach property for tens of millions of dollars (Lynch, 2000). The stock proceeded to rise exponentially, to which Peter Lynch earned an enormous gain in the stock market. This is a perfect example of ensuring the appraiser explores all sources of revenue and assets to derive an accurate appraisal as stated in Standard 10 of the USPAP.

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. The USPAP provides 10 standards to meet when performing valuation or appraisal of a business.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

SafeAssign (SA) provides:A.A percentage that represents how much of the assignment matches data in the SA databaseB.Sources of matching informationC

QUESTION 1

  1. SafeAssign (SA) provides:A.A percentage that represents how much of the assignment matches data in the SA databaseB.Sources of matching informationC.Color-coded matching phrases in the SA databaseD.All of the above

5 points   

QUESTION 2

  1. Which statement is not a good definition of plagiarism?A.Plagiarism is the paraphrasing of another person’s ideas into your own words and adding an appropriate citation.B.Plagiarism is the use of the views, opinions, or insights of another without acknowledgment.C.Plagiarism is the paraphrasing of another person’s characteristic or original phraseology, metaphor, or other literary device without acknowledgment.D.Plagiarism is the use of intellectual material produced by another person without acknowledging its source.

5 points   

QUESTION 3

  1. Walden and APA do allow for certain circumstances where you may need to cite yourself in your text; however, reusing your own work without proper citation can be considered self-plagiarism.A.TrueB.False

5 points   

QUESTION 4

  1. You read an article, used one of the ideas of the author who wrote the article, and placed a citation at the end of the sentence giving credit to the author. In your paraphrase, you began with the author’s original words but changed some of the words around, using synonyms and deleting/adding some words from the original material. Is this plagiarism?A.Probably, because you did not use your words for the author’s ideas.B.No, because you changed the sentence so it is not copied verbatim.

5 points   

QUESTION 5

  1. Walden University takes academic integrity seriously for student intellectual development. Academic integrity does not include:A.Reusing your own papers/ideas for different courses without citationsB.A free exchange of ideasC.Agreeing to abide by regulations governing work stipulated by the academic unit or academic program and, in turn, the InstructorD.Giving credit to the original author if a person uses or replicates the work

5 points   

QUESTION 6

  1. Your spouse was in an auto accident on the day your 7-page paper is due. You expect your Instructor to be flexible, and he or she must give you extra time to submit your assignment.A.True, the faculty must assist students with emergencies.B.False, contact your Instructor as soon as possible. Describe your situation and see if flexibility may be available.

5 points   

QUESTION 7

  1. Academic integrity violations may include the following: plagiarism, cheating, copyright violations, misrepresentation of credentials, and alteration of University documents.A.TrueB.False

5 points   

QUESTION 8

  1. You withdrew from a class last term and now you want to reuse a paper that you wrote and researched. Can you reuse the paper in a new course?A.You should ask permission from your Instructor first. Since you withdrew but submitted the paper in the previous term, the paper will have a high SafeAssign match percentage. The APA Manual shows how to format your own unpublished work.B.No, it is a violation of academic integrity and Walden University policy.C.Yes, it is your own work and not a violation of the academic integrity policy.

5 points   

QUESTION 9

  1. To prevent plagiarism, the DBA faculty recommend that you use primarily direct quotations rather than paraphrasing. Using direct quotations is more scholarly than putting another author’s ideas into your own words and using a citation for acknowledgment.A.TrueB.False

5 points   

QUESTION 10

  1. Joe submits his paper to SafeAssign (SA) and the results indicate that 33% of the paper matches sources in the SA database. Joe has committed plagiarism. True or false?A.TrueB.FalseC.Not necessarily

5 points   

Click Save and Submit to save and submit. Click Save All Answers to save all answers.

    • GET SOLUTION FOR THIS ASSIGNMENT

      CLICK HERE TO MAKE YOUR ORDER

      TO BE RE-WRITTEN FROM THE SCRATCH

      NO PLAGIARISM

      • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
      • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
      • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
      • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
      • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
      • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. SafeAssign (SA) provides:A.A percentage that represents how much of the assignment matches data in the SA databaseB.Sources of matching informationC
      • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

      Get Professionally Written Papers From The Writing Experts 

      Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
    • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

    Get Professionally Written Papers From The Writing Experts 

    Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays