This is the requirement of the first questionHow
can a writer motivate action in a sales letter? Give an example. List
five or more topics that an organization might feature in a media
release. Create a sample media release. Working independently/pair/group, post a short summary of the assigned work.One team member posts the answers on behalf of the entire team. Ensure all team member names and the title are included in your forum post title. Answers in your post must be between 250 to 350 words in length. Posts are due before class on Monday. The day after content has been posted, each student must review all the posts and submit a reply. Replies are due by midnight the day after Monday class.Evaluations Rubrics are below:Group PostAnswers are accurate and relate to course material2Well Written: Grammar and vocabulary1Professionalism: Organization and formatting1250 to 350 words in length1Proper referencing and citation1ReplyReply is insightful and expands on current knowledge1Reply demonstrates an understanding of course content1This is the second question requires pictures and text to explain the second questionFranchise Discussion ForumWe are going to ask students to post a franchise which is not operating in their geographic area. As
a reminder, you need to consider franchises which are not currently
open in your chosen geographic area, so it is likely you are researching
new or growing franchises. So investigating McDonalds or Burger King
won’t work… but perhaps Nurse Next Door will if it is not in your area
as of yet.You are likely now wondering, what do I post? To help you out:1. Post the name of the company you would like to open and why.2. Post links to the franchise information. 3.
The reason you are considering this franchise, why you think it would
be successful, the strengths and weaknesses of the franchise and so
forth. 2. Offer feedback or ask questions about other people’s franchises they are investigating.
MMU How Neuromarketing Can Help You Persuade Anyone Anywhere Anytime Discussion
Overview Your audience is a group of senior executives who will be meeting to decide which emerging technologies or emerging applications of technologies should be selected for one or more security-focused, Internal Research & Development projects during the next budget cycle. Each of these executives is responsible for a business area that will (a) develop products that incorporate emerging applications of technology or (b) depend upon such products to support their organization’s operations. The high-level visibility for your deliverable means that you need to start from a strong foundation of suitable research-based journal articles, papers published in conference proceedings, and doctoral dissertations. The basic question that must be answered is: what are the cybersecurity implications (good or bad) of a specific emerging application of technology. In addition, the executives have expressed the following information needs, which must be met by the deliverable for this assignment. characteristics of the technology,use of the technology to support or improve cybersecurity, use of the technology to reduce or manage risk, use of the technology to increase resistance to threats/attacks, use of the technology to decrease vulnerabilities in an existing technology application, use or exploitation of the technology by attackers, criminals, terrorists, etc. to accomplish their goals. Instructions Format your deliverable as a “descriptive or informative” annotated bibliography. The UMGC library provides information about how to complete this type of assignment. See http://sites.umgc.edu/library/libhow/bibliography_apa.cfm (sub-heading “To get started”). APA style is recommended but, you may use another professional format for your annotated bibliography. In addition to the list of sources and annotations, you must provide an introductory paragraph. See the rubric for additional requirements for this assignment. Choose an Emerging Application of Technology To begin, choose an emerging application of technology, which is suitable for future use in a consumer-oriented product or service (i.e. a new product for personal or home use) or a business-oriented product or service. Applications of technology that are currently in the emerging stages include: Machine Learning and/or Artificial IntelligenceData Science (especially when used to identify patterns and indicators of threats and attacks)Blockchain Technology5G Telecommunications NetworksPhysical Unclonable Functions (PUFs) (devices & electrical circuits)GrapheneNano machinesNeuromorphic computer chips You are encouraged to look for and investigate additional appropriate technologies before deciding upon your technology choice for this assignment. If you decide to research a technology that is not on the suggested technologies list (see above), you must first request and receive your instructor’s permission.Your instructor may require that you do preliminary library searches for research papers and technical papers to prove that you can find a sufficient number of resources to complete the assignment. Find Appropriate Sources (“Survey the Literature”) Brainstorm keywords that you can use to help find articles, papers, and other scholarly publications (“sources’) which discuss your chosen emerging application of technology. Your selected sources must come from publications indexed in one or more of the following library databases: ACM Digital Library http://ezproxy.umgc.edu/login?url=http://www.acm.org/dl Dissertations & Theses (Pro Quest) http://ezproxy.umgc.edu/login?url=http://search.proquest.com/pqdtft/advanced?accountid=14580 IEEE Computer Society Digital Library https://www-computer-org.ezproxy.umgc.edu/csdl/homeScience Direct http://ezproxy.umgc.edu/login?url=http://www.sciencedirect.com/science/search Since the point of this search is to find information about emerging applications of technology, your sources must have a publication date of 2016 or later (2016, 2017, 2018, 2019, 2020, 2021). For papers indexed in Science Direct, you may also use papers that are marked “In Press.” Allowable source types are: (a) professional journals, (b) conference proceedings, (c) dissertations or theses, and (d) technical magazines (published by either the ACM or IEEE). Each of your selected sources must have a reference list containing at least 3 references for authoritative papers. (See http://sites.umgc.edu/library/libhow/scholarlyjournals.cfm) To complete this part of the assignment, you may need to review 15 – 20 sources (search results) in order to find 10 papers or articles that are usable for this assignment. The sources you choose must provide technical information about your selected technology (see selection requirements for each paper). Note: If you have problems accessing any of the library databases, contact the UMGC librarians via the contact methods listed on the library’s home page https://sites.umgc.edu/library/index.cfm . They will be able to assist you with login issues and/or search engine questions (but will not do your research for you). Create Your Bibliography (List of Sources) Choose the 10 best sources from your searches for articles, papers, and dissertations. Focus on the ones that give details about your technology and how it can be used in an emerging application of technology. Next, write the reference list entry (APA, MLA, or another appropriate professional citation style) for each source. Alphabetize your list of reference list entries. After you have the correctly ordered list, number your entries from 1 to 10. Note: different reference entry formats are used for different types of sources. Review the UMGC Library’s “Get Help > Citing and Writing for samples and explanations of the formatting rules. If you are using APA format, your list should look something like the following. Authors. (date). Article title. Publication name, vol(issue), #-#.Authors. (date). Paper title. Published in the Proceedings of conference-name, pp. #-#.Author … Write Your Annotations In an annotated bibliography, the annotation is a paragraph or two placed under the reference list entry for each source. For this assignment, the annotation should be a combination of factual information from the source and your evaluation (opinion) of that information. To accomplish this, you should read the abstract, introduction section, and closing sections for each article or paper. For dissertations, look over the Introduction and the Literature Review (usually Chapters 1 & 2). From this information, develop a one to three paragraph informative or descriptive summary of the source that includes: (a) a description of technology and its characteristics, (b) planned uses of the technology (products, services, etc.), and (c) your thoughts and opinions as to how you could use this paper to justify selecting the technology for an Internal Research & Development study. In each annotation, you should provide at least one specific example of a characteristic and/or application of the technology, e.g. an emerging technology, which impacts cybersecurity. For example, for an annotation for an article about graphene applications to product design, you could discuss how it could be used to manufacture cell phone cases or laptop cases which are less breakable than cases made with current materials. This could positively impact availability because the new case design using graphene would be expected to decrease the risk of breakage. Decreased risk of breakage will decrease the probability of loss of availability caused by a broken case. Decreasing the probability of a negative event will decrease the risk associated with that event Note: Remember that the security posture of a system or product is framed in terms of risk, threats, vulnerabilities, etc. Improvements to the security posture (positive security implications) will result in reduced risk, increased resistance to threats or attacks, and decreased vulnerability.Negative impacts on the security posture will result in increased risk, decreased resistance to threats / attacks, and increased vulnerability (weakness). As you write the annotations for each article / paper / dissertation, make sure that you include YOUR thoughts and ideas about the security implications of this technology. Use standard terminology from the readings and glossaries provided in the LEO classroom. As you brainstorm the security implications of this technology (if these are not specifically discussed by your source), you should consider use of the technology to improve cybersecurity. Then consider applications or uses which will negatively impact the security posture of an organization or the security of individual consumers or users of the product. It is very important that you consider BOTH SIDES OF THIS ISSUE. Putting It All Together Consult the grading rubric for specific content and formatting requirements for this assignment.Your 5-8 page annotated bibliography should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. Your paper should use standard terms and definitions for cybersecurity. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count.You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).
CSIA 459 UMGC Artificial Intelligence Annotated Bibliography
MGMT 353 BU Business Management Excel Charts From Apple Annual Report Exercise
MGMT 353 BU Business Management Excel Charts From Apple Annual Report Exercise.
Textbook Assignment 5: Excel ChartsAssignment OverviewIMPORTANT: USE THE ATTACHED EXCEL FILE FOR ACTIVITY 12.10. THERE ARE SEVERAL TYPOGRAPHICAL ERRORS IN THIS DATA IN YOUR TEXT; USE THIS FILE: ExcelNETSALESAPPLE_Exercise_12.10.xlsxComplete the following exercises from your textbook. Please make sure to follow good principles of business writing for formatting and to use text concepts where applicable.All exercises are from the course textbook (Cardon), complete all parts of the following exercises:Chapter 12 12.10 Creating Charts from the Apple Annual Report (Parts A-F only). See requirements for submission below. Use the Excel file provided in this assignment.12.11 Revising Charts about Exporting (Parts A-C only) See requirements for submission belowGuidelinesProfessional and thorough answers are required in an MS Word document. Please take time to proofread as spelling and grammar counts.In addition to the directions in the text:Please import the charts for Exercise 12.10 into a Word document and submit the Word document along with your Excel work (please name your Excel files Chapter_12_YOURNAME.xlsx). In the Word document, title each chart and write a 2-3 line script about it as if you were presenting it to your work team. The script should describe what the chart shows.Important note: make sure that your charts make sense, that is, after you create them in Excel look at them for logic. See the Excel tutorials in the Module for help on creating and revising the charts.
MGMT 353 BU Business Management Excel Charts From Apple Annual Report Exercise
essay help online Week 7. Paper details Create a 10 slide presentation about the role of scientist-practitioners. Include the following in your presentation: A title page A description of the key knowledge, skills, and abilities of an effective scientist-practitioner A description of how research reports are an essential component for the scientist-practitioner A description of why data management and presentation are key components of research reports A reference page At least three scholarly sources Detailed speaker notes that represent what would be said if giving the presentation in person Week 7
Economic Inequality and Government Policies Term Paper
Introduction The gap between the rich and the poor has been increasing yearly since 1970. Indeed, one can state that the distribution of wealth among the American population is uneven. Whereas there are individuals that can be considered extremely wealthy, there are many others who can be described as poor. This is even though both the middle and lower classes have various types of employments. There have been critics who have argued that economic inequality in the country can be solved through provision of a standard basic income (Van Parijs, 2005). This would mean that each person earns the same basic salary. This would be calculated to make sure employees can afford a decent life. Towards this end, one can argue that economic inequality is only considered when people cannot afford basic needs. This paper looks into the current state of economic inequality and how government policies have contributed to the gap. The paper will also consider some programs that have been used in the past to try and lower the disparity. Suggestions on what can be done to ensure a reduced economic inequality gap will also be given. Current Economic Inequality Van Parijs (2005) argues that economic inequality hinders a person’s ability to get sufficient subsistence. There are various reasons why the gap has increased in the last several decades or so. For instance, the population has increased. One can argue that the 4% unemployment rate is very low. Thus, many Americans have one form of employment or the other, yet they are still struggling to cater for their basic needs. Home ownership has been an important aspect of the economic inequality debate. This is due to the fact that renting out apartments is considered an expensive venture in many states in the country. Desmond (2017) interviews different people and presents a case where 44% of the salary of one of the interviewees is spent on rent only. This proves that owning a home in the US is a good way of managing expenses. Indeed, there are various policies that are currently being implemented to lower the economic inequality rates in the country. As stated, Van Parijs (2005) believes that a universal basic income is crucial in achieving this. One of the advantages of such an income is that it provides everyone with the exact amount they need to live comfortably. Towards this end, economies of scale have to be considered for all employees. Issues such as inflation and taxation also have to be considered to ensure that each person, regardless of other external factors, can cater for his or her needs. Apart from the standard income, there have been suggestions that the gap could be lowered using home ownership. Desmond (2017) compares the economic status of several interviewees and concludes that those that own a home have more disposable income and savings compared to those that do not own a home. Through the interviews done by Desmond (2017), one can argue that home owners get benefits that renters do not. For example, the home owners get tax breaks while the renters do not. Government Policies and Economic Inequality – Mortgage-Interest Deductions As stated previously, home owners normally get tax breaks and are able to save more compared to renters. Desmond (2017) brings into light the impact of mortgage-interest deductions (MDI), which is a government policy that allows home owners to deduct their interest on any loans they would have taken for purposes of living in a decent home. One can argue that such policies and other tax deductions that are given to home owners have heavily contributed to the increase in economic inequality in the country. Indeed, such polices have made it that more difficult for renters to pay their bills. In Desmond’s (2017) article, the renter has been applying for government housing for years. The scholar notes that the average waiting time for subsidized housing that is given to low income families is 11 years (Desmond, 2017). This means that the lady will continue to pay rent for approximately 11 years before she is able to get a house and save on costs. In the meantime, home owners will be saving approximately $427 per month on their mortgage due to the stated policy (Desmond, 2017). One can argue that government policies ideally should be used to lower the identified economic gap as opposed to increasing it. Indeed, the policy was introduced to make it easier for Americans to own houses after the recession. Implementation of the same policy has, however, proven that it does not factor in renters who are yet to qualify for mortgages. One can suggest that the policy can be improved in order to also cater for renters in a way that they do not struggle to pay their monthly bills due to the overreliance of mortgages. Government Policies and Economic Inequality – Minimum Income Programs As mentioned previously, there are many policies that are currently being implemented to lower the economic gap across the US. Apart from the MDI, there are several minimum income programs (Van Parijs, 2005) that citizens are advised to use to ensure they can pay their bills. It is important to note that the minimum income programs are founded on the premise that economic inequality is pronounced mainly due to the inability of some citizens to afford their basic needs. Therefore, ensuring everyone can afford his or her basic needs will also address the challenges that have been brought on by economic inequality. Get your 100% original paper on any topic done in as little as 3 hours Learn More Towards this end, one can argue that this policy contributes to a solution by ensuring everyone who works gets the same amount of basic salary that has been developed after careful analysis of the economy. The policy in no way denies someone the right to earn more money. It is important to point out that such a policy also contributes to the solution, as it provides a sense of equality among all citizens. Critics have noted that it is much more difficult for people of other races to own homes compared to Caucasians. This debate has been pegged on several things including the fact that Caucasians often get higher salaries compared to other races. Having a standard minimum salary for everyone will ensure that despite such disparities, each citizen is still able to cater for his or her basic needs, including housing. Arguments For and Against Minimum Income Programs An advantage of the minimum income programs is the fact that it lowers tax burdens. As mentioned through Van Parijs’ (2005) article, taxation would ideally only be done for the extra money people make on top of the minimum wage. It is possible that people who survive purely on their minimum wage will not be taxed or get tax relief. The minimum wage will also encourage people to get jobs, as they can then be sure they will be able to cater for their bills. As mentioned previously, the 4% unemployment rate is very low compared to other countries. Despite this, many Americans still struggle to sustain a decent livelihood. One can argue that lack of minimum wage has led to the exploitation of citizens such that they work for many hours but are not compensated equally. This can be demotivating and lead to high employee turnover as well. An argument that can be made against minimum income programs is the fact that it can crash the country’s economy if not well executed. Demand and supply both have to be considered before a minimum wage is allowed. However, one can argue that morality requires that those who are able help the poor in the most efficient way possible. Having a minimum wage will do this effectively. The debate on morality is also encouraged by the fact that it is considered immoral to reward the underserving. Indeed, it is objectionable to reward the underserving, as they do not deserve such privileges. In conclusion, one can argue that the debate on lowering the economic inequality gap can only be solved through a collaboration of government agencies through policies. The two policies that have been analyzed in the paper have both advantages and disadvantages. The strengths of each should be combined to come up with better policies that can serve the general public. Additionally, such policies should work for the benefit of all people and not just a select few. References Desmond, M. (2017). How homeownership became the engine of American inequality. New York Times Magazine. Web. Van Parijs, P. (2005). A basic income for all. Boston Review, 2000(Oct/Nov): 13-48.
Symbolism in play The Minister’s Black Veil by Nathaniel Hawthorne Explicatory Essay
Introduction Nathaniel Hawthorne has primarily used symbolism in his work as a style of narrative maneuver. A symbol like the black color has been used to denote the veil itself. It is a symbol of evil and secret sin of humanity. The veil representation has been commonly used to illustrate fear of the unknown and the rigidity in the puritan society. Besides, the typical nuance veil has rested in the somatic and conceptual disadvantage that it establishes, amid the minister and his brethren and the shame that it articulates. Hawthorne (89) describes that the congregation trust that the exterior exhibits offers evidence in regard to a person’s essential features, thus his or her incredible comportment. Hence by embracing the veil, the minister diminishes the authority on which the faithful can accurately envisage his conduct. This causes isolation of the minister with his congregation, although he is made reckless already by simple action of wearing the veil. Fragment of the terrifying effect of veil descends from consciousness (Meyer, 65). The consciousness alludes that the other person is capable of seeing without being identified or seen himself. This is illustrated by members of the congregation when they say “the most blameless girl and the man of cynical breast sensed as if the minister had crept on them. Behind this dreadful veil, revealed their amassed unfairness of deed (Hawthorne, 113) As the congregation cannot aptly predict where the minister is gazing, they trust and assume that they are being watched diligently than normal. This hypothesis is reinforced by the theme of the discourse, which “had typified furtive evil and the miserable secrecies which people skin from the rest of society”. Hence, the ministers exemplify the responsibility of “God”, whose probing examination can decode secret mystery of an individual of the soul. Equally, the wearing of the veil is a signal of being guilty. As a classic illustration for the society, the minister accordingly infers that individuals have to accept the same. The minister criticizes the people by being chauvinistic and fallen from the philosophy of ethics. They are extremely concerned, with the growing power drilled over them in embracing shared uniqueness of Puritan America. This is apparent in fundamental battle amid the people and society (Hawthorne, 79). Get your 100% original paper on any topic done in as little as 3 hours Learn More The Minister’s black veil symbol can also be illustrated clearly on the universal variance between puritanism and sensitivity, which is the attitude that hominid are dualistic; they have inherent, evil side and an internalized, moralistic side. Rendering to this set of conjecture, the “Evil or darkness” as described by Hawthorne, we can infer that darkness is a natural part of an individual (Hawthorne, 97). The Minister recognizes the evil in him and formulates alternatives to curb obstacles that can preserve his sentient character from intolerable and suppressed self. This obstacle is embodied in the veil (Meyer, 104). It is subsequently transferred as a reflection of clandestine sin. The congregation epitomizes the cognizant of the persona, which entails the ethics and tenets verbalized by humanity. To evade frightening acuities from inflowing cognizance, they embrace multiple instruments. The multiplicity of these shield instruments is illustrated by the antiphons of minister’s homily (Hawthorne, 3). Various people search for means of appraising the situation, as in case, the existence of others. Others find a way to befuddle themselves from their feelings, by talking and laughing loudly. Other people dismiss or refute their feeling of the situation. Conclusion Symbols in Hawthorne’s play, The Minister’s Black Veil illustrate the impenetrable obstacle existing in all human souls. The point illustrated by the symbols alludes that every individual should accept his or her “black veil” (Meyer, 123). However, if we humans are contented in accepting the evil in them, there is a concern to come when individuals will be compelled to put aside their veils. Works Cited Hawthorne, Nathaniel. The Minister’s Black Veil, Iowa: Perfection Learning, 2007 We will write a custom Essay on Symbolism in play The Minister’s Black Veil by Nathaniel Hawthorne specifically for you! Get your first paper with 15% OFF Learn More Meyer, Michael. The Bedford Introduction to Literature: Reading, Thinking, Writing, London: Bedford/St. Martin’s, 2007
Essay Writing at Online Custom Essay
Review This Service