Get help from the best in academic writing.

ORG 535 University of Phoenix Week 2 HR Design Decisions and Organizations Discussion

ORG 535 University of Phoenix Week 2 HR Design Decisions and Organizations Discussion.

Assignment ContentSouthwest Airlines is a well-known company featured in our textbook. Over the next 4 weeks, you will take on the fictional role of intern at Southwest Airlines Human Resources. You will utilize the textbook and other professional resources to complete your assessments.Your first week on the job is filled with learning the ins and outs of Human Resources and the industry. Your manager told you that one of your projects is to assist with a new HR strategy for the company. This strategy is broken down into 3 parts that you’ll work on throughout the course. They are:Examining current practicesTalent recruitment and selectionStrategy recommendationYour first task is to examine Southwest’s current HR practices, as reported in public sources. Complete the HR Design Decisions chart with your review and rationale of the elements listed below to decide where Southwest Airlines’ HR practices fall. Support the analysis with evidence from sources on the web.Employees as expenses vs. employees as assetsCompensation below market, above market, or competitiveSpontaneous training and development or planned training and developmentSpecific job descriptions or general job descriptionsExternal or internal recruitment, or bothLimited socialization of new employees or extensive socializationCollective bargaining or individual bargainingPossible sources for information include but are not limited to:Organization website and associated websitesVault Campus includes detailed reviews and survey information about what it’s like to work at Southwest. To access Vault Campus, visit eCampus and click PhoenixLink.Websites that specialize in company reviews and job postingsMagazine and journal articles from the Internet or University Library
ORG 535 University of Phoenix Week 2 HR Design Decisions and Organizations Discussion

Change in expression of TDP43 in various organs during development of ALS model zebrafish. Anuj Dhoj Raut Introduction Amyotrophic lateral sclerosis (ALS) is the devastating motor neuron disease that is characterized by progressive degeneration of both upper and lower motor neuron that control voluntary movement of body. The degeneration of the neurons seen in ALS result in muscle weakness, spasticity and atrophy of both cranial and spinal nerves muscle groups. Since there is often respiratory muscle involvement, aspiration pneumonia is the most common cause of death for the patients with ALS. At present, ALS is invariably fatal disease with no absolute cure and patients usually die within 3-5 years after the clinical onset of symptoms. The mean age of onset of ALS is between 55 and 65 years with slightly more prevalence in male (Male: Female ratio ~ 1.5:1) (1). Even though, incidence rate of ALS are different in different countries of the world, globally average annual incident rate is between 1.5 and 2.5 per 100,000 populations. There has been an increase in death rate of ALS and current international death rates for ALS have be close to 1 per 100,000 population per year(1). Currently, riluzole, an inhibitor of glutamate release, is the only disease modifying treatment available for the disease and can extends life only for couple of months (2,3). The etiology of ALS is currently unknown. However, approximately 10% of ALS patients have family history for ALS (Familial ALS;FALS) and remaining 90% of case occur sporadically (Sporadic ALS; SALS)(4). Although definitive evidence for environmental factor that cause ALS has remain mostly unknown, the evidence of genetic alternation that cause ALS has been increasing. Till date, only known cause of ALS is mutation in the gene. Mutations in more than 13 different types of genes have already been identified that can cause FALS. FALS is often a Mendelian inheritance with high penetrance, although most cases are autosomal dominant pattern of inheritance, autosomal recessive pedigrees have also been reported (5,6). Even though, FALS are cause due to genetic alternation, FALS are indistinguishable from SALS form histopathological perspective and both the types’ presents with similar sign and symptoms, thus suggesting common intra-cellular processes that lead to the disease symptoms. Among those 13 different types of gene mutation that causes FALS, mutation in Transactive response DNA binding Protein 43kDa (TDP-43) gene is seen in approximately 4% of FALS and 2% of SALS (7). Transactive response DNA binding protein 43kDa (TDP-43) is a DNA/RNA-binding protein encode by the TARDBP gene on chromosome 1. TDP-43 is an ubiquitously expressed nuclear protein capable of shutting between the nucleus and cytoplasm (8). TDP43 is present in almost all the tissue of a body and have different roles in different tissues (9). Although the precise cellular function of TDP-43 is unknown, TDP-43 has been implicated in regulating of gene transcription (9),alternative exon splicing (10) and mRNA stability (11). Under normal physiological conditions, TDP-43 resides predominantly in the nucleus where it involved in gene expression. But, in abnormal pathological conditions such as ALS, TDP-43 is mislocalized in the cytoplasm as inclusions body (12,13) . Analysis of TDP-43 in the brain and spinal cord of ALS patients reveled that TDP-43 is pathologically modified and redistribution to the cytoplasm, which is accompanied by loss of normal nuclear function and a toxic gain-of-function in the cytoplasm (14,15). The mislocalization of TDP-43 into cytoplasm is believed to be cause of neuron loss in ALS patients. Moreover, TDP-43 positive inclusions are also found either independent or partially colocalize with the other characteristic inclusion, such as tau, α-synuclei, β-amyloid and polyglutamines, which are found in other neurodegenerative disease such as Alzheimer’s disease, Pick disease and Parkinson’s disease. Interestingly, TDP-43 positive cytoplasmic inclusion are found in almost all ALS patient along with other neurodegenerative disease (16). Although evidence suggest that there is a definitive association between ALS and TDP-43, above observations make it confusing to whether TDP-43 pathology is causative or a secondary response in this disease. Studies done to unravel if TDP-43 is pathology or secondary response to ALS have come with conflicting result. Moreover, the present of TDP-43 in inclusion body of another neurodegenerative has been a mystery. The precise role of TDP-43 in ALS and other neurodegenerative disease is not well known and needs further evaluation. Study, in the mouse has shown that TDP-43 protein is essential for normal prenatal development. Homozygous loss of TDP-43 in mouse cause early embryo death. But, in heterozygous loss TDP-43 mouse, the TDP-43 protein levels were nearly normal suggesting an auto-regulatory mechanism controlling this protein levels(17,18). Moreover, research on mRNA expression levels of TDP-43 protein in various tissues has shown that TDP-43 plays different roles in different tissue(9). Furthermore, about 40 different mutant in TDP-43 have already been identified so far that is associated with ALS (10). But all this various types of mutations in TDP43 have only affected motor nerve of spinal cord and brain. At the same time, mutation and/or overexpression of TDP-43 has not cause any pathology alternation in other cells and tissue of the body or has been found to be associated with diseases of other organ system. A protein that is so vital for a development of organisms that it’s absent cause death, but when there is mutation in its gene has only abnormalities in nervous system and that abnormalities are evidence after mid-life is yet to be understood. Moreover, within the nervous system mutation in TDP-43 seems to affect only motor neuron and at the same time spares other neuron such as sensory, autonomic nervous system. And this preference to the motor neuron by mutant TDP-43 is even seen till the late stage of the disease. Physiological roles of TDP-43 and early cellular pathogenic effects caused by disease associated mutations in differentiated neurons is yet to be fully understand. Causative link between TDP-43 positive inclusion and ALS can be well established, if nuclear to cytoplasmic expression of mutant TDP-43 could be study in vivo and in real time. And at the same time, will also be able to understand if TDP-43 pathology is causative or a secondary response to ALS and other neurodegenerative disease. Transgenic rodent models of ALS have been extremely valuable in providing some insight into biological mechanisms underlying ALS. But, due to difficulty in conducting in vivo real time study with rodent, change in intra cellular expression of TDP-43 has not being well understand. The zebrafish has recently emerged as powerful genetic model system for studying ALS. External development and transparency make it great tool to study the development stages of almost all the organ. External development of its eggs allows easy observation and manipulation of early development process. And, transparency makes is a powerful tool to observe the change at cellular level by using fluorescent reporters. With the help of fluorescent reporter, specific cell type and protein expression within those cells can be easily identify and study in vivo and in real time in zebrafish. In addition, zebrafish is a vertebrate and their nervous system is highly conserved with higher vertebrates including humans and many pertinent feature of the nervous system start to develop within 1 day of development. Moreover, genetic manipulations are comparatively easy in zebrafish. Therefore, zebrafish is a great model system to study the association of TDP-43 and ALS. In this study, I am trying to understand the change in expression of mutant and overexpressed TDP-43 protein in different tissue of zebrafish. At the same time also will be evaluating the change in expressions of TDP-43 as the zebrafish grow from embryo to adult. I will then compare the change in level of TDP-43 from asymptomatic stage of ALS zebrafish to that of symptomatic stage of ALS zebrafish. In order to conduct this experiment, transgenic zebrafish with human mutant TDP-43 will be created by genetic engineering. Human mutant TDP-43 will be fused with green florescent protein (GFP) before creating transgenic zebrafish. By combining human mutant TDP-43 with GFP will allow easy visualization of TDP-43 protein in zebrafish. Then, image of the fluorescent labeled TDP-43 at different stage of development of zebrafish period will be capture with fluorescent microscope. References 1.Logroscino, G., Traynor, B., Hardiman, O., Couratier, P., Mitchell, J., Swingler, R., and Beghi, E. (2008) Descriptive epidemiology of amyotrophic lateral sclerosis: new evidence and unsolved issues. Journal of Neurology, Neurosurgery

FIN 3100 WPUNJ Declining of Commercial Banks Research Paper

FIN 3100 WPUNJ Declining of Commercial Banks Research Paper.

Research Paper MLA FormatTOPIC:What are the main reasons behind the rapid decline of the US commercial banks over the last three decades?Since 1980 commercial banks have been showing a substantial and continuous decline. The main scope of this paper is to provide the empirical evidence as well as the explanation of this phenomenon. Concerning the rules for this assignment I expect a minimum of 5 pages ( double space is fine ) for each paper excluding the citations page.The paper should have a brief introduction – where you discuss the topic of your research and its scope-and a conclusion where you summarize the main findings of your research. Include all Citations MLA FormatPlease let me know if you have additional questions.
FIN 3100 WPUNJ Declining of Commercial Banks Research Paper

Using Excel, please answer the following question.(Need it in 1 hr) Please Feel free to bid your price

write my term paper Using Excel, please answer the following question.(Need it in 1 hr) Please Feel free to bid your price.

QualSupport Corporation manufactures seats for automobiles, vans, trucks, and various recreational vehicles. The company has a number of plants around the world, including the Denver Cover Plant, which makes seat covers. Ted Vosilo is the plant manager of the Denver Cover Plant but also serves as the regional production manager for the company. His budget as the regional manager is charged to the Denver Cover Plant. Vosilo has just heard that QualSupport has received a bid from an outside vendor to supply the equivalent of the entire annual output of the Denver Cover Plant for $35 million. Vosilo was astonished at the low outside bid because the budget for the Denver Cover Plant’s operating costs for the upcoming year was set at $52 million. If this bid is accepted, the Denver Cover Plant will be closed down. The budget for Denver Cover’s operating costs for the coming year is presented below.[Table]Additional facts regarding the plant’s operations are as follows: a. Due to Denver Cover’s commitment to use high-quality fabrics in all of its products, the Purchasing Department was instructed to place blanket purchase orders with major suppliers to ensure the receipt of sufficient materials for the coming year. If these orders are canceled as a consequence of the plant closing, termination charges would amount to 20% of the cost of direct materials. b. Approximately 400 plant employees will lose their jobs if the plant is closed. This includes all of the direct laborers and supervisors as well as the plumbers, electricians, and other skilled workers classified as indirect plant workers. Some would be able to find new jobs while many others would have difficulty. All employees would have difficulty matching Denver Cover’s base pay of $18.80 per hour, which is the highest in the area. A clause in Denver Cover’s contract with the union may help some employees; the company must provide employment assistance to its former employees for 12 months after a plant closing. The estimated cost to administer this service would be $1.5 million for the year. c. Some employees would probably choose early retirement because QualSupport has an excellent pension plan. In fact, $3 million of the annual pension expense would continue whether Denver Cover is open or not. d. Vosilo and his staff would not be affected by the closing of Denver Cover. They would still be responsible for administering three other area plants. e. If the Denver Cover Plant were closed, the company would realize about $3.2 million salvage value for the equipment and building. If the plant remains open, there are no plans to make any significant investments in new equipment or buildings. The old equipment is adequate and should last indefinitely. Required: 1. Without regard to costs, identify the advantages to QualSupport Corporation of continuing to obtain covers from its own Denver Cover Plant. 2. QualSupport Corporation plans to prepare a financial analysis that will be used in deciding whether or not to close the Denver Cover Plant. Management has asked you to identify: a. The annual budgeted costs that are relevant to the decision regarding closing the plant (show the dollar amounts). b. The annual budgeted costs that are irrelevant to the decision regarding closing the plant and explain why they are irrelevant (again show the dollar amounts). c. Any nonrecurring costs that would arise due to the closing of the plant, and explain how they would affect the decision (again show any dollar amounts). 3. Looking at the data you have prepared in (2) above, what is the financial advantage (disadvantage) of closing the plant? Show computations and explain your answer. 4. Identify any revenues or costs not specifically mentioned in the problem that QualSupport should consider before making a decision.Garrison, Ray; Garrison, Ray. Managerial Accounting (Page 612). McGraw-Hill Higher Education. Kindle Edition.
Using Excel, please answer the following question.(Need it in 1 hr) Please Feel free to bid your price

LA City College PICO Clinical Inquiry Question for the Nursing Practice Essay

LA City College PICO Clinical Inquiry Question for the Nursing Practice Essay.

I’m working on a nursing question and need support to help me understand better.

Case study: You are a staff nurse working in an intensive care unit and assigned to care for a 75-year-old man who had coronary artery bypass graft surgery four days ago. The patient has a history of chronic obstructive pulmonary disease exacerbated by heavy smoking. His postoperative course has been difficult, and he has suffered a number of setbacks.Staff members, despite their diligent efforts, have not been able to wean him off the ventilator since the surgery. He has required frequent suctioning throughout the shift, and he is being evaluated for the development of ventilator-associated pneumonia.Today, when returning from lunch, you observed an experienced nurse suctioning your patient. His secretions were thick, and you observed that the nurse was instilling saline into the patient’s endotracheal tube as she was suctioning him.The patient turned red and began coughing, and it was obvious he was in distress. You asked the nurse why she was instilling saline into his endotracheal tube. She replied this was being done to loosen the secretions.You told her this was no longer an acceptable practice. She stated that she has many years of critical care experience and she did not care what anyone said, that the only way you could loosen the patient’s secretions would be to instill saline. She also said that would be the last time she would do something for one of your patients while you were at lunch.Outline/Describe the strategies/process you use to search for evidence related to best practices (including databases used, search phrases, number of artilces located) for suctioning and whether the instillation of saline while suctioning is an acceptable technique.Search for evidence related to best practices, and provide a summary of all evidence.Cite at least two scholarly (peer-reviewed) artilces to support the data presented in the paperDevelop a PICO question for the instillation of saline during endotracheal suctioning.Consider/Describe how you could apply PICO to problems in your workplace in order to influence things in clinical practice. Develop a PICO to represent your work setting.
LA City College PICO Clinical Inquiry Question for the Nursing Practice Essay

NMAP Scan: Features and Applications

NMAP Scan Introduction: Before we tend to start with the technical intricacies of mastering Nmap, it is a sensible idea to know however Nmap itself began and evolved as a project. This tool has been around for nearly twenty years, and could be a well-loved and often-used element across several technical industries. Nmap started from humble beginnings. in contrast to the industrial security tools that are discharged these days, the terribly 1st Nmap was solely concerning two,000 lines of code and was discharged in 1997 in issue fifty-one of Phrack, a hacker “zine” that was started in 1985. Nmap s timeline is a fascinating one, and its growth has been extraordinary. Features of Nmap: Although port scanning is clearly vital for security professionals—after all while not understanding what network ports are open, it’d be not possible to assess the protection of a system. Nmap is additionally terribly valuable for different styles of information technology professionals. System directors use Nmap to work out that of their systems are on-line, so they will perceive if there are issues or inconsistencies on their network. Likewise, victimisation OS detection and repair detection, these directors are ready to easily verify that each one system are running the identical (hopefully current) versions of operating systems and network-enabled software package. Because of its ability to alter temporal order, in addition as set specific flags on completely different packets (for example, the feast day Tree scan), developers will communicate Nmap for facilitate in testing embedded network stacks, so as to verify that the aggressive network traffic will not have accidental outcomes that will crash a system. Lastly and maybe most importantly students of network and pc engineering are major users of Nmap. as a result of it’s a free and open supply software package, there is no barrier to induce the software package and run it in real time. Even amateur users scanning their own little home networks will learn Associate in Nursing Brobdingnagian quantity concerning however their computers and networks work and are designed by seeing what services are online though there are Windows and OS X ports, Nmap is additionally a good introduction to running easy (but advanced) tools on the UNIX system program line. Techniques used by Nmap: In Gregorian calendar month 2006, one among the foremost vital aspects of the Nmap project was integrated into all Nmap builds: Nmap Scripting Engine (NSE). The NSE allows users of Nmap to put in writing their own modules (in a artificial language called Lua) to trigger on sure ports being open, or sure services—or even specific versions of services—found listening. This unharness permits the elevation of Nmap from an easy networking tool to a totally strong and customizable vulnerability assessment engine, appropriate for a good type of tasks. In addition to making a robust scanning tool and also the NSE, Nmap developers have included many further tools—including Ncrack, Nping, Ncat, and Ndiff—into default install bundles of Nmap. These tools will facilitate analyze existing scans, pivot to other hosts, transfer files, or compare scan results over time. In this chapter, we are going to cowl the subsequent topics: assaultive services with Ncrack Host detection with Nping File transfers and backdoors with Ncat scrutiny Nmap results with Ndiff Experimental setup and usage of Nmap: File transfers and backdoors with Ncat For those that might not be acquainted, an exquisite network administration tool was unveiled in 1995; it had been referred to as Netcat. This had a spread of uses, from file transfers, to network observance, to talk servers—even therefore useful on produce a backdoor by mirroring its input to a given network address of the user’s alternative. Netcat was in many ways a awfully light-weight port scanner—by employing a fast shell script, it was extremely straightforward to test whether or not sure ports were responding on a given host. Netcat remains in significant use these days, however the Nmap development team saw some pretty serious improvements both in stability and usability that they’ll create to the software. As such, in 2009, Ncat was discharged as an element of the Nmap suite. Unlike Netcat, Ncat has SSL support (natively), nice affiliation redirection reliability {and several and several different and several other} other inbuilt options that create it a good tool in a very security administrator s tool case. Ncat has 2 modes: the “listen” mode, that listens on a provided port for incoming connections, and also the “connect” mode, through that commands are sent, and feedback is received. within the connect mode, we will use Ncat to attach to a variety of services, together with HTTP-based internet servers. Sending the GET / HTTP/1.0 request when invoking Ncat via ncat nmap.org 80 yields the subsequent output: Although it clearly does not render in addition as an internet browser like Chrome or Firefox would you’ll be able to see the HTTP/HTML response from the net server quite clearly? This same practicality of Ncat may be wont to connect with many alternative varieties of services, together with SMTP, FTP, POP3, and so on. once trying to send completely different inputs to completely different protocols, Ncat may be invaluable! Ncat is additionally terribly helpful once conducting a penetration take a look at or security assessment, as it may be used as each a way for information exfiltration, and as the simplest way to possess a persistent backdoor into a compromised system. The ability to send a file through Ncat uses each the “listen” and “connect” functionalities of the tool. the subsequent screenshot shows a awfully basic Ncat command: To begin, we tend to founded Associate in Nursing Ncat hearer victimisation the -l or listen flag. Since we tend to are expecting a file, we will pipe the output to received.txt. we tend to perpetually wish to form sure that we tend to are outputting the kind of file that we’re expecting so we do not have to handle dynamical file varieties at a later date. once putting in place the hearer, we can also founded a selected port (which is helpful on penetration tests); however during this case, we left the default port of 31337 intact. We can see within the preceding screenshot that someplace else (not within the listener) we tend to have a file referred to as send.txt with the this is often the file that we tend to are visiting send content. causation the file is easy! All we want to try to to is invoke Ncat, point it at a localhost (again, we’re victimisation the default port of 31337 therefore no port specification is necessary), and pipe the input from send.txt. the subsequent screenshot demonstrates gap a received text file: As we will see within the preceding screenshot, Ncat can mechanically shut out once the file is received. Once we tend to truly receive the file, it’s as straightforward as “cat”-in the file we tend to receive to determine that it’s after all the identical content because the one we tend to send. Lastly Ncat may be used as a backdoor, so as to make persistent access to a compromised system. the subsequent screenshot shows this basic functionality: As seen within the preceding screenshot, establishing a shell affiliation via Ncat is very straightforward. we tend to used ncat -l -e /bin/bash to pay attention on the default, and dead bin/bash (our shell) once a shopper connected. It’s value noting that during this type, the backdoor isn’t persistent—meaning that it’ll not keep listening when the client has disconnected. the subsequent screenshot demonstrates the flexibility to run Linux commands on a distant system through Ncat: In order to attach to the shell, as shown within the preceding screenshot, we will merely invoke ncat localhost (since the port remains default) and have a bash shell spawn our prompt. during this case, we tend to run whoa mi and received back ds haw, then dead a ls command and received a directory listing of the remote directory. whereas different backdoor access ways is also a lot of reliable or difficult, it’s exhausting to suppose of one a lot of simple! Conclusion: Nmap may be a terribly powerful tool and it’s ability to hide the terribly initial aspects of penetration testing, that embody military operation and enumeration. this text was written in a shot to debate Nmap from the beginner level to the advanced level. There are such a big number of alternative things that you just will do with the Nmap, and that we can discuss them within the future articles. References: Bagyalakshmi, Rajkumar, Arunkumar, Easwaran, Narasimhan, Elamaran, . . . Ramirez-Gonzalez. (2018). Network Vulnerability Analysis on Brain Signal/Image Databases Using Nmap and Wireshark Tools. Access, IEEE, 6, 57144-57151. Kalsi, T. (2017). Nmap: Network security scans. Linux Format, (219), 76-77. Kaur, Gurline,