Freedom and Self. Define freedom in your own terms

We looked at “Freedom” this week, but as the term ends, it is always a good idea to try to tie together different ideas in order to see the coherency.

While you are writing, please do not use the textbook or any outside materials. You can mention things in the textbook, but you will not have time to look them up. The paper you write is intended to give you the opportunity to express your philosophical viewpoints.

Please take a few minutes to read through the two choices for the first part, to choose one of them, to figure out your views, and to scribble down a skeleton outline for an argumentative essay. You will be trying to prove that your view is the best one.

Make sure you include:

  1. An introductory paragraph with a clear thesis statement,
  2. At least two evidentiary paragraphs, each offering supporting points,
  3. A brief summary of the opposition’s main point and a refutation of it, and
  4. A summarizing conclusion.

After you have answered either Question B in Part 1, go to Part 2 and answer the single question there as well.

PART 1

In a well-developed short essay, address the prompt for the choice below:

Question B

Freedom and Self. Define freedom in your own terms, specifically outlining those aspects of yourself that you consider the basis of your own conception of “acting freely.”

An idea we were left with from the textbook is that people are so largely influenced by both nature and nurture that it is difficult to make any sort of decision which has not already been affected by both internal and external influences; our “self identities” are not a creation of own but largely the product of biology and relationships. But, choosing to “act freely” implies that we are choosing freely, without influences affecting our choices.

Think back to our discussion of the “essential self” in Week 4 as you address the following questions. To what extent does your conception of “acting freely” include playing roles and interacting with other people? To what extent do other people limit your freedom? How can your “essential self” be free choose to “act freely” while living in a world in which you are bound by obligations to various kinds of other people? Under which conditions would you be confident to declare that you had freely chosen a “free act”?

PART 2

In no more than one or two paragraphs, answer the following:

As you reflect on your work and your learning in this class, what has been the most important skill you have mastered, insight you have secured, or knowledge you have gained? With respect to the skill, insight, or knowledge you have identified, why is that thing important to you and in what ways, and to what ends will you be able to use it later on?

Implementation Plan, Marketing Plan Phase 5, business and finance homework help

The Controls section of the marketing plan serves as a guide for evaluating the overall plan. It also helps to ensure that the plan will be implemented and executed properly.

To complete your Controls section, provide 1-3 paragraphs and/or charts, regarding each of the following items:

  • Implementation Plan: This section details how you will turn your plans into results. You will need to provide a list of marketing tactics/actions that must be taken immediately to ensure the overall success of your Marketing Strategies (you completed this section earlier in your plan). For each tactic, describe what has to be performed in order to carry out the tactic. Remember that you implementation tactics are operational tactics. For example, if one of your strategies includes Internet Marketing, then, one of your implementation tactics would involve setting up a website. You would also list the completion date for each tactic. (Charts work really well for Implementation Plans).
  • Marketing Organization: In this section, you will provide details regarding the names, titles, and responsibilities of the people in your marketing department. This section will answer the question, “who will be handling what?”
  • Contingency Plan: This section provides information detailing what you will do if things do not go according to plan. Discuss potential risks and difficulties, then, talk about how you will monitor those potential problems. Finally, define an alternative plan of action in case the “potential problems” that you’ve identified, actually turn into “real problems.”

Strategic Goals The Defense Department planning goals

It is becoming increasingly important for organizations to demonstrate that they are of significant public value. This requires them to have clearly defined short-term and long-term strategic goals. As a current or future leader and manager, it is essential that you are not only able to help your organization develop these goals, but you must also help create strategies for meeting them. In this Discussion, you consider strategies for prioritizing and meeting short-term and long-term goals for the organization that you selected for your Final Project.

Post an explanation of strategies that you might use to define, prioritize, and meet short-term goals (1–4 years) for the organization that you selected for your Final Project. Include how the goals would support flexibility in an ever-evolving world. Then with a futurist context in mind, explain strategies that you might use to define, prioritize, and meet your organization’s long-term goals (15–20 years).

Required Readings

Bryson, J. M. (2018). Strategic planning for public and nonprofit organizations: A guide to strengthening and sustaining organizational achievement (5th ed.). Hoboken, NJ: John Wiley & Sons, Inc.

  • Chapter 9, “Implementing Strategies and Plans Successfully” (pp. 281-319)This chapter provides guidance on successfully implementing strategic plans.

Poister, T. H. (2010). The future of strategic planning in the public sector: Linking strategic management and performance. Public Administration Review, 70(s1), s246–s254.
Note: You will access this article from the Walden Library databases.
This article explores the importance of organizational strategic planning. It also examines future changes that may be necessary for the continued success of the strategic planning process.

Weigand, K., Flanagan, T., Dye, K., & Jones, P. (2014). Collaborative foresight: Complementing long-horizon strategic planning. Technological Forecasting & Social Change, 85, 134–152.
Note: You will access this article from the Walden Library databases.
This article presents a case study that examines the effectiveness of collaborative, long-horizon strategic planning in a government organization.

Wulf, T., Brands, C., & Meissner, P. (2010). A scenario-based approach to strategic planning: Tool description—Scenario matrix. Retrieved from http://www.scenarioplanning.eu/fileadmin/user_uplo…

Optional Resources

Black , G., Kononovas, K., Taylor, J., & Raine, R. (2014). Healthcare planning for the Olympics in London: A qualitative evaluation. Plos ONE, 9(3), 1–6.

Lee, S. F., Lo, K. K., Leung, R. F., & Ko, A. S. O. (2000). Strategy formulation framework for vocational education: Integrating SWOT analysis, balanced scorecard, QFD methodology and MBNQA education criteria. Managerial Auditing Journal, 15(8), 407–423.

Roth, B. N., & Washburn, S. A. (1999). Developing strategy. Journal of Management Consulting, 10(3), 50–54.

Schwartz, J. O. (2007). Competitive intelligence: A field for futurists? Futures Research Quarterly, 23(1), 55–65.

My final Project is on Department of Defense

Com360 participate or identify with many groups Discussion, communications homework help

We all participate or identify with many groups. Sometimes we even participate in several groups at the same time (e.g., members of a family playing basketball with neighbors). Make a list of all the groups you identify with. Consider nationality, ethnicity, geographic region, interests, and hobbies (e.g., U.S., German-American, Californian, surfers, and skiers.) Provide a norm (standard or rule of behavior) for each group. (Remember that a norm is an action, not a value.) Which groups’ norms do you follow most often? Respond to at least two of your fellow students’ postings by Day 7. (You must create one initial post and at least two responses, for a minimum of three posts for this discussion.)

 

 

Chapters 1-3 Actions Steps and let me know if you want anything

Chapters 1-3 Actions Steps

I attached the book

Students are to read Chapters and view ppt’s before completing your Action Steps:

>Students are to complete activities, write notes in your textbook/tablets , please watch videos weekly to prepare for your business plan:

#Chapter 1- In Action Step #2 -question #4 —Action Step #7 complete questions

1 & 2

Action Step #7-Answer Questions #1 & 2. ________________________________________

Virtually try to contact those Entrepreneurs – Write a one page narrative on the above question.

________________________________________________________________________________________________

#Chapter 2- Action Step 11- Answer question #1__________________________________

#Action Step #14-complete question #1

__________________________________________________________________________________________________

#Chapter 3- Action Step 19- complete qustions #1 to 3 ______________________________________________________________________________________________

#Action Step -20 – complete questions 1- 5

ISSC452 discussion response

Hello,

I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.

1. What do confidentiality, integrity and availability have to do with security?

2. Security experts agree that average home computer users have very little knowledge regarding how to make their computers secure. How can this deficiency be addressed?


Student one:

1. What do confidentiality, integrity and availability have to do with security?

The CIA triad of confidentiality, integrity and availability are the pillars on which cyber security is built. Confidentiality keeps the information secured and inaccessible to those without authorization to see it. Using permissions and user access protocols as well as encryption helps maintain confidentiality. Ensuring good security habits, strong passwords and proper handling of data fall into this category. Integrity ensures that the data being received or viewed is accurate and unchanged by any unauthorized persons. This also applies to the integrity of systems and programs, ensuring that they are functioning as intended without unauthorized modifications. This includes data in transit, ensuring that the data arrives is the same as the data that was sent. This means using permissions that allow viewing but not the ability to modify the data, encrypting data during transmission and using checksums to ensure its integrity. Availability ensures that the resources are ready for use regardless of circumstances to include emergencies. This can mean mitigating ransomware or DOS attacks or the loss of data from natural disasters. This means keeping the network bandwidth open, having a well-articulated and implemented back up plan as well as a rehearsed recovery plan.

2. Security experts agree that average home computer users have very little knowledge regarding how to make their computers secure. How can this deficiency be addressed?

Unfortunately, this is a difficult problem to address. People only pay attention to their security when there is a problem. Also, when it comes down to a competition between security and convenience, convenience always wins. The best way to increase base knowledge of computer security is to start teaching it earlier in elementary and high school education. Schools have to start implementing a curriculum that is less about standardized tests and more about giving students the basic tools they need to succeed as adults and move forward in college or a trade. Given the ubiquitous nature of technology in society, learning how to protect themselves and their systems is one of those fundamental needs. This can help translate into better employees that understand cyber security in their personal lives and therefore can implement good habits in the work place.

-Pat

Student two:

What do confidentiality, integrity, and availability have to do with security?

The CIA triad (confidentiality, integrity, and availability) have much to do with security, especially cyber security. An article in Forbes put it this way, “CIA stands for the triad of values that security analysts, CISOs, and everyone in between are responsible for upholding: Confidentiality, Integrity, and Availability” (Cauthorn, 2019).

Each piece of the CIA triad is crucial to building a solid foundation in security for any network or business system. Confidentiality means that information is protected against unauthorized access by anyone who isn’t supposed to see it, including other employees. Integrity means protecting information from being altered by anyone who isn’t supposed to alter it. Keeping the integrity of a company’s information is critical to the success of any business. Availability means that the information is available to those who are authorized to access it. This includes any apps that are intended for use by employees or clients, sensitive information accessible by authorized personnel, and other information such as inventory levels.

Security experts agree that average home computer users have very little knowledge regarding how to make their computers secure. How can this deficiency be addressed?

Education is by far the best way. Mandatory updates and patches, such as what Microsoft has implemented with Windows 10 is a close second. If people aren’t aware of the threats that can target their computer, then they won’t do anything to fix it. Many people, at least those that I’ve talked to in my 20+ years of computer work, tend to think that cybercriminals don’t target individual people because there isn’t enough to steal. It’s appalling just how many clients I’ve assisted don’t even have basic anti-virus software on their home computers. Many of them install some sort of anti-malware solution once I’ve had to recover their computer from a virus or other form of malware. My personal philosophy is that if I can educate my clients to better security practices they will be more secure and have a better understanding of the threats that exist.

Works Cited

Cauthorn, M. “CIA”: Understand The Cybersecurity Triad in 5 Minutes or Less. Forbes. May 7, 2019. Accessed July 2, 2019.

-Bryan

refer what are the requirements section

  1. Drawn from chapter 2 of the CompTIA Cloud+ Study Guide (Montgomery, 2016).Cloud Delivery ModelsIn this section we will take a look at the various models used to deliver cloud services. As you’ll see, the cloud computing market is rapidly evolving, and undoubtedly new models will develop over time. Also, as you’ve seen with service models earlier, it can be common to find combinations of various models offered to the market.PrivateThe private cloud model is for the use by a single organization, but may be used by many units of a company. It can be wholly owned by the organization, a third-party provider, or a combination. It can also be hosted either on-site or off-premise at a hosting facility and is usually identified as using dedicated hardware rather than a shared hardware design.PublicA public delivery model is infrastructure designed for use by the public consumers. Public clouds can be offered by private corporations, government organizations, and academia. A public delivery model hosts the service on the premise of the organization providing the service and uses shared hardware.HybridThe hybrid delivery model is a combination of two or more delivery models such as private, community, or private. Examples of a hybrid model include cloud bursting to handle peak processing loads or balancing the load between delivery models.CommunityCommunity clouds are designed for a specific community of interest and shared by companies with similar requirements for regulatory compliance, security, or policy. Community clouds can be owned and operated by a group of companies, a specialized cloud provider, or other interested parties. They can exist on or off a company’s datacenter or hosting facility.On-Premise vs. Off-Premise HostingOn-premise hosting describes creating and managing your own cloud service in-house in a private enterprise datacenter. This type of approach can be found in large enterprise environments where control of the operations and data is required to remain in corporate datacenters.Off-premise is a hosting service that is located remotely from a company’s datacenter and is usually in a cloud service company’s datacenter.Security Differences between ModelsIt is very important to take security into consideration when selecting a service model. Issues such as data confidentiality, integrity, regulatory issues, and availability must be understood and implemented.The cloud providers offer many different levels of security and services to protect information. Cloud providers can protect against security breaches, but many factors must be taken into consideration. These factors include revision level, patching of operating systems and applications, intrusion detection and prevention systems, firewall rules, and policies. Ultimately it is the owner of the data who is responsible for security.Functionality and Performance Validation Based on Chosen Delivery ModelValidation is the process of testing and verifying that your cloud deployment is operating and performing as expected. The validation and testing required will follow how your cloud is architected, with close attention paid to who is responsible for what aspects of the service and if the service level agreements are being met. We will explore this topic in later chapters.Software as a service provider may offer a single application that is shared by many customers. For example, many customers may access a single database application hosted in the cloud but only have access to their own area of the shared database application. With this multi-tenancy approach, application testing must validate that each individual customer does not have the ability to change or configure the application in any way that would affect the other customers sharing the application. Further validation should determine the maximum number of concurrent users based on hosts resources, licensing, and performance criteria.Since cloud computing is a shared resource, the cloud provider must test and validate that each cloud consumer has data segregation from other cloud consumers and the data is protected from unauthorized access. In later sections, you will learn how to segment and protect data in the SAN network fabric, the storage controllers, and using various access security mechanisms. Each cloud consumer should be provided exclusive access to their data stored in the cloud and the data should be segmented and separated between customers.Cloud service providers may offer many types of service variations with each of their offerings. IaaS, PaaS, and SaaS offerings as well as the many other types of services may be offered in a shared network or in a private and network isolation for your own exclusive.ReferencesMontgomery, T. (2016). CompTIA cloud study guide: Exam CV0-001. Indianapolis, IN: John Wiley & Sons. ISBN 978-1119243229

    Prompt

    For this assignment, use an online library such as EBSCOhost, ProQuest, or Google Scholar to research public, private and hybrid cloud service models, as well as cloud virtualization services used in business today. In a 3 page APA-formatted paper, address the following three components from a business perspective: What are some of the benefits to using cloud services? What are some of the drawbacks or challenges a business might face in using a cloud service? How can a company leverage virtualization services in the cloud?

  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Case Analysis: Fast Food Feast, management homework help

Fast-food restaurants have evolved over time. Today, most fast-food restaurants provide an assortment of “healthy” options, in addition to traditional favorites such as hamburgers and french fries. Although fast-food franchises are widespread and very popular, they can have significant differences in processes. How these processes are managed may have an impact on your fast-food restaurant preferences. Instead of considering fast-food restaurants from the consumer’s perspective, this assignment asks you to consider fast-food restaurants from the production manager’s viewpoint.

Compare at least two different fast-food restaurants. Observe the basic operational differences between these stores. Identify differences in the following processes:

1. How are in-store orders taken?
2. Are the products prepared to order, or are they prepared ahead of time and delivered from a storage bin?
3. How are special orders handled?
4. How are sandwiches assembled?
5. Is a microwave oven used in the process?
6. How are other common items, such as french fries and drinks, handled?

Your submission for this case analysis should be 2-3 pages in length (excluding the title and references pages). Be sure to use appropriate line spaces between each question, so that your work is organized and easy to follow. Your assignment should follow APA guidelines by including a title page, Times New Roman, 12-font and double spaced. Be sure to use APA-style citation, when citing sources to support your claims.

answer the following tasks

Entry 1 (11/12):

– Watch I am Not Your Negro on Kanopy if you have account on Kanopy
– Take notes on the film (at least 5 bullet points)

Entry 2 (11/14):

– Watch Black Panthers: Vanguards of the Revolution on Kanopy
– Take notes on the film (at least 7 bullet points)

Entry 3 (11/19):

– Watch clips from OJ Simpson: Made in America
– Take notes on the film for our debate about whether the LA Riots were a “riot, rebellion, or uprising”

Entry 4 (11/21):

– Write out 5 points you can make to support your position in the debate about the clip of OJ Simpson: Made in America

Clinical Challenge Skin Hair and Nail Assessment

The question is on the attached file. Please take a look of this rubric

Your assignment will be graded based on this rubric.

Rubric
Clinical Challenge Skin Hair and Nail Assessment

24 possible points

Excellent

4 points

Good

3 points

Satisfactory

2 points

Deficient

1 point

Not present

0 points

Explanation of issues

–/4 points

Issue/problem to be considered critically is stated clearly and described comprehensively, delivering all relevant information necessary for full understanding.

Issue/problem to be considered critically is stated, described, and clarified so that understanding is not seriously impeded by omissions.

Issue/problem to be considered critically is stated but description leaves some terms undefined, ambiguities unexplored, boundaries undetermined, and/or backgrounds unknown.

Issue/problem to be considered critically is stated without clarification or description.

Absent presentation of the Issue/problem

Evidence

–/4 points

Selecting and using information to investigate a point of view or conclusion

Information is taken from source(s) with enough interpretation/evaluation to develop a comprehensive analysis or synthesis.

Viewpoints of experts are questioned thoroughly.

Information is taken from source(s) with enough interpretation/evaluation to develop a coherent analysis or synthesis.

Viewpoints of experts are subject to questioning.

Information is taken from source(s) with some interpretation/evaluation, but not enough to develop a coherent analysis or synthesis.

Viewpoints of experts are taken as mostly fact, with little questioning.

Information is taken from source(s) without any interpretation/evaluation.

Viewpoints of experts are taken as fact, without question.

No information nor source(s) is presented

Influence of context and assumptions

–/4 points

Thoroughly (systematically and methodically) analyzes own and others’ assumptions and carefully evaluates the relevance of contexts when presenting a position.

Identifies own and others’ assumptions and several relevant contexts when presenting a position.

Questions some assumptions. Identifies several relevant contexts when presenting a position. May be more aware of others’ assumptions than one’s own (or vice versa).

Shows an emerging awareness of present assumptions (sometimes labels assertions as assumptions). Begins to identify some contexts when presenting a position.

No awareness nor assumptions presented

Student’s position (perspective, thesis/hypothesis)

–/4 points

Specific position (perspective, thesis/hypothesis) is imaginative, taking into account the complexities of an issue.

Limits of position (perspective, thesis/hypothesis) are acknowledged.

Others’ points of view are synthesized within position (perspective, thesis/hypothesis).

Specific position (perspective, thesis/hypothesis) takes into account the complexities of an issue.

Others’ points of view are acknowledged within position (perspective, thesis/hypothesis).

Specific position (perspective, thesis/hypothesis) acknowledges different sides of an issue.

Specific position (perspective, thesis/hypothesis) is stated, but is simplistic and obvious.

No positions stated

Conclusions and related outcomes (implications and consequences)

–/4 points

Conclusions and related outcomes (consequences and implications) are logical and reflect student’s informed evaluation and ability to place evidence and perspectives discussed in priority order.

Conclusion is logically tied to a range of information, including opposing viewpoints; related outcomes (consequences and implications) are identified clearly.

Conclusion is logically tied to information (because information is chosen to fit the desired conclusion); some related outcomes (consequences and implications) are identified clearly.

Conclusion is inconsistently tied to some of the information discussed; related outcomes (consequences and implications) are oversimplified.

Lack conclusion

References

–/4 points

The student cites authors of recent references (5 years or less of published) related to the topic of the discussion forum, written according to the latest edition of APA.

Sometimes the student cites authors of recent references (5 years or less of published) related to the topic of the discussion forum, written according to the latest edition of APA.

On rare occasions the student cites authors of recent references (5 years or less of published) related to the topic of the discussion forum, written according to the latest edition of APA.

The student never cites authors of recent references (5 years or less of published) related to the topic of the discussion forum, written according to the latest edition of APA.

No references included