Adobe Illustrator – EMOJI

Create a new EMOJI that effectively symbolizes an important icon, trend, or event.

OBJECTIVES

• The vector document follows le conventions

• The EMOJI is created ONLY using shapes (no strokes!)

• The EMOJI is grouped and centered to the artboard

• Utilize Path nder Operations or Shape Modes within the symbols

Path nders/ Shape modes allow you to edit drawn shapes into more complex and interesting compositions. Use these tools to merge overlapping shapes together, pull apart overlapping shapes where their paths intersect, and create/edit compound forms.

  • Gradients are used in the le
  • A second variant EMOJI is created using all tools
  • The le follows proper naming/ le type conventions

2-page paper in APA style

Instructions

Consider your experiences at work, school, and in your personal life. You have, at some point, been asked to work with a group to achieve a particular goal. It might have been a group research project, a new marketing plan, a learning plan, a schedule to roll out new technology, planning a wedding, or even planning and creating a large family meal. In many collaborative efforts like these, there are disagreements. Select one collaborative experience from your past that involved some disagreements or significant differences of opinion.

Write a short (2-page) paper in APA style discussing the following elements:

  1. Describe the project that you were working on, including the people involved.
  2. Explain the problem that you encountered with the group. How was that problem overcome? What was the end result of encountering and dealing with that problem?
  3. What do you think was the cause of the problem? How much of the problem came from miscommunication, either from you or from other people involved? What did you do to help resolve the problem?
  4. If you were able to relive that experience, how would you change the way that you approached the encountered problem? How would you communicate differently?
  5. How, ultimately, was the conflict resolved?

Grading Rubric

F

F

C

B

A

0

1

2

3

4

Not Submitted

No Pass

Competence

Proficiency

Mastery

Not Submitted

Example used is not appropriate for the assignment.

Example given has some relevance to the ideas of collaborative communication and problem solving.

Example selected is generally relevant to the ideas of collaborative communication and problem solving.

Example selected is clearly relevant to the ideas of collaborative communication and problem solving

Not Submitted

Problem encountered is not clearly explained or defined. Solution reached in the situation is unclearly or incompletely described.

Problem encountered is included, but incompletely described or explained. Solution reached is described, but with little detail or explanation.

Problem encountered is described well over all with some minor omissions or confusion. Solution reached is clearly explained with some detail.

Problem encountered is clearly described and fully explained. Solution reached is defined clearly with significant detail.

Not Submitted

New approach to this situation not included or not significantly different from the original experience.

New approach to the situation is different from the original experience but lacks clear definition or detail to fully explain these changes.

New approach to the situation offers significant changes from the original experience in definable ways, with some detail to explain potential differences.

New approach to the situation offers significant changes from the original experience in definable ways, with some detail to explain potential differences as well as a clear discussion of how this should change the experienced results.

Not Submitted

Personal contribution to the solution not included or no real contribution to the solution of the issue suggested. Resolution of issue not included.

Personal contribution to the solution is presented with very little detail or explanation. Resolution of issue included but with few details.

Contribution to the solution of the problem is clearly included with some detail and clear explanation. Resolution of issue is included with some detail.

Contribution to the solution of the problem is clearly included with detail, explanation, and insight into the value of this contribution. Resolution of issue is included with clear detail and explanation.

Not Submitted

Frequent use of improper language, slang, or non-professional language.

Language is generally appropriate for professional context with several lapses into informality or slang.

Language shows use of formal professional English throughout with only minor lapses of informality and slang.

Language shows proper formal professional English with no lapses of informality or slang.

Compare / Contrast the ENISA and Commonwealth Approaches

Scenario: Your company has assigned you to serve as an industry subject matter expert and advisor for a cyber policy competition team for a local university. This year, the team will be competing in an international Cyber Policy competition in Washington, DC. The policy question for this year’s competition is: what is the best approach for developing a national cybersecurity strategy? The competition will have one U.S. team and nine additional teams from Europe (4 teams) and the Commonwealth nations (5 teams). The university students have asked you to help them understand the problem space and the likely approaches that competing teams will take. To accomplish this goal, you have decided to prepare a white paper in which you compare the European Union Agency for Network and Information Security (ENISA) guidance document for cybersecurity strategies to a similar document prepared by the Commonwealth Telecommunications Organization (CTO). ENISA provides cybersecurity guidance for member states of the European Union (http://europa.eu/index_en.htm ). CTO provides cybersecurity guidance for members of the Commonwealth of Nations (http://www.commonwealthofnations.org/). Your starting point for your analysis will be outlines of the two documents (Table 1 and Table 2) which were provided to the teams by the competition’s organizers. Research: 1. Review the document outlines provided in Tables 1 and 2 (at the end of this document). 2. Download and review the full documents a. CTO: http://www.cto.int/media/fo-th/cyb-sec/Commonwealth%20Approach%20for%20National%20Cybersecurity%20Strategies.pdf b. ENISA: https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/national-cyber-security-strategies-an-implementation-guide/at_download/fullReport 3. Develop five or more points which are common across the two documents. (Similarities) 4. Identify and review at least three unique items in each document. (Differences) 5. Research three or more national cybersecurity strategies from EU or Commonwealth nations which were written in or available in English (see the list in Appendix 1 of the CTO document). How comprehensive are these documents when compared to either the ENISA or the CTO guidance? From these documents and the ENISA / CTO guidelines, develop an answer to the question: Why should every nation have a cybersecurity strategy? Write: Write a five (5) to eight (8) page white paper in which you summarize your research and discuss the similarities and differences between the two guidance documents. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your white paper must include the following: 1. An introduction or overview of national cybersecurity strategies. Explain the purpose of a national cybersecurity strategy and how it is used. Answer the question: why should every nation have a cybersecurity strategy? (Make sure that you address the importance of such strategies to small, resource-poor nations as well as to wealthy, developed nations.) 2. A separate section in which you discuss the common principles and guidelines (similarities) found in both guidance documents (ENISA & CTO). 3. A separate section in which you discuss the unique aspects of the CTO principles and guidelines for national cybersecurity strategies. 4. A separate section in which you discuss the unique aspects of the ENISA principles and guidelines for national cybersecurity strategies. 5. A section in which you present your recommendations to the competition team as to the approach (next steps) they should take in further refining their answer to the competition question: what is the best approach for developing a national cybersecurity strategy? 6. A separate section in which you summarize your research and recommendations. Submit For Grading Submit your white paper in MS Word format (.docx or .doc file) using the OPEN Data Assignment in your assignment folder. (Attach the file.) Additional Information 1. Your white paper should use standard terms and definitions for cybersecurity concepts. The following sources are recommended: a. ISACA Glossary http://www.isaca.org/pages/glossary.aspx b. Guidelines on Security and Privacy in Public Cloud Computing http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf c. Glossary sections in the two guidance documents (ENISA & CTO) 2. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university’s Academic Integrity policy. 3. Use APA 6th edition style (formatting) for the organization and appearance of the MS Word document that you submit to your assignment folder. This includes margins, section headings, and consistent use of fonts (Times New Roman 12 in black), paragraph styles (first line indent by ½ inch), and line spacing (double). Formatting requirements and examples are found under Course Resources > APA Resources. Your file should contain both a title page and a separate References page. Use page breaks to ensure that the title page and references page are separate from the body of the paper. 4. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. Table 1. Outline for Commonwealth Approach for Developing National Cybersecurity Strategies (Commonwealth Telecommunications Organisation, 2015). 3 CREATING AND USING A NATIONAL CYBERSECURITY STRATEGY 3.1 Development of the Strategy 3.1.1 An approach to design of the strategy: risk-based and outcome-focused 3.1.2 The use of a maturity model 3.1.3 Key performance indicators 3.1.4 Resources and market forces 3.1.5 Communicating its concepts and ideas 3.2 Delivering the Strategy 3.3 Reviewing the Strategy 4 KEY ELEMENTS OF A CYBERSECURITY STRATEGY 4.1 Introduction and background section 4.2 Guiding principles section 4.3 Vision and strategic goals section 4.4 Objectives and priorities section – using a risk-based approach 4.5 Stakeholder section 4.6 Governance and management structure 4.7 Strategy implementation section 4.7.1 Legal and regulatory framework 4.7.2 Capacity Building 4.7.3 Awareness 4.7.4 Local technical capability 4.7.5 Incident response 4.8 Monitoring and evaluation   Table 2. Outline for National Cyber Security Strategies: Practical Guide on Development and Execution (European Network and Information Security Agency, 2012). 2 National cyber security strategy lifecycle 3 Develop and execute the national cyber-security strategy 3.1 Set the vision, scope, objectives and priorities 3.2 Follow a national risk assessment approach 3.3 Take stock of existing policies, regulations and capabilities 3.4 Develop a clear governance structure 3.5 Identify and engage stakeholders 3.6 Establish trusted information-sharing mechanisms 3.7 Develop national cyber contingency plans 3.8 Organise cyber security exercises 3.9 Establish baseline security requirements 3.10 Establish incident reporting mechanisms 3.11 User awareness 3.12 Foster R&D 3.13 Strengthen training and educational programmes 3.14 Establish an incident response capability 3.15 Address cyber crime 3.16 Engage in international cooperation 3.17 Establish a public–private partnership 3.18 Balance security with privacy 4 Evaluate and adjust the national cyber-security strategy 4.1 Evaluation approach 4.2 Key performance indicators References: Commonwealth Telecommunications Organisation. (2015). Commonwealth approach for developing national cybersecurity strategies. London, UK: Author. Retrieved from http://www.cto.int/media/fo-th/cyb-sec/Commonwealth%20Approach%20for%20National%20Cybersecurity%20Strategies.pdf European Network and Information Security Agency. (2012). National cyber security strategies: Practical guide on development and execution. Heraklion, Crete, Greece: Author. Retrieved from https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/national-cyber-security-strategies-an-implementation-guide/at_download/fullReport

Sentencing Proposal, law homework help

This is a multi-step proposal/argument that requires BOTH a 1,050 word proposal AND a 5 to 10 slide powerpoint. Please include BOTH for payment. You must ALSO USE THE ATTACHED DOCUMENT as a guide. Please clarify any questions you may have before submitting the 2 final documents to me. There should be TWO documents… one should be the Proposal and the other should be a PowerPoint.

Resource: University of Phoenix Material: Ruling on State v. Stu Dents

Write a 1,050- to 1,400-word proposal that includes two different sentencing arguments formulated by your team.

Include the desired outcome of each punishment.

Include both alternative and intermediate sanctions.

Include a 5- to 10-slide Microsoft® PowerPoint® presentation with your proposal.

Format your paper and presentation consistent with APA guidelines.

Complete 5 page Humanities Essay (JACKSON)

Research Paper Guidelines

Humanities 1101

Each student will write a 5-7 pages paper using MLA format about a topic as it relates to Humanities. The topic suggestions are listed below. If you choose to do another topic, it must be approved.

The first step is to choose a topic and write a prospectus and submit a bibliography.

A prospectus is one paragraph which identifies your topic, the thesis statement, and why you chose this particular topic. The bibliography is a list of 10 sources you plan to use once you begin to write y our paper. You can only have one website. All other sources must be books, journals, newspapers, movies, magazines, etc. The bibliography must be done by MLA format.

Information regarding MLA format will be included in this folder. Please adhere to the rules regarding the format as it relates to MLA format.

Topics-These are general topics. Your job is to choose a topic and narrow the topic to a thesis statement which should include two to three supporting details which becomes your research.

1. Perspective Pathways to Greater Human Flourishing

2. Artists in Times of War

3. Contemporary Music and Political Commentary

4. The Application of Socrates to 21st Century Western Democracy

5. Appalachian Language and Regional Identity

6. The Harlem Renaissance in the African American Experience

7. The Humanities and Definitions of Freedom

8. The Age of Enlightenment

9. The Reformation in Art

10. American Distress and Contemporary Art

11. Theology and Medicine

12. Social Darwinism

13. Historical Tension Between Science and Religion

14. Human Subcultures

15. Gender and the Education Experience

16. Color and the Education Experience

17. The Industrial Revolution and Human Identity

18. Photography in Shaping Public Opinion

19. Social Media and Modern Human Interactions

20. The Printing Press and Dissemination of Ideas

21. Racism and the Human Family Unit

22. Human Beings and Violence

23. Human and Animal Sacrifice in Religion

24. The Odyssey and Gender Expectations

25. Non-governmental organizations (NGO) in international law

26. Regulatory process and public input

27. Religious Freedom Restoration Act

28. Racketeer Influenced and Corrupt Organizations (RICO) Act

29. Roberts Court

30. Sales tax on internet purchases

31. Second Amendment

32. Social media and freedom of speech

33. Sovereign citizen movement

34. Supreme Court, power of

35. Language revitalization

36. Oral history

37. Regional languages

38. Slang

39. Southern dialect

40. Whistled languages

41. Afrofuturism

memo to cio

attached memo to bio…1 to 2 pages

Assignment

Your instructor has assigned each group one of several types of enterprise systems (ERP, SCM, CRM, etc.) to research and prepare a paper and an executive-level informational presentation. In Group Project 1, your team prepared a 2-3 page paper summarizing the case studies, evaluating the success of the implementations, and identifying lessons learned. For this assignment, you are to work independently and write a 1-2 page memo (not including references page) to the CIO that identifies more than seven success criteria for implementation of enterprise systems, for the category of enterprise systems assigned to your group (ERP, SCM, CRM, etc.). (NOTE: More than seven success criteria are required to receive all possible points; see Grading Rubric below.)

Case Conceptualization #3 – Advanced Youth Counseling

Using resources from your text, ch 19 and ch 20 . Complete a case conceptualization (no more than 2 pages) for Andrew (below) and submit it to drop box.

  1. (Brandell, Social Work Theory and Practice, 1997) Andrew, 11 years old, African American male, he is the oldest of 4 (9 year old sister, 7 year old brother, 3 year old brother and a 6 month old baby brother) came from a physically and verbally abusive home. Shortly after the beginning of the school year in October the school was alerted that Andrew was missing 3 out of the 5 weekdays every week. With this information they identified Andrew as “at risk” for failing and truancy. Social Skill deficits were also noted during lunch and recess Andrew sat alone and didn’t interact with the other kids even when asked. Through interviews with Andrew and his parents, therapy was recommended. His parents agreed and were working with another counselor at the same time as Andrew. He lived in an area of the city with a low Socioeconomic Status and Social Services involvement was not uncommon. In time Andrew was able to tell his therapist stories of the abuse, though he did not trust that his exposure of his parent would not cause his loss of them. He was very fearful that the would become a foster child and be separated from his parents and siblings. His siblings came up a lot in treatment and he seemed to be constantly worried about them ……

Therapist worked with Andrew to build rapport and develop some level of trust. The therapist made no promises that he would remain at home with his parents but attempted to give him hope that since they were trying (in treatment themselves) the chances were better that they would remain in the same home. Somewhat later in the heart of treatment, Andrew seemed to close down and become removed from the therapist.

Present a comprehensive case conceptualization for Andrew by answering the following questions:

What do you need to know more about regarding his case?

What are the significant details you already know?

What are two interventions you would use with this client and why?

How would you tell the client that you have to report his case and breach confidentiality? How would you build back rapport after?

Include answers to ALL parts. APA formatting. Times new Roman, double spacing, 12 point. Reference the book which I will send the info to. This is for a Clinical Mental Health Counseling graduate course studying to be a counselor/therapist in the US (DIFFERENT from a psychiatrist or psychologist) so please write with that perspective in mind.

Sources

https://www.dhs.pa.gov/KeepKidsSafe/Pages/Report-A…

Financial Statement, accounting homework help

This signature assignment is designed to align with specific program student learning outcome(s) in your program. Program Student Learning Outcomes are broad statements that describe what students should know and be able to do upon completion of their degree. The signature assignments may be graded with an automated rubric that allows the University to collect data that can be aggregated across a location or college/school and used for program improvements.

Assignment Steps

Resources: Generally Accepted Accounting Principles (GAAP), U.S. Securities and Exchange Committee (SEC)

Tutorial help on Excel® and Word functions can be found on the Microsoft® Office website. There are also additional tutorials via the web offering support for Office products.

Scenario: You are a loan officer for White Sands Bank of Taos. Paul Jason, president of P. Jason Corporation, has just left your office. He is interested in an 8-year loan to expand the company’s operations. The borrowed funds would be used to purchase new equipment. As evidence of the company’s debt-worthiness, Jason provided you with the following facts:

2017 2016
Current Ratio 3.1 2.1
Asset Turnover 2.8 2.2
Net Income Up 32% Down 8%
Earnings per Share $3.30 $2.50

Jason is a very insistent (some would say pushy) man. When you told him you would need additional information before making your decision, he acted offended and said, “What more could you possibly want to know?” You responded you would , at minimum, need complete, audited financial statements.

Develop a minimum 700-word examination of the financial statements and include the following:

  • Explain why you would want the financial statements to be audited.
  • Discuss the implications of the ratios provided for the lending decision you are to make. That is, does the information paint a favorable picture? Are these ratios relevant to the decision? State why or why not.
  • Evaluate trends in the performance of P. Jason Corporation. Identify each performance measure as favorable or unfavorable and explain the significance of each.
  • List three other ratios you would want to calculate for P. Jason Corporation, and in your own words explain in detail why you would use each.
  • As the loan officer, what else would you do to gain a better understanding of Paul Jason’s, and the Corporation’s financial picture and why?
  • Based on your analysis of P. Jason Corporation, will you recommend approval for the requested loan? Provide specific details to support your decision.

Format the assignment consistent with APA guidelines.

news reflection that can relate to physiology , read and reflect

  • Note that you must also submit your news article electronically along with your paper and that your news article must have been published RECENTLY (from August 2018 to present). If you do not have an electronic copy of your news article, then turn in a paper copy in class.
  • Before working on your paper, I recommend that you show your news article to me for approval (via email works fine) to verify that you are using the right kind of article for this assignment.
  • Although the homework assignments and the NRP overlap to some extent, there are some important differences:
    • In the NRP, you must find your own news article.
    • You should also pay careful attention to the clarity and structure of your writing in the NRP, as it is a more formal writing assignment than the homework.
  • If you have any questions about this assignment, let me know.

PLEASE also look at the guide line in the pdf

Write a summary including the following details concerning the article that is a

Article- Bribes Without Jail Time – Wal-Mart 1.docx

* In a minimum of 5 paragraphs write a summary in your words
of the entire article. In 3 paragraphs state your opinion concerning whether
the law, regulation or legal theory should even apply to business versus
whether the nature of the free market provides sufficient means to encourage
the business to conduct itself legally or ethically.

* Newspaper’s name, the article’s headline, the date of
publication, and a link to the article (which I have provided the article.)

* Identify the company that violated or is alleged to have
violated a specific law, regulation or legal theory.

*Identify the nature of the company’s business as described
in the article (Use: “Wal-Mart is the world’s largest retailer”)

*Identify by name or describe the law, regulation or legal
theory the company violated or is alleged to have violated.

* Identify the consequences imposed on the company for
violation of the law, regulation or legal theory or the consequences that could
be imposed on the company in the event it is found responsible for violating
the law, regulation or legal theory.

* Identify the public policy objective the law, regulation
or legal theory is designed to achieve.

* Please site all sources