Emmanuel and his mother live in an urban community housing complex. The building is worn down and dirty from the urban dust, cockroaches, and mold. Emmanuel is five years of age and has suffered from asthma for the last two years. One evening, his mother poured him some milk and put him to bed. Shortly afterward, Emmanuel woke up wheezing and coughing. As he gasped for air, he became more and more anxious. His mother ran for his inhaler, but he was too upset and restless to use it. Emmanuel’s skin became moist with sweat, and as he began to tire, his wheezing became quieter. His mother called 911 and waited anxiously for the ambulance to arrive.
Emmanuel uses a corticosteroid inhaler for the management of his asthma. What is the mechanism of action of this drug? How is its action different from the β2-agonist inhalants?
Why does someone with severe asthma become physically fatigued during a prolonged attack? What are the physiological events that occur during an attack?
One of the complications of respiratory fatigue is the development of hypercapnia. How does the body compensate for an increase in CO2? What are the effects of hypercapnia on the central nervous system?
Assignment Requirements:
Requirements:
Make sure all of the topics in the case study have been addressed.
Cite at least three sources; journal articles, textbooks or evidenced-based websites to support the content.
All sources must be within 5 years.
Do not use .com, Wikipedia, or up-to-date, etc., for your sources.
In our society as we deal on a daily basis with threats and opportunities we often don’t consider the events that got us to where we are today. We just try to work ahead and make something that is new or better than what we perceive we have now. In doing so we may be repeating mistakes from the past and we may be overlooking some success that has already occurred. It is important to know the history of the type of venture that we are engaged in so that we can use our time and resources efficiently. This can certainly be said of police/citizen relations.
For this week’s assignment consider how American policing has evolved from its earliest beginnings until now. Analyze the memorable events and remarkable people who influenced the development of our system and describe why changes were made and how effective they have been. Critically examine the early founding principles of policing, such as those suggested by Sir Robert Peel and apply those principles to what is actually happening today.
Write a 2 page APA style paper. Only the body of the paper will count toward the word requirement (title page and references are in addition to the 2 pages)
In your paper, cite at least 2-3 references using the APA style guide format for in-text citation.
Instructions: Each response requires a minimum of 275 words. Minimally 2 scholarly sources from EBSCO are required throughout the Complete assignment.
1.) Summarize the case in addition to identifying the market categories in which Sprig operates. Discuss two (2) dilemmas that Sprig’s management is facing?
.
2.) Within the case study several competitors are discussed. Identify a competitor not addressed in the case and discuss the factors that make that competitor similar and different from Sprig. How is Sprig positioned relative to this competitor?
3.) Identify two (2) additional target markets upon which Sprig should focus. Within your response identify at least two (2) consumer segments and within each segment identify at least two (2) attributes for each segment. Finally discuss why those attributes would be the best to focus on specific to Sprig.
Requirements:
Instructions: Each response requires a minimum of 275 words.
Minimally 2 per question scholarly sources from EBSCO are required for the Complete assignment.
APA FORMAT
Put reference with the answer and serpate them like how the question are.
Reference reading material is
Solomon, M., Marshall, G., & Stuart, E. (2012). Brand you: Marketing real people, real choices. (7th ed.). Upper Saddle River, NJ: Pearson.
There are five websites which will provide starter information on which to develop your discussion points for International Business below. Two are diverse rankings lists; the other three are to assist you with research:
Some of the countries are ranked high on the Forbes’ list of countries for doing business; while these same countries are ranked lower on the World Bank list. It will be up to you to discern why the discrepancy. Each week we will review a country and answer the following questions:
1. What would make this country an attractive region or market in which to enter, depending on the type of opportunities your firm is considering? What are cultural influences, including customs and business etiquette in this international market, will affect business practices? 2. If you were to want to start trading with this country, with what type of entry strategy would you begin?
3. What kinds of local representation or institutional support would you need available to you to help you navigate any unforeseen obstacles and explain the laws and contract provisions in order to conduct business and protect your assets? 4. What are some of the limitations (economic, infrastructure, technological) in establishing this exchange relationship (for example, currency fluctuations, or import/export timelines)? 5. What opportunities and limitations are there for communicating the gospel of Jesus Christ? What would be a focus for prayer? Be sure to review the Operation World link above.
Weekly Discussions
Forbes’ Rank and Name
World Bank Top Ten
Week 1
#1 Denmark
Top Ten Ease of Doing Business
Week 2
#3 Norway
Top Ten Ease of Doing Business
Week 3
#8 Singapore
Top Ten Fastest Growing Economies; Lowest Trade Restrictiveness
Week 4
#11 Hong Kong
Top Ten Lowest Trade Restrictiveness
Week 5
#25 Israel
Top Ten Lowest Trade Restrictiveness
Week 6
#54 Turkey
Top Ten Lowest Trade Restrictiveness
Week 7
#94 China
Top Ten Fastest Growing Economies
Week 8
#103 Burkina Faso
Top Ten Fastest Growing Economies; Real Trade Growth
Assignment 3: Strategic Plan (Group Assignment) (Week 8)
Phase 1: Assignment Instructions:
This assignment is the last of three assignments. Students will use the tools and concepts learned in the course and in previous business courses to develop an understanding of how organizations develop and manage strategies to establish, safeguard and sustain its position in a competitive market.
This assignment is a group project. You will be placed into groups consisting of no more than four students each. Groups will be assigned early, and the expectation is that the groups will work on the various parts of the assignment as relevant content is covered throughout the course. The group will act as a self-directed team, and will therefore determine its own leadership, timetable, task list, guidelines for communication, goals, and so forth. As an individual, you are expected to participate fully in the project. You are required to use the UMUC group area for discussion.
You will actively participate in completing the assignment and group members will receive the same group grade. However, free-riders who contribute little will receive a different grade than the group grade at the discretion of the instructor. If you fail to contribute to the project, a zero for the assignment will be assigned.
Throughout the course, you have learned about the strategic management and have practiced the various stages through the completion of assignments and learning activities. In phase 1 of this final project, you will work in a group to create a strategic plan and present the plan in a professional manner. The plan requires a paper submitted to the Assignment Folder.
You will perform a strategic plan on a company, from the list provided below. However, instructors may elect to assign a company on the list or of his or her choosing or one of their own as long as previous companies provided in the course are not used. Starbucks, Walmart, Amazon and Apple may not be used. Students who fail to use the companies on the list or an unapproved company will receive a zero for the assignment.
American Eagle Outfitters (NYSE: AEO)
In completing the assignment, you will perform research on the company provided, answer the questions below in narrative form and follow the steps provided below.
Step 1: Preparation for the Assignment
In writing this assignment, you will read and do the following:
Read the grading rubric for the assignment. Use the grading rubric while writing the plan to ensure all requirements are met.
Third person writing is required. Third person means that there are no words such as “I, me, my, we, or us†(first person writing), nor is there use of “you or your†(second person writing). If uncertain how to write in the third person, view this link: http://www.quickanddirtytips.com/education/grammar/first-second-and-third-person.
Contractions are not used in business writing, so you are NOT to use contraction in writing this assignment.
You are expected to paraphrase and are NOT use direct quotes unless related to a company’s mission or vision statements. You are expected to paraphrase, which can be learned by reviewing this link: https://writing.wisc.edu/Handbook/QPA_paraphrase2.html.
You are responsible for APA only for in-text citations and a reference list. Cite the page or paragraph number.
You may use the resources from the course and from your research. You may not use books and page and paragraph numbers must be used.
Read all course material and perform independent research to provide a comprehensive strategic plan.
Step 2: How to Set Up the Plan
Create a double-spaced, 12-point font Word or Rich Text Format (RTF) document. The final product will be no more than 20 pages in length excluding the title page and reference page. Write clearly and concisely.
Follow this format for the comprehensive strategic plan:
Title page with title, your name, the course, the instructor’s name;
introduction
vision and mission
background organization
industry analysis
competitive analysis
financial analysis – not copied data from internet
technique analysis – IFE, EFE, CPM, BCG matrix, Grand Strategy Matrix, and QSPM
alternative strategy generation
SWOT analysis
strategy and prioritization selection
action plan for implementation
evaluative plan
Reference page
Step 3: Create an introductory
Step 4: Develop the plan:
Identify strategies;
Discuss strategies used at corporate, business and function levels using the concepts learned in the course;
Recommend specific strategies and long-term objectives;
Recommend procedures for strategy review and evaluation;
Use frameworks and tools discussed throughout the course.
Step 5: Identify strategy recommendations using the following format for the formulation of strategies.
Step 6: Using the grading rubric as a comparison, read through the paper to ensure all required elements are presented.
Step 7: Proofread the paper for spelling and grammatical issues, and third person writing.
Use the spell and grammar check in Word as a first measure;
Have someone who has excellent English skills to proof the paper;
Consider submitting the paper to the Effective Writing Center (EWC). The EWC will provide 4-6 areas that may need improvement.
Step 8: Submit the paper in the Assignment Folder. (The assignment submitted to the Assignment Folder will be considered a student’s final product and therefore ready for grading by the instructor. It is incumbent upon the student to verify the assignment is the correct submission. No exceptions will be considered by the instructor.)
Presented mission, vision and objectives of the company accurately and comprehensively identified and correlated to the definitions of each.
(0.54 – 0.6)
Presented mission, vision and objectives of the company sufficiently identified but not completely accurate or comprehensive correlated to the definitions of each.
(0.48 – 0.53)
Presented mission, vision and objectives of the company were identified but was not complete or needs more clarification on some aspects; no correlation to the meaning of each.
(0.42 – 0.47)
Presented mission, vision and objectives of the company was attempted but key aspects were missing or superficially presented.
(0.36 – 0.41)
Failed to present mission, vision and objectives and the correlation to definitions.
(0 – 0.35)
Presented company background accurately and comprehensively presented.
(0.54 – 0.6)
Presented company background sufficiently but is not completely accurate or comprehensive.
(0.48 – 0.53)
Company background was discussed but needs more clarification on some aspects.
(0.42 – 0.47)
Company background was attempted but key aspects were missing or superficially presented.
(0.36 – 0.41)
Failed to present company background.
(0 – 0.35)
Industry analysis was performed accurately and comprehensively.
(1.08 – 1.2)
Industry analysis was performed sufficiently but is not completely accurate or comprehensive.
(0.96 – 1.07)
Industry analysis was performed but needs more clarification on some aspects.
(0.84 – 0.95)
Attempted to perform an industry analysis but key points were missing or superficially presented.
(0.72 – 0.83)
Failed to perform an industry analysis.
(0 – 0.71)
Competitive analysis was performed accurately and comprehensively.
(1.08 – 1.2)
Competitive analysis was performed sufficiently but is not completely accurate or comprehensive.
(0.96 – 1.07)
Competitive analysis was performed but needs more clarification on some aspects.
(0.84 – 0.95)
Attempted to perform a competitive analysis but key points were missing or superficially presented.
(0.72 – 0.83)
Failed to perform an competitive analysis.
(0 – 0.71)
Financial analysis was performed accurately and comprehensively.
(1.08 – 1.2)
Financial analysis was performed sufficiently but is not completely accurate or comprehensive.
(0.96 – 1.07)
Financial analysis was performed but needs more clarification on some aspects.
(0.84 – 0.95)
Attempted to perform a financial analysis but key points were missing or superficially presented. Financial data presented with little or no analysis.
(0.72 – 0.83)
Failed to perform a financial analysis.
(0 – 0.71)
Technique analysis was performed accurately and comprehensively.
(1.08 – 1.2)
Technique analysis was performed sufficiently but is not completely accurate or comprehensive.
(0.96 – 1.07)
Technique analysis was performed but needs more clarification on some aspects.
(0.84 – 0.95)
Attempted to perform a technique analysis but key points were missing or superficially presented.
(0.72 – 0.83)
Failed to perform an technique analysis.
(0 – 0.71)
Alternative strategy generation was presented accurately and comprehensively.
(1.08 – 1.2)
Alternative strategy generation was presented sufficiently but could be more comprehensive.
(0.96 – 1.07)
Alternative strategy generation was presented but needs more clarification on some aspects.
(0.84 – 0.95)
Alternative strategy generation was attempted but is presented superficially or key elements were missing.
(0.72 – 0.83)
Failed to present alternative strategy generation.
(0 – 0.71)
Strategy and prioritization selection was accurately and comprehensively.
(1.08 – 1.2)
Strategy and prioritization selection was sufficiently discussed but is not completely accurate or could be more comprehensive.
(0.96 – 1.07)
Strategy and prioritization selection was presented but needs more clarification on some aspects.
(0.84 – 0.95)
Strategy and prioritization selection was attempted but is superficial or key elements were missing.
(0.72 – 0.83)
Failed to discuss strategy and prioritization selection.
(0 – 0.71)
Action plan for implementation was accurately and comprehensively presented.
(0.72 – 0.8)
Action plan for implementation was sufficiently but is not completely accurate or could be more comprehensive.
(0.64 – 0.71)
Action plan for implementation was presented but needs more clarification on some aspects.
(0.56 – 0.63)
Action plan for implementation was attempted but is superficial or key elements were missing.
(0.48 – 0.55)
Failed to discuss action plan for implementation.
(0 – 0.47)
Evaluative plan was accurately and comprehensively presented.
(0.72 – 0.8)
Evaluative plan was sufficiently but is not completely accurate or comprehensive.
(0.64 – 0.71)
Evaluative plan was presented but needs more clarification on some aspects.
(0.56 – 0.63)
Evaluative plan was attempted but is superficial or key elements were missing.
(0.48 – 0.55)
Failed to discuss evaluative plan.
(0 – 0.47)
Comments reflect a highly accomplished level of analysis, synthesis, evaluation and reasoning of the case material and case study facts resulting in accurate, thorough, and soundly reasoned conclusions.
(2.7 -3)
Comments reflect a satisfactory level of analysis, synthesis, evaluation and reasoning of the case material and case study facts resulting in partially correct conclusions that lack development or detail that demonstrates insight into reasoning.
(2.4 – 2.69)
Comments reflect an unsatisfactory level of analysis, synthesis, evaluation and reasoning of the case material and case study facts, resulting in conclusions that are underdeveloped or lack soundly reasoned conclusions.
(2.1 – 2.39)
Comments reflect an unsatisfactory level of analysis, synthesis, evaluation and reasoning of the case material and case study facts, resulting in conclusions that are underdeveloped or lack soundly reasoned conclusions.
(1.8 – 2.09)
Comments reflect an unsatisfactory level of analysis, synthesis, evaluation and reasoning of the case material and case study facts, resulting in failure to draw little to no conclusions.
(0 – 1.7)
Presents exceptionally well-supported arguments or positions with evidence from the readings/experience; ideas go beyond the course material and recognize implications and extensions of the material and concepts.
(2.7 – 3.0)
Presents excellent arguments or positions that are mostly supported by evidence from the readings and course content; ideas presented demonstrate understanding of the material and concepts.
(2.4 – 2.69)
Satisfactory arguments or positions are presented but there is a mix of opinion or unclear view with supported arguments using course readings. Case study facts are occasionally used but arguments would be much stronger with use of facts.
(2.1 – 2.69)
Arguments are frequently illogical and unsubstantiated; Limited use of facts in case study and essential information presented in course readings.
(1.8 – 2.09)
Arguments lack meaningful explanation or support of ideas. Does not provide facts presented in case study.
(0 – 1.79)
Demonstrates exceptional understanding of requirements responding completely to each aspect of assignment including minor aspects of the assignment such as using third person writing, required use of course readings, and assignment format.
(0.9 – 1.0)
Demonstrates excellent understanding of requirements; missed one minor aspect of assignment.
(0.8 – 0.89)
Demonstrates satisfactory understanding of requirements; missed a key element or two minor aspects of assignment.
(0.79 – 0.79)
Fails to show a firm understanding of requirements; missed two key elements or several minor aspects of assignment.
(0.6 – 0.69)
Fails to demonstrate understanding of assignment requirements.
(0 – 0.59)
Strictly adheres to standard usage rules of written English, including but not limited to capitalization, punctuation, run-on sentences, missing or extra words, stylistic errors, spelling and grammatical errors. No errors found. No contractions or jargon used.
(1.8 – 2)
Excellently adheres to standard usage of mechanics: conventions of written English, including capitalization, punctuation, and spelling. One to three errors found.
(1.6 – 1.79)
Satisfactorily adheres to standard usage rules of mechanics: conventions of English, including capitalization, punctuation, and spelling. Four to 10 errors found.
(1.4 – 1.59)
Minimally adheres to standard usage rules of mechanics: conventions of written English, including capitalization, punctuation, and spelling. More than 10 errors found.
(1.2 – 1.39)
Does not adhere to standard usage rules of mechanics: conventions of written English largely incomprehensible; or errors are too plentiful to count.
(0 – 1.19)
No APA style or usage errors; Proper citation of source material is used throughout paper; Reference titles follow APA with only the first word, the first word after a colon and proper nouns capitalized.
(0.9 – 1.0)
Attempts in-text citations and reference list but one or two APA style errors noted or fails to use APA citations when appropriate 1-2 times.
(0.8 – 0.89)
Attempts in-text citations and reference lists; APA style errors are noted throughout document; Fails to use APA citations when appropriate 3 times in document.
(0.7 – 0.79)
Attempts in-text citations and reference lists; Fails to use APA citation when appropriate 4-5 times; or presents only 1-2 in-text citations and reference list in a paper that requires APA citations throughout the document.
(0.6 – 0.69)
No attempt at APA style; or attempts either in-text citations or reference list but omits the other.
you will find the case study in the book. It’s case study 13 (Whole Foods Strives to Be an Ethical Corporate Citizen)
You have the ebook and the university e library from the other assignments. I need you to answer Q2 from the case study please. Just Q2 no need for the others. Please don’t forget that the only references you can use are the book and the e library (lexis nexus).
APA formatting
One inch margins all around
Cover page
An abstract is not required
Introduction not more than ½ page- The introduction is a brief overview.
The last sentence of the introductory paragraph includes a whether statement-the issue.
Level 1 subheading (Centered) Introduction or name of case study.
Conclusion subtitle is centered and includes lessons learned, ties back to the thesis statement, answering the thesis statement. Highlights main points.
Reference page – textbook first, outside journals-at least three that support your work. References mirror the citations in the analysis.
Apply a moral philosophy from the business philosophies named in the textbook…But…
Define the moral philosophy using quoted citations from a journal article.
Apply it to the portion of the case, the person, the culture, the situation, an action and quote that from the case study using a citation.
Then, explain how the philosophy applies to the portion of the case that was cited.
you will be prompted to select passages from the documents to support a position and to write brief analyses. Be thorough in your responses and always answer in complete sentences
Online Lesson Plan on Cultural Diversity to focus on
Cultural Competence in Nursing Practice
Oppression & Aggregate Populations
Religion and Spirituality
The content must address
Culture Diversity Issues
Genetics,Geography,religion,lifestyle,opression,aggregate population, and Nursing care
ONLINE LESSON PLAN WILL NEED TO HAVE THE BELOW REQUIREMENTS BEFORE SUBMISSION
a. Three learning objectives
b. Ten point outline for the content of a slide presentation.
c. Active Learning Exercise to be completed.-group learning- create a case study to help develop critical thinking and team work skill.Case studies represent an in-depth analysis of a real-life situation as a way to illustrate class content. According to Billings and Halstead (2016), case studies apply didactic content and theory to real life, simulated life, or both (p. 255). Case studies stimulate cognitive knowledge, retention and recall, in addition they help to tie the theory of the content into the practical real world. Case studies can also provide problem solving in a safe environment prior to actually having the situation in real life with a patient. So for example a patient comes into the ER with chest pains but does not speak English,speaks Spanish only.This patient is also 7day adventist.
d. Five multiple choice test items with answers and rationales
. There is to be a minimum of two current (2005 or later) peer reviewed journal articles cited.
Billings, D., & Halstead, J. (2016). Teaching in nursing: A guide for faculty(5th ed.). St. Louis, MO: Elsevier.
DeYoung, S. (2015). Teaching strategies for nurse educators(3rd ed.). Boston, MA: Pearson.
Iwasiw, C. L. (2015). Curriculum development in nursing education(3rd ed.). Burlington, MA: Jones & Bartlett Learning.
Overview: This case study will help you analyze a cybersecurity scenario and identify which tenets were violated. Each skill in this paper is an essential part of the final project and the accompanying milestones in this course. Prompt: Use the information provided in the scenario to analyze the cybersecurity occurrence and determine which tenet(s) were violated. The required resources for this module detail a scenario at RSA that is similar to the one you will analyze for this assignment. Review each module resource and analyze the security breach that occurred with RSA. Note similarities between this example and the provided scenario for this assignment. Scenario: In late May of 2011, Lockheed-Martin was targeted by a cyberattack. Lockheed-Martin claimed that they discovered the attack early and reacted quickly, with the result that no real harm was done. The basis for this breach was with two-factor authentication, where a “factor†in authentication can be something you know, something your are, or something you have. A two-factor authentication system requires you to present instances of two of these three to authenticate with a system. Lockheed-Martin employed a two-factor authentication system that combined a password (something you know) with SecurID, a system produced by RSA labs that provides the “something you have†factor. A SecurID is a small key fob that displays a number, which changes every 60 seconds. Each key fob has a unique number called its seed, which determines what number is shown in the fob at any given point in time. The server stores your username, password hash, and the seed value for your key fob, and this allows it to determine what number is showing on your key fob (as the fob is synched with your account). When you authenticate, you enter your username and regular password, then you look at the key fob and enter in the number shown there. The authentication server knows what number should be shown at that time on the key fob, and so can verify that the key fob is indeed a thing you have. This is called a one-time password (OTP) system. In March of 2011, someone attacked RSA with a relatively unsophisticated phishing attack with an attached Excel file with embedded code that exploited a zeroday vulnerability in Adobe Flash. This enabled attackers to set up a “backdoorâ€â€”a way for them to get into the computer—where the attackers were able to steal from RSA the seed values of SecurID key fobs. In late May of 2011, the attack moved to Lockheed-Martin, where attackers managed to get a keylogger onto a company system. The keylogger recorded the username, password, and SecurID OTPs used by the victim when he or she authenticated, along with the date and time of the log in. Two-factor authentication is designed for just this kind of scenario. The attacker cannot authenticate because knowing the username, password, and an old OTP is not enough; the current OTP is required. However, these attackers stole seed values. For a given seed value and date/time, they could calculate the number the key fob with that seed value would display at that date and time. All the attackers had to do was to write a program that would compute, for every stolen seed value, the number that would have been showing at the date and time the keylogger recorded the victim’s login. Once they found a match with the OTP the keylogger recorded, they would have matched a seed value with a username. This appeared as if the attackers actually had the key fobs themselves. Critical Elements Your paper should include these critical elements: ï‚· Identification of cybersecurity tenets that were violated and rationale of cause ï‚· Analysis of cybersecurity occurrence and data defense ï‚· Recommendation of best practices to prevent further recurrence Rubric Guidelines for Submission: Your paper should be submitted as a 2- to 3-page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. All sources must be cited in APA format if used.