best self

I am supposed to collect the information asked below from 20 people (make stuff up but be realistic, simple and try to be consistent) these don’t need to be long, 2-3 sentences maybe for each.

Pretend to collect the info from family members (parents, one sister and one brother), friends (no more than 10), colleagues at work (no more than 5), neighbors (no more than 2) customers or anyone who interacts with you.

Ask that they provide you with one story or incidents that respond to the following statement: when I have seen you at your very best, here are the unique strengths you have displayed. Ask these people to write one description that recount at time when they saw you performing at your best, and then describe the contribution you made.

when you write them use title i.e. mom, dad or friend

Deliverable 3 – Editing and Formatting Microsoft Word Documents

Competency

Evaluate consequence-based moral theories.

Instructions

Creating the perfect boss
Your company, Ye Old Paper Mill, recently experienced some organizational chart changes, mostly related to management positions. After posting low profits and even lower employment satisfaction scores, the CEO decided it was time for a change. The CEO, who prefers consequentialist views when it comes to ethical decisions, approached you, along with the rest of the human resources department, and tasked the team with weighing consequentialist ethical theories and selecting which theory would be best for potential managers. For this assessment, you will draft a proposal that addresses the following questions:

  • What are key features of consequentialist theories?
  • What are the differences between the consequentialist theories?
  • How does happiness and pleasure factor in to these theories? Remember employee satisfaction is at an all-time low.
  • What are the pros and cons of each view for the company if the majority of its employees would follow one of the particular theories?
  • Would it be possible for a manager, who follows a different ethical perspective, to effectively manage subordinates who follow a particular consequentialist theory?
  • Select and defend which consequentialist theory for management would be best for the company.

Your properly formatted proposal will need to include the following sections:
Introduction: Explain why you are sending this proposal. Provide an overview of the issue and discuss the task from the CEO.

  1. Address the questions listed above with applicable support and research
  2. Conclusion: In this part, you will wrap up the proposal and select and defend which consequentialist theory for management would be best for the company.
  3. Proper Proposal Formatting: This a professional document and needs to be structured as a proposal and not as an essay. You will still need to supply both in text and full citations for the sources of your information. If you need further assistance with how to structure a proposal, click on this link.

Grading Rubric

0 0 80 90 100
No Pass No Pass Competence Proficiency Mastery
Not Submitted An inadequate or inappropriate identification of the key features of consequentialist theories and differentiation between the theories. Identifies the key features of consequentialist theories and provides differentiation between the theories with basic supporting evidence. Identifies the key features of consequentialist theories and provides differentiation between the theories with supporting evidence. Identifies the key features of consequentialist theories and provides thorough differentiation between the theories with strong supporting evidence.
Not Submitted An inadequate or inappropriate explanation of how happiness and pleasure factor in to these theories Explains how happiness and pleasure factor in to these theories with some supporting information Explains how happiness and pleasure factor in to these theories with strong supporting information. Explains how happiness and pleasure factor in to these theories with well-integrated, strong supporting information.
Not Submitted An inadequate or inappropriate assessment of the pros and cons of each view for the company if the majority of its employees would follow one of the particular theories. Assessment of the pros and cons of each view for the company if the majority of its employees would follow one of the particular theories, minor issues present. Developed assessment of the pros and cons of each view for the company if the majority of its employees would follow one of the particular theories. Thorough and detailed assessment of the pros and cons of each view for the company if the majority of its employees would follow one of the particular theories.
Not Submitted An inadequate or inappropriate selection and defense of which consequentialist theory for management would be best for the company. Selects and defends which consequentialist theory for management would be best for the company with basic supporting evidence. Selects and defends which consequentialist theory for management would be best for the company with supporting evidence. Selects and defends which consequentialist theory for management would be best for the company with strong supporting evidence.
Not Submitted Document attempts to utilize proposal formatting, but with major errors. Missing parts of the required pieces. Document uses proposal formatting, but has items out of order, inconsistent professional tone, or pieces missing. Document utilizes proposal formatting, with a few errors or pieces missing. Professional in tone. All elements of a properly structured proposal are present: Professional in tone.

Translating a short writing into french

Utilisez un (1) infinitif +à et un (1) infinitif + de. Utilisez le pronom Y (une fois) et le pronom EN (une fois).


Social network is very common these days (nowadays). With
facebook as the avant garde in 2004. The use of social network is now for
everyday use, we’re always on our phones, laptops and tablets browsing on
Social media. We use social network to connect to our friends, our family and
loved one, to update news all around the world. However, come along with goods,
there are some bad. Some people use social network to spread misleading
information, negative information. These information could be harmful if we do
not know how to filter it. Also there’s a chance of having your personal
information/ data be stolen by these social network. Therefore, use it with
care. The choice is yours to make. But be aware!

ISSC421 discussion response

Hello,

I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.

Scenario:


You have finally implemented your firewall and VPN solutions and are feeling much better about your network’s security posture. It is now the end of the fiscal year, and your CISO is looking to you for future budget requirements.

He asks for your thoughts on future trends in network security threats, evolving technologies that may mitigate these threats, and how “GRC” will contribute.

You will:

  1. List your thoughts on what the future holds for network security threats (what they are, will they increase, decline, etc.).
  2. List any evolving technologies (new) that you are aware of that can help with the threats you listed.
  3. Explain how Governance, Risk and Compliance (GRC) will help with these matters, what part will they play (Chapter 15).

Student one:

Hello,

For this final week, we are asked to list our thoughts on what the future holds for network security threats. I would like to point out how cyber space has evolved since the year the course material was published. Therefore, network security threats are evolving inasmuch as IoT devices are expanding to cover all aspects of our daily lives. First, there are those common (old fashioned) security threats such as malware (worm and virus), DOS and DDOS attacks, phishing, Rootkit, Adware and spyware, Man-in-the-middle attacks, SQL injection attacks, and the list goes on. The author provided solutions to these common threats by highlighting the firewall capabilities, the importance of authentication, and securing the Cloud and Mobile Devices. However, the emerging network security threats are of a different breed. In the past, cyber space was an exotic term that only a few privileged ones had a chance to explore. Now, cyber space can be weaponized to the extent that it could cripple the infrastructure of the entire country. Further, the increased production of artificial intelligence security tools have made it easier for hackers to scan for a network exploit and create very sophisticated malwares. There is also a polymorphic attack (polymorphism) which has gotten more sophisticated over the years since it was created by 1992. Not to sound negative, third party security breaches are becoming the favorite avenue for hackers to steal credit card numbers and sensitive information from innocent victims, such as hacking BestBuy, Sears, Delta, Target (more than once).

To defend against these security threats, organizations should “police” their employees’ interaction with the outside cyber-world. In other words, employees should only use the organization network for work purposes and refrain from using social media to chat with their buddies and partners or brag about their daily jobs through Instagram or tweets. In addition, Stewart recommended employing the Data leakage prevention technologies which can “identify, monitor, and protect data in use, data in motion, and data at rest from inappropriate use, distribution, transmission, or other unauthorized actions” (Stewart, 2014).

As for GRC, it serves as a warning policy that any organization should follow to thwart any security threat. Governance and compliance go hand in hand to manage any potential security risk. Therefore, governance, risk, and compliance should be all progressing in the same direction. Governance covers the SOP that ensure employees are adhering to their organization’s security policy. Risk management is the ability to determine the likelihood of a threat to exploit a vulnerability and cause damage or lose. Therefore, the objective of cybersecurity is to detect, understand, and eliminate the risk (Stewart, 2014).Finally, compliance is simply having employees or anyone authorized to have access to the organization’s network system comply with the security policies set forth by the IT department. Hence, if there is no compliance the rate of risk management will be higher.

Reference:

Stewart, J. M. Network Security, Firewalls and VPNs. [VitalSource Bookshelf]. Retrieved from https://online.vitalsource.com/#/books/97812841077…

Regards,

Said

Student two:

Hello,

This week we are asked to discuss some of our thoughts on what network security threats will look like in the future, highlight any emerging technologies that we believe will help mitigate those network security threats, and explain how Governance, Risk, and Compliance (GRC) will help with these matters. When it comes to the future of network security threats, I believe that artificial intelligence (AI) will begin to play a much larger role in offensive and defensive network operations. AI has started to emerge recently, with some AI-powered systems already being used in some business operations. Although these systems help automate tasks, they are also becoming known as promising attack targets due to AI systems containing large amounts of data. It is assessed that these systems will be used to help automate network probes looking for vulnerabilities that could be exploited on the target network. Additionally, these AI-powered systems can be used to create social engineering attacks, like spearphishing, that are even more sophisticated by creating extremely realistic video and audio or well-crafted emails designed to fool targeted individuals. This is worrisome because, just like the various toolkits that are available online, these systems would give an amateur attacker the ability to launch much more sophisticated attacks (Zinatullin, 2018).

The upside these emerging AI-powered systems is that they can also be used to help defend the network from intrusions. The same AI systems that can be used by attackers to probe a network can also be used by network security administrators to probe for open vulnerabilities. For example, an AI-powered system could launch simulated attacks on a network periodically, hoping that it will identify a vulnerability that can be closed before it is exploited. As for GRC, the need for AI is rapidly increasing. As stated above, the ability to discover security vulnerabilities with the use of AI-powered systems is significantly enhanced. However, there is still a need for human analysis, and from the human analysis, GRC can learn to monitor for the emergence of high-risk vulnerabilities and orchestrate corrective actions that can prevent a major incident or failure (Muzzy, 2017).

Sources:

Muzzy, L. (2017). HOW ARTIFICIAL INTELLIGENCE CAN INFLUENCE GOVERNANCE, RISK, AND COMPLIANCE. Nasdaq. Retrieved from https://business.nasdaq.com/marketinsite/2017/How-Artificial-Intelligence-Can-Influence-Governance-Risk-and-Compliance.html. Retrieved on June 25, 2019

Zinatulin, L. (2018). Artificial Intelligence and Cybersecurity: Attacking and Defending. TripWire. Retrieved from https://www.tripwire.com/state-of-security/featured/artificial-intelligence-cybersecurity-attacking-defending/. Retrieved on June 25, 2019

-Charles J

The IMF bailout crisis, business and finance homework help

Research and address current hot topics on the International Monetary Fund (IMF) financial crisis to include issues such as debt crisis in, for example, Greece, Jamaica, Asia, Mexico, and many others. Write 4 – 5 full pages in APA format with 4 minimum references.

Research using peer-review journals from an Online Library, and the country information MUST be within the past 5 years. However, an introduction of ONE paragraph into the IMF may date back further for historical reasons.

Policy: You must use peer-reviewed articles to support your research, in APA format.  No Wikipedia, BLOGS with ads from yahoo.com or google.com, as they present a biased opinion.

You can choose one country the IMF have bailout, using facts, intervention, and consequences.

ET420 PLC, relay logic controller

1.Explain the following in detail:

a.What is relay logic?

b.What is a ladder logic diagram?

c.What is the meaning of a rung in PLC?

2.Explain in detail how PLCs work.

3.

4.Assume a thermocouple, which supplies the input to an analog input module, generates a linear voltage from 20 to 50 mV when the temperature changes from 750 to 1250°F. How much voltage will be generated when the temperature of the thermocouple is at 1000°F?

5.Create a 5 digit code using the SLC 500 rack/slot-based addressing format for each of the following:

a.A lamp connected to terminal 3 of module group 0 located on rack 2. (5 points)

b.A pushbutton connected to terminal 5 of module group 2 located on rack 1. (5 points)

Written Assignment Nursing Process – Case Study

Nursing Process – Case Study
Please read the following case study and complete the questions below.

Daniel is a 16 year old boy who is an identical twin. He and his brother Jeff are very close and do most things together. While Daniel excels at sports he believe his brother is much better at most everything. Daniel, his brother, and their two sisters live with their parents in the Midwest. Recently Daniel has been feeling more tired than usual. He thought it was because of his schedule and school work, which he is fairly good at. He gets mostly Bs, but his grades have been slipping of late. One day he fainted while getting ready for a game. His coach called his parents to let them know Daniel was taken to the Emergency Room. While there the doctor decided to admit Daniel to the hospital for observation. At the time he was running a slight fever, his breathing was shallow, and he was sweating. He was also very sleepy and his blood pressure was high. He did have some abnormal laboratory work, but his doctor was not too concerned at present. Daniel also stated that he felt achy.

You are assigned to take care of Daniel today and when you walk into his room, his mother and brother Jeff are there. Daniel appears to be sleeping. In your written assignment, respond to the following questions applying the nursing process:

Assessment: What type of objective and subjective data can you collect with what you know? How will you collect these data? What further evidence do you need?

Analysis and Identification of the Problem: What do you believe Daniel’s problem(s) are? What might be the nursing diagnoses? Use the following for identification.

Planning: Identify two goals and one nursing intervention for each, based on your nursing diagnoses.

While you will not be able to implement or evaluate, how well do you think your nursing interventions might help with Daniel’s care.

please develop 350 words per each question with reference and intext citations

Question 1

● Explain what personal involvement in leadership means.

● Why is being personally involved as a leader important?

● What are some ways a leader can get personally involved to show that he or she cares about the workforce?

Question 2

 Discuss your initial thoughts about the challenge presented in the video

 Present what you would do in terms of a solution to the problem presented in the video

 Relate the content of the video to one of the CLO’s in the course

 Approximately 250 to 350 words in length (minimum of 2 paragraphs)

 Include the industry example demonstrating the application of your researched video

● Include the reference in APA format to properly reference your article

Learning style

Our textbook begins by highlighting the SQ4R Method, one technique behind the psychology of studying. This technique can help you read and learn the material in textbooks more effectively. It also helps you when taking tests! We all learn differently, though. It is very important to know how you learn best. If you use strategies that work best with your learning style, you will decrease the time you spend and increase the results!

  1. Take the learning style self-assessment ( https://www.webtools.ncsu.edu/learningstyles/) The direct link is https://www.webtools.ncsu.edu/learningstyles/
  2. Review the results of your assessment using the explanation below.
  3. Write at least 250 words describing the results, how you learn best, and how you will modify your study techniques to fit your learning style.

What do the results mean? Barbara Soloman, Coordinator of Advising, First Year College, North Carolina State University explains:

  • Active Learners: tend to retain and understand information best by doing something active with it like discussing or explaining it to others. They enjoy group work.
  • Reflective Learners: prefer to think about it quietly first. They prefer to work alone.
  • Sensing Learners: tend to like learning facts. They are patient with details and good at memorizing things. They are practical and careful.
  • Intuitive Learners: prefer discovering possibilities and relationships. They are good at grasping new concepts and are comfortable with abstractions and mathematical formulations. They are innovative and creative.
  • Visual Learners: remember best what they see–pictures, diagrams, flowcharts, timelines, films, and demonstrations.
  • Verbal Learners: get more out of words–written and spoken explanations. Everyone learns more when information is presented both visually and verbally.
  • Sequential Learners: tend to gain understanding in linear steps, with each step following logically from the previous one. They follow logical steps when finding solutions.
  • Global Learners: Global learners tend to learn in large jumps, absorbing material almost randomly without seeing connections, and then suddenly “getting it.” They may be able to solve complex problems quickly or put things together in novel ways once they have grasped the big picture, but they may have difficulty explaining how they did it.

Moral Reasoning…………………………………………….

The following is a true story – and it made national headlines several years ago. A Houston Texans football player and his wife got the call from a hospital in Dallas that his wife’s mother (the football player’s mother in law) was dying and only had a few minutes left to live. They hopped in the car and sped toward the hospital around midnight. Not many cars were on the road. As they were approaching the hospital, they ran a couple of red lights to get them there faster. A police officer saw this, and pulled them over as they were pulling into the hospital. The couple seeing the lights called ahead to the hospital to have a nurse meet them to substantiate their story that their mother was dying and only had a few minutes left.

When the couple jumped out of their car, the police officer drew his gun and told them to get back into the car. He walked over to them and they explained the situation. The police officer said he did not care, and they drove wrecklessly and broke the law. The nurse substantiated the claim, and the doctor came out as well and substantiated the claim. The police officer called for back-up and told everyone to stay in their car. He gave the football player a ticket. After the process, they ran inside but it was too late and the mother had died.

From your lectures and readings this week, what type of moral reasoning was the police officer using? What type of moral reasoning was the football player using? What would you have done in this situation? Was the police officer in the right to hold them and do his job as a police officer to enforce the laws, despite a mitigating circumstance? Discuss the moral and ethical ramifications of the decisions and what you think you would have done as not only the police officer but the driver. This assignment should be 500-600 words long and directly integrate the readings and vocabulary from the readings at least once in your assignment.